IBM Tivoli Agentless Monitoring for Windows Operating Systems User's Guide Tables

Total Page:16

File Type:pdf, Size:1020Kb

IBM Tivoli Agentless Monitoring for Windows Operating Systems User's Guide Tables IBM Tivoli Agentless Monitoring for Windows Operating Systems Version 6.2.1 (Revised) User's Guide SC23-9765-01 IBM Tivoli Agentless Monitoring for Windows Operating Systems Version 6.2.1 (Revised) User's Guide SC23-9765-01 Note Before using this information and the product it supports, read the information in “Notices” on page 207. This edition applies to version 6.2.1 of IBM Tivoli Agentless Monitoring for Windows Operating Systems (product number 5724-C04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2008, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables ...............v Terminal Services attribute group......105 Terminal Services Session attribute group . 106 Chapter 1. Overview of the agent ....1 Terminal Services Session Memory attribute group...............108 IBM Tivoli Monitoring ...........1 Thread Pool Status attribute group .....110 Functions of the monitoring agent .......1 User Accounts attribute group .......114 New in this release ............1 Virtual Memory attribute group ......117 Components of the IBM Tivoli Monitoring WIN Performance Object Status attribute group 122 environment ..............1 Windows Services attribute group .....127 Agent Management Services .........2 WMI Event Log attribute group ......132 User interface options ...........3 WMI Performance Object Status attribute group 134 Disk capacity planning for historical data ....139 Chapter 2. Requirements and agent installation and configuration .....5 Chapter 5. Situations reference....141 Requirements for the monitoring agent .....5 Predefined situations ...........141 Agent-specific installation and configuration....6 Situation descriptions...........142 Configuration values ..........6 Agentless Windows OS Navigator item....143 Remote installation and configuration ....10 Managed Systems Navigator item .....143 WMI Windows Systems subnode ......143 Chapter 3. Workspaces reference . 11 SNMP Windows Systems subnode .....145 Predefined workspaces ..........12 Workspace descriptions ..........13 Chapter 6. Take Action commands Agentless Windows OS Navigator item ....13 reference .............149 Managed Systems Navigator item ......13 Predefined Take Action commands ......149 WMI Windows Systems subnode ......13 SNMP Windows Systems subnode......16 Chapter 7. Policies reference.....151 Chapter 4. Attributes reference ....19 Predefined policies ...........151 Attribute groups for the monitoring agent ....19 Attributes in each attribute group .......22 Chapter 8. Troubleshooting .....153 Computer System attribute group ......22 Trace logging .............154 Disk attribute group ..........25 Overview of log file management .....154 hrDeviceTable attribute group .......29 Principal trace log files .........155 hrProcessor attribute group ........30 Examples: Using trace logs ........158 hrProcessorTable attribute group ......33 RAS trace parameters .........159 hrStorageTable attribute group .......34 Dynamic modification of trace settings ....161 hrSystem attribute group .........37 Setting trace parameters for the Tivoli Enterprise Logical Disk attribute group ........39 Console server ............164 Managed Systems SNMP attribute group . 43 Problems and workarounds ........164 Managed Systems WMI attribute group ....44 Installation and configuration troubleshooting 164 Memory attribute group .........46 Remote deployment troubleshooting ....169 Network attribute group .........50 Agent troubleshooting .........169 Network Interfaces attribute group .....59 Workspace troubleshooting ........173 Operating System attribute group ......63 Situation troubleshooting ........177 Page File Usage Details attribute group ....67 Take Action commands troubleshooting . 180 Paging File Summary attribute group.....69 Support information ...........180 Performance Object Status attribute group . 71 Informational, warning, and error messages Physical Disk attribute group .......76 overview ...............181 Physical Memory attribute group ......80 Message format ...........181 Process attribute group .........84 Agent messages ...........182 Processes attribute group .........90 Processor attribute group .........93 Appendix A. Event mapping .....185 Processor Details attribute group ......95 Processor Utilization Total attribute group . 99 Appendix B. Documentation library 203 System attribute group .........100 Prerequisite publications..........203 © Copyright IBM Corp. 2008, 2013 iii Related publications ...........204 Index ...............211 Other sources of documentation .......204 Notices ..............207 Trademarks ..............209 iv IBM Tivoli Agentless Monitoring for Windows Operating Systems User's Guide Tables 1. Capacity planning for historical data logged 6. Remote deployment problems and solutions 169 by the Agentless Monitor for Windows . 