2012 Chapter 10. Introduction to DP
- 格式:ppt
- 大小:979.00 KB
- 文档页数:20
Corresponding Solutions for Chemical Reaction EngineeringCHAPTER 1 OVERVIEW OF CHEMICAL REACTION ENGINEERING .......................................... 错误!未定义书签。
CHAPTER 2 KINETICS OF HOMOGENEOUS REACTIONS ........................................................ 错误!未定义书签。
CHAPTER 3 INTERPRETATION OF BATCH REACTOR DATA ..................................................... 错误!未定义书签。
CHAPTER 4 INTRODUCTION TO REACTOR DESIGN ............................................................... 错误!未定义书签。
CHAPTER 5 IDEAL REACTOR FOR A SINGLE REACTOR........................................................... 错误!未定义书签。
CHAPTER 6 DESIGN FOR SINGLE REACTIONS ....................................................................... 错误!未定义书签。
CHAPTER 10 CHOOSING THE RIGHT KIND OF REACTOR ....................................................... 错误!未定义书签。
2012考研英语作文书Introduction to the 2012 Postgraduate Entrance English Writing SectionThe 2012 Postgraduate Entrance English Writing section is designed to assess the ability of candidates to express their thoughts clearly and coherently in English. This section typically includes two tasks: a short essay and a longer essay.Short EssayThe short essay is usually a response to a prompt that requires the candidate to analyze a given situation or argument. Here's a sample prompt and a structured approach to tackle it:Prompt: "Discuss the impact of social media on interpersonal communication."Approach:1. Introduction: Begin with a brief overview of socialmedia's role in modern society.2. Positive Impact: Discuss how social media facilitates communication across distances, connects people with similar interests, and provides platforms for sharing ideas and experiences.3. Negative Impact: Address the potential for reduced face-to-face interaction, the spread of misinformation, and therisk of cyberbullying.4. Conclusion: Summarize the main points and suggest a balanced view of social media's role in communication.Longer EssayThe longer essay is often more open-ended and allows for a more in-depth exploration of a topic. Here's a sample prompt and a strategy for developing a comprehensive essay:Prompt: "The role of education in fostering innovation."Strategy:1. Introduction: Introduce the topic and state the importance of education in fostering innovation.2. Importance of a Broad Curriculum: Discuss how a diverse curriculum can expose students to various fields and ideas, which is crucial for innovation.3. Cultivating Critical Thinking: Explain how educationshould encourage students to question, analyze, and think creatively.4. Encouraging Collaboration: Highlight the importance of teamwork and collaboration in developing innovative solutions.5. Practical Application: Discuss the need for hands-on learning and real-world problem-solving as part of the educational process.6. Conclusion: Conclude by summarizing the key points and emphasizing the vital role of education in nurturinginnovative minds.Tips for Writing- Structure: Ensure your essay has a clear introduction, body, and conclusion.- Cohesion: Use transitional phrases to connect your ideasand maintain the flow of your essay.- Vocabulary: Use a range of vocabulary to express your ideas precisely.- Grammar: Pay attention to grammatical accuracy and variety. - Time Management: Allocate sufficient time for planning, writing, and revising your essay.Sample EssaysFor a more concrete understanding, the book includes sample essays with detailed analysis and commentary, helping candidates to understand what examiners are looking for in a high-scoring essay.Practice ExercisesTo reinforce learning, the book provides practice exercises that mimic the structure and style of the actual exam,allowing candidates to hone their writing skills.ConclusionThe 2012 Postgraduate Entrance English Writing section is a critical component of the exam. By understanding therequirements, practicing regularly, and applying the strategies outlined in this book, candidates can significantly improve their performance in the writing section.。
2012年职称英语综合类阅读理解目录1.第一篇:Telling Tales about People讲述关于人们的故事2.第二篇:Outside-the –classroom Learning Makes a Big Difference课处学习带来很大不同3.第三篇:Milosevic‘s Death 米洛舍维奇之死4.第四篇:Feast on Turkey and Good Wishes at Thanksgiving 火鸡盛宴和感恩节的祝福5.第五篇:Sino-Japan Animosity Lessens 中日敌意减少6.第六篇:TV Shows and Long Bus Trips看电视与长途汽车旅行7.第七篇:Modern Sun Worshippers现代日光浴崇拜者8.第八篇:The Changing Middle Class变化中的中产阶级9.第九篇:Single-parent Kids Do Best单亲幼儿最出色10.第十篇:A Letter from Alan艾伦的来信11.第十一篇:The Development of Ballet芭蕾舞的发展12.第十二篇:Smuggling走私13.第十三篇:The Barbie Dolls芭比娃娃14.第十四篇:Sleep睡眠15.第十五篇:Orbital Space Plane轨道航天飞机16.第十六篇:The Sahara 撒哈拉沙漠17.*第十七篇:Eiffel Is an Eyeful引人注目的埃菲尔铁塔18.*第十八篇:Goal of American Education美国教育的目标19.*第十九篇:The Family家庭20.*第二十篇:Tales of the Terrible Past讲述可怕的过去21.*第二十一篇:Spacing in Animals动物的空间距离22.*第二十二篇:Some Things We Know about Language我们知道的关于语言的一些事情23.*第二十三篇:The Only Way Is Up只好向上24.*第二十四篇:Clone Farm克隆农场25.*第二十五篇:Income收入26.*第二十六篇:Seeing the World Centuries Ago看许久以前的世界27.*第二十七篇:Importance of Services服务业的重要性28.*第二十八篇:The National Park Service国家公园的服务机构29.*第二十九篇:Find Yourself Packing It On? Blame Friends发现自己变胖了?这得责怪朋友们30.*第三十篇:"Lucky" Lord Lucan - Alive or Dead“幸运的”鲁肯伯爵一是死是活31.第三十一篇:Pool Watch泳池监护32.第三十二篇:The Cherokee Nation彻罗基部落33.*第三十三篇:Oseola McCarty老妇人Oseola McCarty34.+第三十四篇:To Have and Have Not逃亡35.+第三十五篇:Going Her Own Way选择她自己的路36.+第三十六篇:A Tale of Scottish Rural Life一个关于苏格兰乡村生活的故事37.+第三十七篇:Pop Music in Africa非洲的流行音乐38.+第三十八篇:Why So Many Children为什么有这么多的孩子39.+第三十九篇:Eat to Live为了活着吃饭40.+第四十篇:Narrow Escape美国疾病预防新政策41.第四十一篇:The Operation of International Airlines国际航空公司的经营42. 第四十二篇:Sauna桑拿浴43. 第四十三篇:Can Buildings Be Designed to Resist Terrorist Attack建筑设计能使建筑抵御恐怖袭击吗44. 第四十四篇:Americans Get Touchy越来越爱肢体接触的美国人45. 第四十五篇:Women Staying in Mini-Skirts for Longer女性穿超短裙时间更长46. 第四十六篇:Defending the Theory of Evolution Still Seems Needed捍卫进化论仍必要47.+第四十七篇:Narrow Escape九死一生48.第四十八篇:Finding Enlightenment in Scotland苏格兰启蒙运动49.第四十九篇:The Beginning of American Literature美国文学的开端50.第五十篇:Older Volcanic Eruptions远古火山喷发第一篇Telling Tales about People讲述关于人们的故事最普遍的非小说类文学作品类型之一,就是一些描述人们生活的故事,并且很多人喜欢阅读这类作品。
It was a incredible thing to see, we're gonna tell you how it all turned out.这看起来是一件难以置信的事,我们会告诉你其中的所有结果。
I'm Carl Azuz, welcome to a new week of CNN student news.我是卡尔·阿祖兹,欢迎来到新的一周的CNN学生新闻。
Last week,we reported on Malala Yousafzai, she is a blogger and an activist for education and women's right.上周,我们报道了马莱拉·由萨法,她是一位博主并且是一名为教育和妇女争取权利的积极分子。
She's 14 years old.她只有14岁。
Last Tuesday, Malala was targeted and shot by the Taliban.上周二马莱拉成为了目标并被塔利班分子射杀。
That's a militant group but has a strong presence in the part of Pakistan where Malala lives.这是一个激进组织,但在马莱拉生活的巴基斯坦却非常强大。
Lot of her country has rallied behind her, thousands of people turning out to be part of the demonstration in the city of Karachi this weekend.有很多国家团结起来支持她, 而且这个周末成千上万的人走上在城市卡拉奇的街头举行示威活动。
They were showing their support for Malala and speaking out against the Taliban and its strict policies.他们是在表示他们对于马莱拉的支持及公开反对塔利班及其严厉的政策。