140 7. Agent problems and solutions ......170 2. Information to gather before contacting IBM 8. Workspace problems and solutions ....174 Software Support ..........153 9. Situation problems and solutions .....177 3. Trace log files for troubleshooting agents 155 10. Take Action commands problems and 4. Problems and solutions for installation and solutions .............180 configuration ...........165 5. General problems and solutions for uninstallation ...........167 © Copyright IBM Corp. 2008, 2013 v vi IBM Tivoli Agentless Monitoring for Windows Operating Systems User's Guide Chapter 1. Overview of the agent The IBM Tivoli Agentless Monitoring for Windows Operating Systems provides you with the capability to monitor Windows Operating Systems. IBM® Tivoli® Monitoring is the base software for the Agentless Monitor for Windows. The Agentless Monitor for Windows can identify and notify you of common problems with the application that it monitors. IBM Tivoli Monitoring IBM Tivoli Monitoring provides a way to monitor the availability and performance of all the systems in your enterprise from one or several designated workstations. It also provides useful historical data that you can use to track trends and to troubleshoot system problems. You can use IBM Tivoli Monitoring to achieve the following tasks: v Monitor for alerts on the systems that you are managing by using predefined situations or custom situations. v Establish your own performance thresholds. v Trace the causes leading to an alert. v Gather comprehensive data about system conditions. v Use policies to take actions, schedule work, and automate manual tasks. The Tivoli Enterprise Portal is the interface for IBM Tivoli Monitoring products. You can use the consolidated view of your environment as seen in the Tivoli Enterprise Portal to monitor and resolve performance issues throughout the enterprise. See the IBM Tivoli Monitoring publications listed in “Prerequisite publications” on page 203 for complete information about IBM Tivoli Monitoring and the Tivoli Enterprise Portal. Functions of the monitoring agent The Agentless Monitor for Windows provides the following functions: Agentless Monitoring for Windows Operating Systems using SNMP Agentless Monitoring for Windows Operating Systems using Windows APIs New in this release For this revised version 6.2.1 of the Agentless Monitor for Windows documentation, the following changes have been made to the documentation since the original version 6.2.1. v Support for the self-describing agent capability has been noted. For more information, see “Requirements for the monitoring agent” on page 5 Components of the IBM Tivoli Monitoring environment After you install and set up the Agentless Monitor for Windows, you have an environment that contains the client, server, and monitoring agent implementation for Tivoli Monitoring. This Tivoli Monitoring environment contains the following components: © Copyright IBM Corp. 2008, 2013 1 Tivoli Enterprise Portal client The portal has a user interface based on Java™ for viewing and monitoring your enterprise. Tivoli Enterprise Portal Server The portal server is placed between the client and the Tivoli Enterprise Monitoring Server and enables retrieval, manipulation, and analysis of data from the monitoring agents. The Tivoli Enterprise Portal Server is the central repository for all user data. Tivoli Enterprise Monitoring Server The monitoring server acts as a collection and control point for alerts received from the monitoring agents, and collects their performance and availability data. The Tivoli Enterprise Monitoring Server is also a repository for historical data. Tivoli Enterprise Monitoring Agent, Agentless Monitor for Windows This monitoring agent collects data and distributes the data to the Tivoli Enterprise Monitoring Server, Tivoli Enterprise Portal Server, Tivoli Enterprise Portal, Tivoli Data Warehouse, and Tivoli Integrated Portal. This agent can run on a separate system from the system where the Windows Operating Systems is running. Multiple copies of this agent can run on the same system. IBM Tivoli Netcool/OMNIbus Tivoli Netcool/OMNIbus is an optional component and the recommended event management component. The Netcool/OMNIbus software is a service level management (SLM) system that delivers real-time, centralized monitoring of complex networks and IT domain events. Event information is tracked in a high-performance, in-memory database and presented to specific users through individually configurable filters and views. The software includes automation functions that
Recommended publications
  • 1) What Is the Name of an Ethernet Cable That Contains Two