GP SeriesGP377-PF21 (Profibus-DP Slave I/F Unit)User’s ManualPro-face HMI B.V.Table of ContentsTable of Contents2Essential Safety Precautions3Note on CE Marking3Package Contents3 Chapter 1 – IntroductionGP377-PF21 Unit Specifications4External Dimensions8Component Names and Functions9Installation10 Chapter 2 – OperationConnectable GPs11Cable Diagram12Configuration as a Profibus-DP Slave13 Chapter 3 – DiagnosticsError Diagnostics14Essential Safety PrecautionsThis manual includes procedures that must be followed to operate the GP377-PF21 Unit and GP correctly and safely. Be sure to read this manual and any related materials thoroughly to understand the correct operation and functions of the GP377-PF21 Unit and GP.•To prevent Internal Damage or Malfunction of the GP377-PF21 Unit:• Be sure to use the GP377-PF21 Unit only within its designated operatingtemperature range. Operating the GP377-PF21 Unit outside this range can lead to breakdown or malfunction.• Be sure that water, liquids or metal particles do not enter the GP377-PF21 Unit,since it may cause the unit to malfunction, or can lead to an electric shock.• DO NOT store the GP377-PF21 Unit in a place where it will be exposed to directsunlight, high temperatures, excessive dust or vibration.• The GP377-PF21 Unit is a high precision piece of equipment. DO NOT subject itto excessive shocks.• DO NOT store the GP377-PF21 Unit near chemicals, or where chemicals cancome into contact with the unit.CE MarkingThe GP377-PF21 is a CE marked product that conforms to EMC directives EN55011 class A and EN61000-6-2 .Package ContentsThe GP377-PF21 Unit’s packing box contains the items listed below. Please check to confirm that all the items shown below have been included.This unit has been carefully packed, with special attention to quality. However, should you find anything damaged or missing, please contact your local GP distributor immediately forprompt service.GP377-PF21(Profibus-DP Slave I/F)GP377-PF21User’s ManualChapter 1 – Introduction1.1 GP377-PF21 Unit Specifications1.1.1 General SpecificationsWhen used with the models GP270-LG/SC21-24VP, GP370-LG/SC41-24VP,GP377*-LG/SC/TC41-24V & GP37W2-BG41-24V:GP27*/37* + GP377-PF21 Rated Voltage DC24VPower Supply DC20.4V ~ DC27.6VPower Consumption20W (Max.)Voltage Endurance AC1000V 10mA for 1 minute (between charging and FG terminals)Insulation Resistance DC500V 10MΩ or higher (between charging and FG terminals)When used with the models GP477R-EG41-24VP & GP577R-TC/SC41-24VP:GP477*/577* + GLC300-BCB41 + GP377-PF21 Rated Voltage DC24VPower Supply DC20.4V ~ DC27.6VPower Consumption50W (Max.)Voltage Endurance AC1000V 10mA for 1 minute (between charging and FG terminals)Insulation Resistance DC500V 10MΩ or higher (between charging and FG terminals)Note: When using the GP377-PF21 unit with a GP477/577 type the bus converter module GLC300-BCB41 is required.1.1.2 Environmental SpecificationsWhen used with the models GP270-LG/SC21-24VP, GP370-LG/SC41-24VP,GP377*-LG/SC/TC41-24V & GP37W2-BG41-24V:GP27*/37* + GP377-PF21 Ambient Operating0 °C to 50 °C (0 °C to 40 °C for GP377R-TC41)TemperatureAmbient Storage-20 °C to 60 °C (-10°C to 60 °C for GP377R-TC41) TemperatureOperating Humidity20%RH to 85%RH (no condensation)Operating Atmosphere Must be free of corrosive gassesGrounding100Ω or less grounding resistance When used with the models GP477R-EG41-24VP & GP577R-TC/SC41-24VP:GP477*/577* + GLC300-BCB41 + GP377-PF21Ambient Operating0 °C to 40 °C(0 °C to 50 °C for GP477R-EG41)TemperatureAmbient Storage-10 °C to 60 °CTemperatureOperating Humidity30%RH to 85%RH non-condensingOperating Atmosphere Must be free of corrosive gassesGrounding100Ω or less grounding resistanceNote: When using the GP377-PF21 unit with a GP477/577 type the busconverter module GLC300-BCB41 is required.1.1.3 External SpecificationsGP377-PF21 Module Only:GP377-PF21External Dimensions110.9mm (W) x 119.4mm (H) x 20.0mm (D) Weight180g or lessAttachment Method Attached to the back of GP GP377-PF21 Module + GP Main Unit:GP377-PF21 + GP270-LG/SC21GP377-PF21 +GP370-LG/SC41GP377-PF21 +GP377-LG/SC/TC41GP377-PF21 +GP37W2-BG41External Dimensions 172mm (W) x127mm (H) x78 mm (D)171mm (W) x138mm (H) x77 mm (D)171mm (W) x138mm (H) x77 mm (D)207mm (W) x157mm (H) x78 mm (D)Weight980g or less1080g or less1130g or less1280g or less AttachmentMethodMounted in a solid enclosureCoolingMethod Natural Air CirculationGP377-PF21 + GLC300-BCB41 GP477R-EG41-24VP GP377-PF21 + GLC300-BCB41 GP577R-TC/SC41-24VPExternal Dimensions 274mm (W) x216mm (H) x85 mm (D)317mm (W) x243mm (H) x113.5 mm (D)Weight3000g or less4000g or less AttachmentMethod Mounted in a solid enclosureCoolingMethod Natural Air CirculationNote: When using the GP377-PF21 unit with a GP477/577 type the bus converter module GLC300-BCB41 is required.1.1.4 Profibus-DP SpecificationsGP377-PF21 Protocol PROFIBUS EN50170 & DIN 19245 Part 1 Medium EIA RS485 twisted pair cableCable Type Wire Gauge: 0.64mm Conductor Area: > 0.34mm2Supported Baud Rates9.6, 19.2, 93.75, 187.5, 500, 1500, 12000 kbit/sLength of Cable**********~93.75kbit/sextendiblewithrepeaters ***************/sextendiblewithrepeaters400m @ 500 kbit/s extendible with repeaters************/sextendiblewithrepeaters100m @ 12 Mbit/s extendible with repeaters* Valid for the Cable Type as specified aboveNumber of Nodes 32 Max in one segment, 127 possible with repeaters (Including Master)I/O per Slave 128 Bytes Input Max ( = 64 Words Max ) 128 Bytes Output Max ( = 64 Words Max )1.2 External DimensionsThe GP377-PF21 Unit’s external dimensions are as follows:(Unit: mm)The following diagrams show the GP377-PF21 Unit attached to a GP: (Unit: mm)1.3 Component Names and FunctionsNotes:NODE ID: This is coded in Hexadecimal, e.g. GP as slave No.1 => 01 (HIGH:0,LOW:1), GP as slave No.31 => 1F (HIGH:1, LOW:F).TERM: The first and last nodes on the Profibus-DP network should have theirtermination switched on. Many Profibus-DP connectors have a built-in TERM switch,then the GP377-PF21 TERM should be switched to the OFF position.PWR led: Module Power indicator (see diagnostic section)ERR led: Network Error Status indicator (see diagnostic section)Connector forProfibus-DP Network1.4 InstallationWARNING: Prior to installing the GP377-PF21 Unit, be sure to check that the GP’s power is OFF. Otherwise, it can cause an electric shock.These instructions are for installation on a “Medium” Sized GP, for “Large” Size GPs the bus converter module GLC300-BCB41 is required. Please see the documentation for the bus converter module for installation instructions.1. Peel off the GP unit’s expansion connector seal. Prior to attaching the GP377-PF21 Unitto the GP, be sure to connect the GP’s power cord to the GP unit. The power cord cannot be attached to the GP after the GP377-PF21 Unit has been installed.2. Secure the GP377-PF21 Unit in place with its three (3) attachment screws ( see figure ).A torque of only 0.5 to 0.6 Nm is needed.Chapter 2 – Operation 2.1 Connectable GPs2.1.1Connectable “Medium” Size GPs:Note: GP377-PF21 Connects directly to the back of the bus connector on the GP2.1.2Connectable “Large” Size GPs:Note: For connection of the GP377-PF21 to a “Large” size GP the bus convertmodule GLC300-BCB41 is required. Please see the Bus Converter documentation forinstallation instructions.GP270-LG21-24V GP270-SC21-24V GP370-LG41-24VP GP370-SC41-24VP GP377-LG41-24VP GP377-SC41-24VP GP377R-TC41-24VP GP37W2-BG41-24VPGP477R-EG41-24VP GP577R-TC41-24VP GP577R-SC41-24VP2.2 Cable Diagram2.2.1 Cable Diagram:The GP377-PF21 Profibus-DP Slave units are connected via RS485 2-Lineconnections. Please use the cable type as recommended in section 1.1.4. Below is an example of wiring between two Profibus-DP Nodes.2.3 Configuration as a Profibus-DP Slave 2.3.1 Introduction to Profibus-DP:Profibus-DP is a field bus network for control of remote I/O by a master (typically aPLC). The master on the Profibus-DP network reads input and writes output data toall the slaves on the network. The GP377-PF21 Unit is a Profibus-DP Slave. Itenables a GP to connect to a Profibus-DP network as a slave hence it is treated bythe Profibus-DP master as remote I/O.2.3.2 Profibus-DP Master Configuration:Each slave on the Profibus-DP network has to be entered into the Profibus-DPmaster’s configuration. Here is defined the Input and Output size that the slave willoccupy and the Node ID for the slave. For this purpose each slave requires a unique “GSD” file. This is an electronic description of the slave device. The GP377-PF21 hasa GSD file also. The name is: GPE12982.GSD. This file can be found in the GP-PRO/PBIII for Windows European Software v5.0 or later, otherwise please contactyour local Pro-face Supplier.2.3.3 GP Configuration:The Node ID has to be set on the GP377-PF21 module. This should be set to match the Node ID assigned to it by the Profibus-DP master. Please note that the Node IDon the GP377-PF21 is represented in Hexadecimal. Only the range 01h ~ 7Eh(1~126 decimal) are valid.The Input & Output area size on the GP have also to match what was assigned bythe Profibus-DP master. These have to be configured using the GP-PRO/PBIII forWindows Software. Please see the “PLC Connection Manual” and the documentation on the CD-ROM for instructions.Chapter 3 – Diagnostics3.1 Error Diagnostics3.1.1 Status LEDs:PWR LED Status ERR LED Status Error Cause & RemedyOFF OFF No Power to theProfibus Module.1. Module not connected properly to thebus connector on the GP. Pleasecheck that the mounting screws arefixed firmly.2. Module damaged. Contact your Pro-face dealer.3. GP damaged. Contact your Pro-facedealer.ON (Green)ON (Red)Profibus-DPNetwork Error.1. Profibus-DP Master configuration notpresent. Verify that the GP slave withthe error has been entered in themaster’s configuration and that thecorrect GSD file has been used.2. Node ID incorrect. Set the Node IDon the module to match the master’sconfiguration.3. Cable Error. Verify that the cable isconnected properly to the GP unitand the wiring is correct.4. I/O Size Error. Verify that the GP’sI/O size matches with that configuredby the master.5. Termination incorrect. Verify that thetermination is only ON for the first andlast nodes. If the bus connectorshave a termination switch then turnthe termination OFF for all GPs.ON (Green)OFF No Error Module and Profibus-DP networkconfiguration are OK !3.1.2 GP Error Codes:Error Code Error Description Cause & Remedy02:14Interface Module Hardware Error 1. Interface module incorrecttype. Please replace.2. Interface module notconnected. Securely mountthe module with the 3mounting screws.3. Interface module damaged.Contact your Pro-facesupplier.02:FF Data Send Timeout 1. GP unable to send data.Check that the cables areconnected correctly and thatthe master is running.02:FE Date Receive Timeout 1. Cable error. Check Cable iscorrect and connectedcorrectly.2. PLC in stop mode. Datacannot be received by theGP while the PLC is in stopmode.3. Profibus-DP network notactive.4. Interpreter function block(FB99) not present or notcalled in PACKETTRANSFER mode. CheckPLC program.02:FC Protocol Error 1. Illegal Data Received by theGP in PACKET TRANSFERmode. Check the PLCprogram and for bad cablesor noise on the bus.02:FD Data Error 1. Illegal Data Received by theGP in PACKET TRANSFERmode. Check the PLCprogram and for bad cablesor noise on the bus.02:FA Address out of range error 1. Illegal address beingaccessed by GP. Checkthat the address type existsand that the range issupported by the PLCPro-face European Headquarters Pro-face HMI B.V.Amsteldijk 1661079 LH AmsterdamThe NetherlandsTel: +31 (0)20 6464 134Fax: +31 (0)20 6464 358****************Pro-face FrancePro-face France S.A.S.Le Vinci 1, rue Henri Becquerel77290 Mithry-MoryFranceTel: +33 (0)1 60 21 22 91Fax: +33 (0)1 60 21 22 92Pro-face GermanyPro-face Deutschland GmbH Albertus Magnus Strasse 1142719 SolingenGermanyTel: +49 (0)212 258 260Fax: +49 (0)212 258 2640Pro-face ItalyPro-face HMI B.V. ItalyVia Carcano 4420033 Desio (MI)ItalyTel: +39 0362 33 71 63Fax: +39 0362 30 77 25Pro-face ScandinaviaPro-face HMI B.V. Scandinavia Danmarksvej 30 L18660 SkanderborgDenmarkTel: +45 (0)70 22 0122Fax: +45 (0)70 22 0133Pro-face UKPro-face UK, Ltd.The Venture Centre, The Science Park Coventry CV4 7EZUnited KingdomTel: +44 (0)2476 692363Fax: +44 (0)2476 692365Manual: GP377-PF21-MAN-E01。
Customer Guide to Ai-Logix DPIntegrationsMay 2017IntroductionCustomer Guide to Ai-Logix DP Integrations Version: This guide should be used with NICE Uptivity (formerly Uptivity Premise) v5.6 or later.Revision: May 2017Copyright: ©2017 inContact, Inc.Contact: Send suggestions or corrections regarding this guide to***********************************.Introduction Table of ContentsIntroduction (4)Audience (4)Goals (4)Assumptions (4)Need-to-Knows (5)Customer Responsibilities (5)Ai-Logix DP Integration Overview (6)Premise Wiring Options (6)Known Limitations and Considerations (8)Telephony Requirements (8)Hardware (8)Software (8)Licensing (8)NICE Uptivity Requirements (9)Hardware (9)Software (9)Licensing (9)Customer Configuration Overview (10)Customer Administration Tasks (11)Channel Configuration Settings for Voice Boards (11)Document Revision History (13)IntroductionIntroductionAudienceThis document is written for customers and prospective customers interested in using NICE Uptivity Call Recording in a wired telephony environment using Ai-Logix trunk tap cards from AudioCodes. Readers who will perform procedures in this guide should have a basic level of familiarity with wired (TDM) telephony, general networking, the Windows operating system, and NICE Uptivity.GoalsThe goal of this document is to provide knowledge, reference, and procedural information necessary to understand a proposed Ai-Logix/NICE Uptivity integration, and to configure the telephony environment to support the integration.This document is NOT intended as a specific system or network design document, nor is it intended to instruct the reader on telecom cabling methods and procedures. If further clarification is needed, consult your telephony vendor(s). AssumptionsThis document assumes the reader has access to an NICE Uptivity Sales Engineer, Project Manager, or other resource to assist in applying this information to the reader's environment.Introduction Need-to-KnowsTo facilitate ease of use, this document takes advantage