    1) What is the name of an Ethernet cable that contains two electrical conductors ? A coaxial cable 2) What are the names of the two common conditions that degrade the signals on c opper-based cables? Crosstal and attenuation 3) Which topology requires the use of terminators? Bus 4) Which of the following topologies is implemented only logically, not physical ly? Ring 5) How many wire pairs are actually used on a typical UTP Ethernet network? Two 6) What is the name of the process of building a frame around network layer info rmation? Data encapsulation 7) Which of the connectors on a network interface adapter transmits data in para llel? The System bus connector 8) Which two of the following hardware resources do network interface adapters a lways require? I/O port address and IRQ 9) What is the name of the process by which a network interface adapter determin es when it should transmit its data over the network? Media Access Control 10) Which bus type is preferred for a NIC that will be connected to a Fast Ether net network? PCI 11) A passive hub does not do which of the following? Transmit management information using SNMP 12) To connect two Ethernet hubs together, you must do which of the following? Connect the uplink port in one hub to a standard port on the other 13) Which term describes a port in a Token Ring MAU that is not part of the ring ? Intelligent 14) A hub that functions as a repeater inhibits the effect of____________? Attenuation 15) You can use which of the following to connect two Ethernet computers togethe r using UTP
    [Show full text]
  • Instituto Politécnico Nacional Escuela Superior De Ingeniería Mecánica Y Eléctrica Ingeniería En Comunicaciones Y Electrónica
    INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELÉCTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELECTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA Diseño de una RED FAST ETHERNET (IEEE 802.3) en el laboratorio 7 de la Academia de Computación de Ingeniería en Comunicaciones y Electrónica de la Escuela Superior de Ingeniería Mecánica y Eléctrica, Unidad Zacatenco del IPN. TESIS QUE PARA OBTENER EL TITULO DE: INGENIERO EN COMUNICACIONES Y ELECTRONICA PRESENTAN: OSCAR ARTURO GARCIA PÉREZ AL AN NERI N AR ANJO SÁNCHEZ GLORIA RIVERA OJEDA ASESOR: M. EN C. GENARO ZAVALA MEJÍA MEXICO, D.F. 2008 INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELÉCTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA MEXICO, D.F. 2008 1 INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELÉCTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA INSTITUTO POLITECNICO NACIONAL ESCUELA SUPERIOR DE INGENIERIA MECANICA Y ELECTRICA INGENIERIA EN COMUNICACIONES Y ELECTRONICA TESIS COLECTIVA CON OPCIÓN A TITULACION TEMA: Diseño de una RED FAST ETHERNET (IEEE 802.3) en el laboratorio 7 de la Academia de Computación de Ingeniería en Comunicaciones y Electrónica de la Escuela Superior de Ingeniería Mecánica y Eléctrica, Unidad Zacatenco del IPN. ASESORES: M. EN. C. GENARO ZAVALA MEJÍA INTEGRANTES: OSCAR ARTURO GARCIA PÉREZ. ALAN NERI NARANJO SÁNCHEZ. GLORIA RIVERA OJEDA. MEXICO, D.F. 2008 2 INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE INGENIERÍA MECÁNICA Y ELÉCTRICA INGENIERÍA EN COMUNICACIONES Y ELECTRÓNICA AGRADECIMIENTOS En testimonio de gratitud limitada para su apoyo, aliento y estímulo mismos que posibilitaron la conquista de esta meta, y sabiendo también que no existirá una forma de agradecer una vida de sacrificio y esfuerzo, quiero que sientan que el objetivo logrado también es de ustedes y que la fuerza que me ayudo a conseguirlo fue su apoyo.
    [Show full text]
  • Introducing the Econet® Acorn Computer Local Area Network Introducing the Econet® Acorn Computer Local Area Network
    ito4 4 • -a IMO Introducing the Econet® Acorn Computer local area network Introducing the Econet® Acorn Computer local area network Introducing the Acorn Econet contains the Network Filing System (NFS) and the low level primitives that are used for network Now there is a simple and cost-effective way to communications. Thus the user has a number of link up a series of microcomputers. It is the Econet commands available via the computer keyboard to system, created by Acorn Computers - the team control the storage of his file on the file server and who designed the BBC Microcomputer. the use of the printer server. It is these routines The Econet network system, which is only a fraction which constitute the NFS. of the cost of comparable networks, allows up to 254 As the file server is not necessary for the control of computers to communicate with each other and to Econet transfers it is possible to run a network share expensive resources such as printer or disc without a file or printer server. In this case most of drives. the keyboard level commands will not be available An Econet system consists of a number of units to the user. Network communication would then which are described in this leaflet. To set up a rely on calls to the network primitives from the user network system you will normally need the routines. The network primitives are available via a following items. number of operating system calls and may be Econet work stations called either from Basic or from user machine code Usually BBC computers fitted with Econet routines.