of PDF bookmarks.By opening the bookmark pane, readers can easily refer to the portion(s) of the guide that are relevant to their needs. For example, the NICE Uptivityapplication administrator can click the Customer Administration Tasksbookmark to jump directly to that section.To expand and collapse the bookmark pane, click the bookmark icon on the left side of the document window.For information and procedures related to NICE Uptivity configuration, consult your NICE Uptivity installation team.Ai-Logix DP cards are typically used to capture audio in combination with a separate CTI integration to your PBX for call control and metadata. In this scenario, refer to the applicable customer guide for your CTI integration for additional tasks and requirements.Customer ResponsibilitiesYou are responsible for supplying the physical connection(s), IP connection(s), or both to your telephone system, and for providing additional information about these connections to the NICE Uptivity Installation team. If you supply the server hardware for the installation, then you are also responsible for installing the physical Ai-Logix cards in the server.Ai-Logix DP Integration OverviewAi-Logix DP Integration OverviewThis integration uses Ai-Logix "DP" cards to capture digital audio from telephone trunks (such as E1s, T1s, and PRIs) via passive tap. A separate integration to your PBX is required for call control events and metadata.DP cards are sold only in dual-port versions. The number of channels that can be recorded per card depends on the trunk configuration. For example, a dual-port E1 card can record 60 channels, but a dual-port T1 card can record only 48 channels. Depending on the number of channels you want to record, multiple cards may be installed in a single NICE Uptivity system.Premise Wiring OptionsinContact recommends the wiring tap be accomplished through use of a patch panel that splits one input connection into two output connections, one to the PBX and one to the NICE Uptivity recording server. For more information, refer to AudioCodes documentation available from the AudioCodes website or from Uptivity Support.Wiring diagram for passive trunk tappingAi-Logix DP Integration OverviewGeneral architectural example of an integration using passive trunk tappingAi-Logix DP Integration OverviewKnown Limitations and Considerations•Because this integration requires the use of physical audio capture cards, virtualization of the NICE Uptivity recording server is not supported.•Ai-Logix integrations do not support the real-time blackout functionality in NICE Uptivity.Telephony RequirementsHardwareWhile recording is PBX-agnostic, some PBX hardware and phone models require special consideration. For details, refer to AudioCodes documentation or ask your NICE Uptivity Sales Engineer.SoftwareThere are no telephony software requirements for analog recording unless a PBX integration is used. Ask your NICE Uptivity Sales Engineer if you have questions. LicensingAdditional licensing is usually not required, but certain manufacturers require licensing to allow station tapping. For details, refer to AudioCodes documentation or ask your NICE Uptivity Sales Engineer.Ai-Logix DP Integration Overview NICE Uptivity RequirementsHardwareNICE Uptivity hardware requirements vary depending on system configurations. Appropriate hardware is identified during the system implementation process. Along with standard hardware, one or more of the following is specifically required for this integration based on the number of trunks to be recorded:•AudioCodes DP 6409 T1/E1 Passive Tap Call Recording BladeThis card is dual-port and can connect to up to two (2) trunks. The number of channels that can be recorded per trunk varies depending on the configuration of the trunk itself:•Single T1— 24 channels (23 channels for ISDN-signaled T1)•Dual T1— 48 channels (46 channels for ISDN-signaled T1)•Single E1— 30 channels•Dual E1— 60 channelsSoftwareThis guide covers the following release:•NICE Uptivity, v5.6 or laterAdditional third-party software is required for the Ai-Logix digital station integration:•AudioCodes SmartWORKS v3.11 – 5.4•AudioCodes SmartWORKS v5.9 in MS 2012 environmentsLicensing•One (1) Voice Seat license per trunk channel to be recorded•Additional licensing may be required if the system includes optional features (for example, Uptivity Screen Recording)Ai-Logix DP Integration OverviewCustomer Configuration OverviewThe following table provides a high-level overview of the customer configuration steps in Ai-Logix digital trunk integrations.Customer Administration Tasks Customer Administration TasksDuring ongoing use of the system, your Uptivity administrator may need to configure new channels or reconfigure existing channels. At those times, this integration requires changes to the Voice Boards page.The number of voice board channels corresponds to the number of channels configured on the physical Ai-Logix card. Adding channels may require purchase and installation of server hardware and Uptivity licensing. Contact Support for additional information.For more information on voice board tasks, search online help for keyword voice boards.Channel Configuration Settings for Voice BoardsThis section provides a reference to channel settings that must be configured for the Ai-Logix LD integration. You should refer to this section whenever you add new channels to your Uptivity system.Any other voice board changes should only be done under direct supervision from Uptivity Support. Done incorrectly, voice board modifications can have serious negative impact to your system. In addition, altering the hardware configuration of your system may void your warranty.The following table shows the settings that apply when configuring channels for Ai-Logix DP integrations.Customer Administration TasksDocument Revision History Document Revision History。
文都2012考研英语一真题Section I Use of EnglishDirections:Read the following text.Choose the best word(s)for each numbered blank and mark A,B,C or D on ANSWER SHEET1.(10points)Read the following text.Choose the best word(s)for each numbered blank and mark A,B,C or D on ANSWER SHEET1.(10points)The ethical judgments of the Supreme Court justices have become an important issue recently.The court cannot_1_its legitimacy as guardian of the rule of law_2_ justices behave like politicians.Yet,in several instances,justices acted in ways that_3_ the court’s reputation for being independent and impartial.Justice Antonin Scalia,for example,appeared at political events.That kind of activity makes it less likely that the court’s decisions will be_4_as impartial judgments.Part of the problem is that the justices are not_5_by an ethics code.At the very least,the court should make itself_6_to the code of conduct that_7_to the rest of the federal judiciary.This and other similar cases_8_the question of whether there is still a_9_between the court and politics.The framers of the Constitution envisioned law_10_having authority apart from politics.They gave justices permanent positions_11_they would be free to_12_those in power and have no need to_13_political support.Our legal system was designed to set law apart from politics precisely because they are so closely_14_.Constitutional law is political because it results from choices rooted in fundamental social_15_like liberty and property.When the court deals with social policy decisions,the law it_16_is inescapably political-which is why decisions split along ideological lines are so easily_17_as unjust.The justices must_18_doubts about the court’s legitimacy by making themselves_19_to the code of conduct.That would make rulings more likely to be seen as separate from politics and,_20_,convincing as law.1.[A]emphasize[B]maintain[C]modify[D]recognize2.[A]when[B]lest[C]before[D]unless3.[A]restored[B]weakened[C]established[D]eliminated4.[A]challenged[B]compromised[C]suspected[D]accepted5.[A]advanced[B]caught[C]bound[D]founded6.[A]resistant[B]subject[C]immune[D]prone7.[A]resorts[B]sticks[C]loads[D]applies8.[A]evade[B]raise[C]deny[D]settle9.[A]line[B]barrier[C]similarity[D]conflict10.[A]by[B]as[C]though[D]towards11.[A]so[B]since[C]provided[D]though12.[A]serve[B]satisfy[C]upset[D]replace13.[A]confirm[B]express[C]cultivate[D]offer14.[A]guarded[B]followed[C]studied[D]tied15.[A]concepts[B]theories[C]divisions[D]conceptions16.[A]excludes[B]questions[C]shapes[D]controls17.[A]dismissed[B]released[C]ranked[D]distorted18.[A]suppress[B]exploit[C]address[D]ignore19.[A]accessible[B]amiable[C]agreeable[D]accountable20.[A]by all mesns[B]atall costs[C]in a word[D]as a resultSection II Reading ComprehensionPart ADirections:Read the following four texts.Answer the questions below each text by choosing A,B, C or D.Mark your answers on ANSWER SHEET1.(40points)Text1Come on–Everybody’s doing it.That whispered message,half invitation and half forcing,is what most of us think of when we hear the words peer pressure.It usually leads to no good-drinking,drugs and casual sex.But in her new book Join the Club,TinaRosenberg contends that peer pressure can also be a positive force through what she calls the social cure,in which organizations and officials use the power of group dynamics to help individuals improve their lives and possibly the word.Rosenberg,the recipient of a Pulitzer Prize,offers a host of example of the social cure in action:In South Carolina,a state-sponsored antismoking program called Rage Against the Haze sets out to make cigarettes uncool.In South Africa,an HIV-prevention initiative known as LoveLife recruits young people to promote safe sex among their peers.The idea seems promising,and Rosenberg is a perceptive observer.Her critique of the lameness of many pubic-health campaigns is spot-on:they fail to mobilize peer pressure for healthy habits,and they demonstrate a seriously flawed understanding of psychology.”Dare to be different,please don’t smoke!”pleads one billboard campaign aimed at reducing smoking among teenagers-teenagers,who desire nothing more than fitting in.Rosenberg argues convincingly that public-health advocates ought to take a page from advertisers,so skilled at applying peer pressure.But on the general effectiveness of the social cure,Rosenberg is less persuasive. Join the Club is filled with too much irrelevant detail and not enough exploration of the social and biological factors that make peer pressure so powerful.The most glaring flaw of the social cure as it’s presented here is that it doesn’t work very well for very long.Rage Against the Haze failed once state funding was cut.Evidence that the LoveLife program produces lasting changes is limited and mixed.There’s no doubt that our peer groups exert enormous influence on our behavior.An emerging body of research shows that positive health habits-as well as negativeones-spread through networks of friends via social communication.This is a subtle form of peer pressure:we unconsciously imitate the behavior we see every day.Far less certain,however,is how successfully experts and bureaucrats can select our peer groups and steer their activities in virtuous directions.It’s like the teacher who breaks up the troublemakers in the back row by pairing them with better-behaved classmates. The tactic never really works.And that’s the problem with a social cure engineered from the outside:in the real world,as in school,we insist on choosing our own friends.21.According to the first paragraph,peer pressure often emerges as[A]a supplement to the social cure[B]a stimulus to group dynamics[C]an obstacle to school progress[D]a cause of undesirable behaviors22.Rosenberg holds that public advocates should[A]recruit professional advertisers[B]learn from advertisers’experience[C]stay away from commercial advertisers[D]recognize the limitations of advertisements23.In the author’s view,Rosenberg’s book fails to[A]adequately probe social and biological factors[B]effectively evade the flaws of the social cure[C]illustrate the functions of state funding[D]produce a long-lasting social effect24.Paragraph5shows that our imitation of behaviors[A]is harmful to our networks of friends[B]will mislead behavioral studies[C]occurs without our realizing it[D]can produce negative health habits25.The author suggests in the last paragraph that the effect of peer pressure is[A]harmful[B]desirable[C]profound[D]questionableText2A deal is a deal-except,apparently,when Entergy is involved.The company,a major energy supplier in New England,provoked justified outrage in Vermont last week when itannounced it was reneging on a longstanding commitment to abide by the strict nuclear regulations.Instead,the company has done precisely what it had long promised it would not challenge the constitutionality of Vermont’s rules in the federal court,as part of a desperate effort to keep its Vermont Yankee nuclear power plant running.It’s a stunning move.The conflict has been surfacing since2002,when the corporation bought Vermont’s only nuclear power plant,an aging reactor in Vernon.As a condition of receiving state approval for the sale,the company agreed to seek permission from state regulators to operate past2012.In2006,the state went a step further,requiring that any extension of the plant’s license be subject to Vermont legislature’s approval.Then,too,the company went along.Either Entergy never really intended to live by those commitments,or it simply didn’t foresee what would happen next.A string of accidents,including the partial collapse of a cooling tower in207and the discovery of an underground pipe system leakage,raised serious questions about both Vermont Yankee’s safety and Entergy’s management–especially after the company made misleading statements about the pipe.Enraged by Entergy’s behavior,the Vermont Senate voted26to4last year against allowing an extension.Now the company is suddenly claiming that the2002agreement is invalid because of the2006legislation,and that only the federal government has regulatory power over nuclear issues.The legal issues in the case are obscure:whereas the Supreme Court has ruled that states do have some regulatory authority over nuclear power,legal scholars saythat Vermont case will offer a precedent-setting test of how far those powers extend. Certainly,there are valid concerns about the patchwork regulations that could result if every state sets its own rules.But had Entergy kept its word,that debate would be beside the point.The company seems to have concluded that its reputation in Vermont is already so damaged that it has noting left to lose by going to war with the state.But there should be consequences.Permission to run a nuclear plant is a poblic trust.Entergy runs11other reactors in the United States,including Pilgrim Nuclear station in Plymouth.Pledging to run Pilgrim safely,the company has applied for federal permission to keep it open for another20years.But as the Nuclear Regulatory Commission(NRC)reviews the company’s application,it should keep it mind what promises from Entergy are worth.26.The phrase“reneging on”(Line3.para.1)is closest in meaning to[A]condemning.