    [Show full text]
  • C:\Andrzej\PDF\ABC Nagrywania P³yt CD\1 Strona.Cdr
    IDZ DO PRZYK£ADOWY ROZDZIA£ SPIS TREFCI Wielka encyklopedia komputerów KATALOG KSI¥¯EK Autor: Alan Freedman KATALOG ONLINE T³umaczenie: Micha³ Dadan, Pawe³ Gonera, Pawe³ Koronkiewicz, Rados³aw Meryk, Piotr Pilch ZAMÓW DRUKOWANY KATALOG ISBN: 83-7361-136-3 Tytu³ orygina³u: ComputerDesktop Encyclopedia Format: B5, stron: 1118 TWÓJ KOSZYK DODAJ DO KOSZYKA Wspó³czesna informatyka to nie tylko komputery i oprogramowanie. To setki technologii, narzêdzi i urz¹dzeñ umo¿liwiaj¹cych wykorzystywanie komputerów CENNIK I INFORMACJE w ró¿nych dziedzinach ¿ycia, jak: poligrafia, projektowanie, tworzenie aplikacji, sieci komputerowe, gry, kinowe efekty specjalne i wiele innych. Rozwój technologii ZAMÓW INFORMACJE komputerowych, trwaj¹cy stosunkowo krótko, wniós³ do naszego ¿ycia wiele nowych O NOWOFCIACH mo¿liwoYci. „Wielka encyklopedia komputerów” to kompletne kompendium wiedzy na temat ZAMÓW CENNIK wspó³czesnej informatyki. Jest lektur¹ obowi¹zkow¹ dla ka¿dego, kto chce rozumieæ dynamiczny rozwój elektroniki i technologii informatycznych. Opisuje wszystkie zagadnienia zwi¹zane ze wspó³czesn¹ informatyk¹; przedstawia zarówno jej historiê, CZYTELNIA jak i trendy rozwoju. Zawiera informacje o firmach, których produkty zrewolucjonizowa³y FRAGMENTY KSI¥¯EK ONLINE wspó³czesny Ywiat, oraz opisy technologii, sprzêtu i oprogramowania. Ka¿dy, niezale¿nie od stopnia zaawansowania swojej wiedzy, znajdzie w niej wyczerpuj¹ce wyjaYnienia interesuj¹cych go terminów z ró¿nych bran¿ dzisiejszej informatyki. • Komunikacja pomiêdzy systemami informatycznymi i sieci komputerowe • Grafika komputerowa i technologie multimedialne • Internet, WWW, poczta elektroniczna, grupy dyskusyjne • Komputery osobiste — PC i Macintosh • Komputery typu mainframe i stacje robocze • Tworzenie oprogramowania i systemów komputerowych • Poligrafia i reklama • Komputerowe wspomaganie projektowania • Wirusy komputerowe Wydawnictwo Helion JeYli szukasz ]ród³a informacji o technologiach informatycznych, chcesz poznaæ ul.
    [Show full text]
  • Modern Ethernet
    Color profile: Generic CMYK printer profile Composite Default screen All-In-One / Network+ Certification All-in-One Exam Guide / Meyers / 225345-2 / Chapter 6 CHAPTER Modern Ethernet 6 The Network+ Certification exam expects you to know how to • 1.2 Specify the main features of 802.2 (Logical Link Control) [and] 802.3 (Ethernet): speed, access method, topology, media • 1.3 Specify the characteristics (for example: speed, length, topology, and cable type) of the following cable standards: 10BaseT and 10BaseFL; 100BaseTX and 100BaseFX; 1000BaseTX, 1000BaseCX, 1000BaseSX, and 1000BaseLX; 10GBaseSR, 10GBaseLR, and 10GBaseER • 1.4 Recognize the following media connectors and describe their uses: RJ-11, RJ-45, F-type, ST,SC, IEEE 1394, LC, MTRJ • 1.6 Identify the purposes, features, and functions of the following network components: hubs, switches • 2.3 Identify the OSI layers at which the following network components operate: hubs, switches To achieve these goals, you must be able to • Define the characteristics, cabling, and connectors used in 10BaseT and 10BaseFL • Explain how to connect multiple Ethernet segments • Define the characteristics, cabling, and connectors used with 100Base and Gigabit Ethernet Historical/Conceptual The first generation of Ethernet network technologies enjoyed substantial adoption in the networking world, but their bus topology continued to be their Achilles’ heel—a sin- gle break anywhere on the bus completely shut down an entire network. In the mid- 1980s, IBM unveiled a competing network technology called Token Ring. You’ll get the complete discussion of Token Ring in the next chapter, but it’s enough for now to say that Token Ring used a physical star topology.
    [Show full text]
  • Medium Access Control (MAC)
    1 Medium Access Control 2 Medium Access Control (1) The Network H2 H4 H1 H3 Broadcast networks have possibility of multiple access (MA) to a channel medium access control describes how we resolve the conflict assume only one channel available for communication additional channels would also be the subject of MAC 3 Medium Access Control (2) The Network H2 H4 H1 H3 4 Medium Access Control (3) The Network H2 H4 H1 H3 5 Medium Access Control (4) The Network H2 H4 H1 H3 assume when two frames overlaps at the Rx then both are lost, and thus both must be retransmitted assumption always be true in LANs in broadcast WANs might not be true 6 ALOHA protocol You can do nothing for MAC . The Network The Network The Network The Network H2 H4 H2 H4 H2 H4 H2 H4 H1 H3 H1 H3 H1 H3 H1 H3 ALOHA is contention based: a host may broadcast whenever necessary higher layers spot errors caused by collisions, and do retransmission 7 Performance of ALOHA H n vulnerable period for -1 start (λt) −λt Pn(t)= e t1 + t2 n! H1 To find p from Poisson Equation - t set t = 2T, λ = µG, n = 0: t2 -1 0 (µ 2T ) − H2 p = G e µG2T t1 + t2 - 0! −µG2T vulnerable period for H2 start p = e µ − S = e µG2T Let t1 = t2 = T µG µS successfully sent per second −µG2T µS = µGe µG sent (including failures) per second p is probability frame has no collisions µST frames are delivered in T µ seconds p = S µG −µG2T ρ = µST = µGe T 8 Is ALOHA good? ρ 6 0.4 0.3 0.2 0.1 0.0 - 0.0 0.5 1.0 1.5 2.0 2.5 3.0 µGT load of 50% gives maximum efficiency of 18% not a very satisfactory performance no way of assuring that even this maximum efficiency is reached 9 Improving basic ALOHA 1.
    [Show full text]
  • Acorn Archimedes
    Copyright © Acorn Computers Limited 1988 Neither the whole nor any part of the information contained in, nor the product described in this Guide may be adapted or reproduced in any material form except with the prior written approval of Acorn Computers Limited. The products described in this manual are subject to continuous development and improvement. All information of a technical nature and particulars of the products and their use (including the information and particulars in this Guide) are given by Acorn Computers Limited in good faith. However, Acorn Computers Limited cannot accept any liability for any loss or damage arising from the use of any information or particulars in this manual, or any incorrect use of the products. All maintenance and service on the products must be carried out by Acorn Computers' authorised dealers. Acorn Computers Limited can accept no liability whatsoever for any loss or damage caused by service, maintenance or repair by unauthorised personnel. All correspondence should be addressed to: Customer Support and Service Acorn Computers Limited Fulbourn Road Cherry Hinton Cambridge CB1 4JN Information can also be obtained from the Acorn Support Information Database (SID). This is a direct dial viewdata system available to registered SID users. Initially, access SID on Cambridge (0223) 243642: this will allow you to inspect the system and use a response frame for registration. ACORN, ARCHIMEDES and ECONET are trademarks of Acorn Computers Limited. Within this publication, the term 'BBC' is used as an abbreviation for 'British Broadcasting Corporation'. Edition 2 First published 1988 Published by Acorn Computers Limited ISBN 1 85250 055 7 Part number 0483,000 Issue 1 1 2 Welcome to the Archimedes personal workstation This guide introduces your new Archimedes personal workstation.