[B]reaffirming.[C]dishonoring.[D]securing.27.By entering into the2002agreement,Entergy intended to[A]obtain protection from Vermont regulators.[B]seek favor from the federal legislature.[C]acquire an extension of its business license.[D]get permission to purchase a power plant.28.According to Paragraph4,Entergy seems to have problems with its[A]managerial practices.[B]technical innovativeness.[C]financial goals.[D]business vision29.In the author’s view,the Vermont case will test[A]Entergy’s capacity to fulfill all its promises.[B]the mature of states’patchwork regulations.[C]the federal authority over nuclear issues.[D]the limits of states’power over nuclear issues.30.It can be inferred from the last paragraph that[A]Entergy’s business elsewhere might be affected.[B]the authority of the NRC will be defied.[C]Entergy will withdraw its Plymouth application.[D]Vermont’s reputation might be damaged.Text3In the idealized version of how science is done,facts about the world are waiting to be observed and collected by objective researchers who use the scientific method to carry out their work.But in the everyday practice of science,discovery frequently follows an ambiguous and complicated route.We aim to be objective,but we cannot escape the context of our unique life experience.Prior knowledge and interest influence what we experience,what we think our experiences mean,and the subsequent actions we take. Opportunities for misinterpretation,error,and self-deception abound.Consequently,discovery claims should be thought of as protoscience.Similar to newly staked mining claims,they are full of potential.But it takes collective scrutiny and acceptance to transform a discovery claim into a mature discovery.This is the credibility process,through which the individual researcher’s me,here,now becomes the community’s anyone,anywhere,anytime.Objective knowledge is the goal,not the starting point.Once a discovery claim becomes public,the discoverer receives intellectual credit. But,unlike with mining claims,the community takes control of what happens next.Within the complex social structure of the scientific community,researchers make discoveries; editors and reviewers act as gatekeepers by controlling the publication process;other scientists use the new finding to suit their own purposes;and finally,the public(including other scientists)receives the new discovery and possibly accompanying technology.As a discovery claim works it through the community,the interaction and confrontation between shared and competing beliefs about the science and the technology involved transforms an individual’s discovery claim into the community’s credible discovery.Two paradoxes exist throughout this credibility process.First,scientific work tends to focus on some aspect of prevailing Knowledge that is viewed as incomplete or incorrect. Little reward accompanies duplication and confirmation of what is already known and believed.The goal is new-search,not re-search.Not surprisingly,newly published discovery claims and credible discoveries that appear to be important and convincing will always be open to challenge and potential modification or refutation by future researchers. Second,novelty itself frequently provokes disbelief.Nobel Laureate and physiologist Albert Azent-Gyorgyi once described discovery as“seeing what everybody has seen and thinking what nobody has thought.”But thinking what nobody else has thought and telling others what they have missed may not change their views.Sometimes years are required for truly novel discovery claims to be accepted and appreciated.In the end,credibility“happens”to a discovery claim–a process that corresponds to what philosopher Annette Baier has described as the commons of the mind.“We reason together,challenge,revise,and complete each other’s reasoning and each other’s conceptions of reason.”31.According to the first paragraph,the process of discovery is characterized by its[A]uncertainty and complexity.[B]misconception and deceptiveness.[C]logicality and objectivity.[D]systematicness and regularity.32.It can be inferred from Paragraph2that credibility process requires[A]strict inspection.[B]shared efforts.[C]individual wisdom.[D]persistent innovation.33.Paragraph3shows that a discovery claim becomes credible after it[A]has attracted the attention of the general public.[B]has been examined by the scientific community.[C]has received recognition from editors and reviewers.[D]has been frequently quoted by peer scientists.34.Albert Szent-Györgyi would most likely agree that[A]scientific claims will survive challenges.[B]discoveries today inspire future research.[C]efforts to make discoveries are justified.[D]scientific work calls for a critical mind.35.Which of the following would be the best title of the test?[A]Novelty as an Engine of Scientific Development.[B]Collective Scrutiny in Scientific Discovery.[C]Evolution of Credibility in Doing Science.[D]Challenge to Credibility at the Gate to Science.Text4If the trade unionist Jimmy Hoffa were alive today,he would probably represent civil servant.When Hoffa’s Teamsters were in their prime in1960,only one in ten American government workers belonged to a union;now36%do.In2009the number of unionists in America’s public sector passed that of their fellow members in the private sector.In Britain, more than half of public-sector workers but only about15%of private-sector ones are unionized.There are three reasons for the public-sector unions’thriving.First,they can shut things down without suffering much in the way of consequences.Second,they are mostly bright and well-educated.A quarter of America’s public-sector workers have a university degree.Third,they now dominate left-of-centre politics.Some of their ties go back a long way.Britain’s Labor Party,as its name implies,has long been associated with trade unionism.Its current leader,Ed Miliband,owes his position to votes from public-sector unions.At the state level their influence can be even more fearsome.Mark Baldassare of the Public Policy Institute of California points out that much of the state’s budget is patrolledby unions.The teachers’unions keep an eye on schools,the CCPOA on prisons and a variety of labor groups on health care.In many rich countries average wages in the state sector are higher than in the private one.But the real gains come in benefits and work practices.Politicians haverepeatedly“backloaded”public-sector pay deals,keeping the pay increases modest but adding to holidays and especially pensions that are already generous.Reform has been vigorously opposed,perhaps most egregiously in education,where charter schools,academies and merit pay all faced drawn-out battles.Even though there is plenty of evidence that the quality of the teachers is the most important variable, teachers’unions have fought against getting rid of bad ones and promoting good ones.As the cost to everyone else has become clearer,politicians have begun to clamp down.In Wisconsin the unions have rallied thousands of supporters against Scott Walker, the hardline Republican governor.But many within the public sector suffer under the current system,too.John Donahue at Harvard’s Kennedy School points out that the norms of culture in Western civil services suit those who want to stay put but is bad for high achievers.The only American public-sector workers who earn well above$250,000a year are university sports coaches and the president of the United States.Bankers’fat pay packets have attracted much criticism,but a public-sector system that does not reward high achievers may be a much bigger problem for America.36.It can be learned from the first paragraph that[A]Teamsters still have a large body of members.[B]Jimmy Hoffa used to work as a civil servant.[C]unions have enlarged their public-sector membership.[D]the government has improved its relationship with unionists.37.Which of the following is true of Paragraph2?[A]Public-sector unions are prudent in taking actions.[B]Education is required for public-sector union membership.[C]Labor Party has long been fighting against public-sector unions.[D]Public-sector unions seldom get in trouble for their actions.38.It can be learned from Paragraph4that the income in the state sector is[A]illegally secured.[B]indirectly augmented.[C]excessively increased.[D]fairly adjusted.39.The example of the unions in Wisconsin shows that unions[A]often run against the current political system.[B]can change people’s political attitudes.[C]may be a barrier to public-sector reforms.[D]are dominant in the government.40.John Donahue’s attitude towards the public-sector system is one of[A]disapproval.[B]appreciation.[C]tolerance.[D]indifference.Part BDirections:In the following text,some sentences have been removed.For Questions41-45, choose the most suitable one from the list A-G to fit into each of the numbered blanks. There are two extra choices,which do not fit in any of the blanks.Mark your answers on ANSWER SHEET1.(10points)Think of those fleeting moments when you look out of an aeroplane window and realise that you are flying,higher than a bird.Now think of your laptop,thinner than a brown-paper envelope,or your cellphone in the palm of your hand.Take a moment or two to wonder at those marvels.You are the lucky inheritor of a dream come true.The second half of the20th century saw a collection of geniuses,warriors, entrepreneurs and visionaries labour to create a fabulous machine that could function as a typewriter and printing press,studio and theatre,paintbrush and gallery,piano and radio, the mail as well as the mail carrier.(41)The networked computer is an amazing device,the first media machine that serves as the mode of production,means of distribution,site of reception,and place of praise and critique.The computer is the21st century's culture machine.But for all the reasons there are to celebrate the computer,we must also tread with caution.(42)I call it a secret war for two reasons.First,most people do not realise that there are strong commercial agendas at work to keep them in passive consumption mode. Second,the majority of people who use networked computers to upload are not even aware of the significance of what they are doing.All animals download,but only a few upload.Beavers build dams and birds make nests.Yet for the most part,the animal kingdom moves through the world downloading. Humans are unique in their capacity to not only make tools but then turn around and use them to create superfluous material goods-paintings,sculpture and architecture-and superfluous experiences-music,literature,religion and philosophy.(43)For all the possibilities of our new culture machines,most people are still stuck in download mode.Even after the advent of widespread social media,a pyramid of production remains,with a small number of people uploading material,a slightly larger group commenting on or modifying that content,and a huge percentage remaining content to just consume.(44)Television is a one-way tap flowing into our homes.The hardest task that television asks of anyone is to turn the power off after he has turned it on.(45)What counts as meaningful uploading?My definition revolves around the concept of "stickiness"-creations and experiences to which others adhere.[A]Of course,it is precisely these superfluous things that define human culture and ultimately what it is to be human.Downloading and consuming culture requires great skills,but failing to move beyond downloading is to strip oneself of a defining constituent of humanity.[B]Applications like ,which allow users to combine pictures,words and other media in creative ways and then share them,have the potential to add stickiness by amusing,entertaining and enlightening others.[C]Not only did they develop such a device but by the turn of the millennium they had also managed to embed it in a worldwide system accessed by billions of people every day.[D]This is because the networked computer has sparked a secret war between downloading and uploading-between passive consumption and active creation-whose outcome will shape our collective future in ways we can only begin to imagine.[E]The challenge the computer mounts to television thus bears little similarity to one format being replaced by another in the manner of record players being replaced by CD players.[F]One reason for the persistence of this pyramid of production is that for the past half-century,much of the world's media culture has been defined by a single medium-television-and television is defined by downloading.[G]The networked computer offers the first chance in50years to reverse the flow,to encourage thoughtful downloading and,even more importantly,meaningful uploading. Part CDirections:Read the following text carefully and then translate the underlined segments into Chinese.Your translation should be written clearly on ANSWER SHEET2.(10points) Since the days of Aristotle,a search for universal principles has characterized the scientific enterprise.In some ways,this quest for commonalities defines science. Newton’s laws of motion and Darwinian evolution each bind a host of different phenomena into a single explicatory frame work.(46)In physics,one approach takes this impulse for unification to its extreme,and seeks a theory of everything—a single generative equation for all we see.It is becoming less clear,however,that such a theory would be a simplification,given the dimensions and universes that it might entail,nonetheless,unification of sorts remains a major goal.This tendency in the natural sciences has long been evident in the social sciences too.