    [Show full text]
  • Getting Physical with Ethernet
    ETHERNET GETTING PHYSICAL STANDARDS • The Importance of Standards • Standards are necessary in almost every business and public service entity. For example, before 1904, fire hose couplings in the United States were not standard, which meant a fire department in one community could not help in another community. The transmission of electric current was not standardized until the end of the nineteenth century, so customers had to choose between Thomas Edison’s direct current (DC) and George Westinghouse’s alternating current (AC). IEEE 802 STANDARD • IEEE 802 is a family of IEEE standards dealing with local area networks and metropolitan area networks. • More specifically, the IEEE 802 standards are restricted to networks carrying variable-size packets. By contrast, in cell relay networks data is transmitted in short, uniformly sized units called cells. Isochronous , where data is transmitted as a steady stream of octets, or groups of octets, at regular time intervals, are also out of the scope of this standard. The number 802 was simply the next free number IEEE could assign,[1] though “802” is sometimes associated with the date the first meeting was held — February 1980. • The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC). The most widely used standards are for the Ethernet family, Token Ring, Wireless LAN, Bridging and Virtual Bridged LANs. An individual working group provides the focus for each area. Name Description Note IEEE 802.1 Higher Layer LAN Protocols (Bridging) active IEEE 802.2
    [Show full text]
  • Body Area Network, Standardization, Analysis and Application
    Body Area Network, Standardization, Analysis and Application Olufemi Ekundayo Bachelor’s Thesis Degree Programme in Information Technology ___. ___. ______ ________________________________ Valitse kohde. SAVONIA-AMMATTIKORKEAKOULU OPINNÄYTETYÖ Tiivistelmä Koulutusala Tekniikan ja liikenteen ala Koulutusohjelma Degree Programme in Information Technology Työn tekijä(t) Ekunday Olufemi Adeola Työn nimi Body Area Networks; Standardization, Analysis and Application Päiväys 28 February 2013 Sivumäärä/Liitteet Ohjaaja(t) Mr. Arto Toppinen, Principal Lecturer Toimeksiantaja/Yhteistyökumppani(t) University of Eastern Finland Tiivistelmä WBAN (Wireless Body Area Network) on sisätiloissa tai ihmiskehon välittömässä läheisyydessä käytettävä lyhyen kantaman langaton tiedonsiirtotapa. Se soveltuu sekä lääketieteellisiin että ei-lääketieteellisiin so- velluksiin. Yleisimmin sitä käytetään lääketieteessä potilaan reaaliaikaisessa diagnosoinnissa. Olemassa olevat lyhyen kantaman tiedonsiirtoteknologiat, kuten Bluetooth, Bluetooth Low Energy (BLE), ZigBee ja Wi-Fi olisivat olleet soveltuvia teknologioita WBAN:lle. Ne ovat kuitenkin suunniteltuja eri käyttötarkoituk- siin. Niitä ei ole optimoitu vähäisen virrankulutuksen käyttötarpeisiin, joka on yksi tärkein perusta WBAN- teknologialla. Siksi uusi standardointi WBAN:lle on tarpeellinen. Tämä opinnäytetyö perehtyy WBAN-teknologiaan ja kuinka ihmiskeho voi lähettää langatonta signaalia, ja siten auttaa potilaan diagnosoinnissa. Opinnäytetyössä selitetään miten eri ihmiskehon asennot vaikutta- vat ulostulosignaaliin,
    [Show full text]
  • Wireless LAN & IEEE 802.11
    Wireless LAN & IEEE 802.11 An Introduction to the Wi-Fi Technology Wen-Nung Tsai [email protected] 1 OUTLINE Wi-Fi Introduction IEEE 802.11 IEEE 802.11x difference WLAN architecture WLAN transmission technology WLAN Security and WEP 2 Wi-Fi Introduction Wi-Fi 是 Ethernet 相容的無線通信協定 Wi-Fi技術代號是IEEE 802.11,也叫做 Wireless LAN 適用範圍在 50 到 150 公尺之間, Transmission rate 可到 11Mbps (802.11b) 3 Intended Use Any Time Any Where 隨時隨地都可上網遨遊 Wireless Internet access inside hotel lobbies, conference rooms, etc. Wireless at the Airport Wireless with your Latte? Wireless home networking . 4 Wi-Fi Standard (802.11) Mission: promote 802.11 interoperability as the global wireless LAN standard Wi-Fi Board members include AMD, Apple, Cisco, Compaq, Dell, Epson, Ericsson, Fujistu, Gateway, HP, IBM, Intel, Microsoft, NEC, Nokia, Nortel, Philips, Samsung, Sharp, Sony, TDK, Toshiba, 5 Wi-Fi Market in the News Wireless LAN equipment market $969 Million in 2000 to estimated $4.5 Billion in 2006 In 2001: Microsoft adds 802.11 in Windows XP Major hotel chains install Wi-Fi Internet access Around 500 Starbucks stores offer wireless Internet Microsoft joins WECA board (the 802.11 alliance) Intel Joins WECA board Most PC/Laptop manufacturers offer Wi-Fi 6 Wireless Ethernet Compatibility Alliance (WECA) Mission statement—WECA’s mission is to certify interoperability of Wi-Fi™ (IEEE 802.11b) products and to promote Wi-Fi as the global wireless LAN standard across all market segments Goal—Provide users with a comfort level for interoperability Presently
    [Show full text]
  • Cashless Tolling Db Contract Documents Part 8 Special
    CASHLESS TOLLING TA 19-1, Contract D800002 DB CONTRACT DOCUMENTS PART 8 SPECIAL SPECIFICATIONS / EQUIPMENT CUT SHEETS DRAFT February 7, 2019 New York State Thruway Authority This Part 8 – Special Specifications provides access to, and details the Project-specific requirements for the use of, the following documents: 1. NYSDOT/Authority Standard Specifications and Construction Materials 2. NYSDOT/Authority Engineering Information Issuances 3. NYSDOT/Authority Special Specifications. NYSDOT Standard Specifications and Construction Materials The Design-Builder shall use the NYSDOT Standard Specifications Construction Materials in coordination with Part 5 – Special Provisions. The NYSDOT Standard Specifications Construction Materials can be accessed at the following internet link: https://www.dot.ny.gov/main/business-center/engineering/specifications/busi-e-standards-usc. NYSDOT/Authority Engineering Information Issuances The Design-Builder shall use the relevant NYSDOT/Authority engineering information issuances, which include: 1. Engineering Instructions (EI); 2. Engineering Bulletins (EB); 3. Engineering Directives (ED). The above listed engineering information issuances can be accessed at the following internet link: https://www.dot.ny.gov/main/business-center/consultants/forms-publications-and- instructions/engineering-information-issuance-system NYSDOT Special Specifications The Design-Builder may submit to use NYSDOT/Authority Special Specifications which are listed in the Electronic Pay Item Catalog (e-PIC) (requires Authority acceptance) and which have received General Approval, and shall use any NYSDOT/Authority Special Specifications which are referenced in this Part 8 or elsewhere in the Contract Documents. Delete and ignore sections in the NYSDOT/Authority Special Specifications titled Method of Measurement and Basis of Payment from the NYSDOT/Authority Special Specifications. NYSDOT Special Specifications can be accessed at the following internet link: https://www.dot.ny.gov/main/business-center/engineering/specifications/special-specifications-us.
    [Show full text]
  • Acorn ABC 210/Cambridge Workstation
    ACORN COMPUTERS LTD. ACW 443 SERVICE MANUAL 0420,001 Issue 1 January 1987 ACW SERVICE MANUAL Title: ACW SERVICE MANUAL Reference: 0420,001 Issue: 1 Replaces: 0.56 Applicability: Product Support Distribution: Authorised Service Agents Status: for publication Author: C.Watters, J.Wilkins and Others Date: 7 January 1987 Published by: Acorn Computers Ltd, Fulbourn Road, Cherry Hinton, Cambridge, CB1 4JN, England Within this publication the term 'BBC' is used as an abbreviation for 'British Broadcasting Corporation'. Copyright ACORN Computers Limited 1985 Neither the whole or any part of the information contained in, or the product described in, this manual may be adapted or reproduced in any material form except with the prior written approval of ACORN Computers Limited ( ACORN Computers). The product described in this manual and products for use with it, are subject to continuous development and improvement. All information of a technical nature and particulars of the product and its use (including the information and particulars in this manual) are given by ACORN Computers in good faith. However, it is acknowledged that there may be errors or omissions in this manual. A list of details of any amendments or revisions to this manual can be obtained upon request from ACORN Computers Technical Enquiries. ACORN Computers welcome comments and suggestions relating to the product and this manual. All correspondence should be addressed to:- Technical Enquiries ACORN Computers Limited Newmarket Road Cambridge CB5 8PD All maintenance and service on the product must be carried out by ACORN Computers' authorised service agents. ACORN Computers can accept no liability whatsoever for any loss or damage caused by service or maintenance by unauthorised personnel.
    [Show full text]