(47)Here,Darwinism seems to offer justification for it all humans share common origins it seems reasonable to suppose that cultural diversity could also be traced to more constrained beginnings.Just as the bewildering variety of human courtship rituals mightall be considered forms of sexual selection,perhaps the world’s languages,music,social and religious customs and even history are governed by universal features.(48)To filter out what is unique from what is shared might enable us to understand how complex cultural behavior arose and what guides it in evolutionary or cognitive terms.That,at least,is the hope.But a comparative study of linguistic traits published online today supplies a reality check.Russell Gray at the University of Auckland and his colleagues consider the evolution of grammars in the light of two previous attempts to find universality in language.The most famous of these efforts was initiated by Noam Chomsky,who suggested that humans are born with an innate language—acquisition capacity that dictates a universal grammar.A few generative rules are then sufficient to unfold the entire fundamental structure of a language,which is why children can learn it so quickly.(49)The second,by Joshua Greenberg,takes a more empirical approach to universality identifying traits(particularly in word order)shared by many language which are considered to represent biases that result from cognitive constraints Gray and his colleagues have put them to the test by examining four family trees that between them represent more than2,000languages.(50)Chomsky’s grammar should show patterns of language change that are independent of the family tree or the pathway tracked through it.Whereas Greenbergian universality predicts strong co-dependencies between particular types of word-order relations.Neither of these patterns is borne out by the analysis,suggesting that the structures of the languages are lire age-specific and not governed by universalsSection III WritingPart A51.Directions:Some internationals students are coming to your university.Write them an email in the name of the Students’Union to1)extend your welcome and2)provide some suggestions for their campus life here.You should write about100words on ANSWER SHEET2.Do not sign your name at the end of the e“Li Ming”instead.Do not write the address(10points)Part B52.Directions:write an essay of160-200words based on the following drawing.In your essay you should1)describe the drawing briefly2)explain its intended meaning,and3)give your commentsYou should write neatly on ANSWER SHEET2.(20points)文都2012考研英语(一)试题参考答案完整版。
CTM-680CDMA 450MHz ModuleH/W Operation ManualCTM-680-ver.1.1Mar, 2012R&D CenterCELOT Wireless Co., Ltd (Korea)#307-2, Kami-Dong, Hanam City,Kyunggi-Do, 465-200, KoreaTel : +82-31-383-2297Fax :+82-31-385-2297Contents1. INTRODUCTION (4)1.1.O VERVIEW (4)1.2CTM-680G ENERAL S PECIFICATIONS (4)1.3 Receive Specifications (4)1.4 Transmit Specifications (5)1.5 MSM6800A Chipset Highlights (5)1.6 Standards (5)2. PIN DESCRIPTIONS (6)2.1.P IN A SSIGNMENT (6)2.2.P IN D ESCRIPTION (7)3. EXAMPLE MODULE APPLICATION CIRCUIT (9)3.1.P OWER M ANAGEMENT C IRCUIT (9)3.2.UIM C IRCUIT D ESIGN (10)3.3.E AR-M IC C IRCUIT D ESIGN (10)3.4.RS232C D ATA L INE C IRCUIT D ESIGN (11)4. ELECTRICAL CHARACTERISTICS (12)4.1Absolute Maximum Ratings (12)4.2Recommended Operating Conditions (12)4.3Power consumptions (12)5MECHANICAL DIMENSIONS (13)5.1O UT L INE (13)5.2A PPLICATION FOR C USTOMER PCB B OARD (13)6CONNECTORS (14)6.1I NTERFACE C ONNECTOR (60 PIN) (14)6.2RF S WITCH AND C ONNECTOR (16)About this DocumentThis document provides hardware interface and information for the CTM-680 CDMA Module. The manual is divided into the following chapters.Chapter 1 : IntroductionThis chapter introduces the CTM-680 device’s basic feature and functions.Chapter 2 : Pin DescriptionsThis chapter lists each CTM-680 device pin and its function within the device.Chapter 3 : Electrical SpecificationsThis chapter specifies the recommended operating conditions, DC voltage characteristics, and power estimations for the CTM-680 device.Chapter 4 : Interface DescriptionThis chapter details each subsystem or block within the CTM-680 device and how the subsystem or block interfaces to external peripherals.Chapter 5 : Mechanical DimensionsThis chapter provides CTM-680 physical dimensionsChapter 6 : ConnectorsThis chapter provides the information of 60-pin B-to-B connector and RF switch and/or RF connector.1.Introduction1.1.OverviewThe CTM-680 is the next generation CDMA 450Mhz module product specifically designed for various CDMA embedded wireless applications. The compactness of the CTM-680 will be ideal for the FWT. And other Applications including Handset CTM-680 contains the complete features of Radio Frequency and base-band circuitry as well as firmware that fully compiled with CDMA 2000 1x RTT & IS-856 standards. The CTM-680 also provides the full scale and flexible interface with host devices for the various advanced applications by using AT commands.The interface can be customized for the specific device upon customer’s requirements.1.2CTM-680 General SpecificationsParameters DescriptionsExternal Access Code-Division-Multiple-Access (CDMA)CDMA Protocol IS-95 A/B, IS-98A, IS-126, IS-637A, IS-707A, IS-2000, IS-856Data Rate Down link : 3.1Mbps, Up Link : 1.8 Mbps max10MHzTransmit/Receive FrequencyInterval13kQCELPVocoder EVRC,RF technology Zero Intermediate FrequencyNumber of Channel 200FA(BW:1.23MHz)Operating Voltage VBATT_INT : +3.8V ±10%VEXT_DC : +4.5V±10%Current Consumption Stand by mode: Idle (110mA), Sleep (less than 1mA)Busy mode: About 600mAOperating Temperature -20ºC ~ +50ºCFrequency Stability ±300Hz50ohmConnector,Antenna GSCSize 30 X 40 X 4mm with case9gWeight AboutExternal Interface RS-232s, Digital/Analog Audios, RingerExternal Reset Control, R-UIM, USB, GPIOsUser Interface Software BREW supportAdditional Function GPS One position location solutionUSB interface1.3 Receive Specifications\ DescriptionsFrequency Range 462.5 ~ 467.475 MHz for “A” and420.000 ~ 424.975 MHz for “L”Sensitivity Below –104 dBmInterference Rejection Single tone (-30dBm @900KHz): Below –101dBmTwo tone (-43 dBm @900KHz and 1700KHz): Below –101dBmSpurious Wave SuppressionBelow –80dBc Input Dynamic Range-25 dBm ~ -104dBm1.4 Transmit SpecificationsParametersDescriptions Frequency Range 452.5 ~ 457.475 MHz for “A” 410.000 ~ 414.975 MHz for “L”Nominal Power 0.32 W (25.0dBm)Minimum Controlled Output PowerBelow –50dBmMax Power Spurious 900KHz: Below –42dBc/30KHz1.98MHz: Below –54dBc/30KHz1.5 MSM6800A Chipset Highlights Enhanced Processing power a. ARM926EJS processor with Java acceleratorb. Advanced QDSP4000 DSP coresRadio-One ZIF Architecture Support a. Saves board spaceb. Integrated solutionHigh Data Rates a. CDMA2000 1xEVDO (IS-856) support b. Receive diversity on CDMA2000 1X and 1xEVDO systemsMulti-mode Solution a. 1X / 1xEVDO / GPS b. Diversity RX1.6 StandardsIS-95 A/B: Protocol Between MS & BTSIS-96A: Voice Signal CodingIS-98A: Base MS FunctionIS-126: Voice Loop-BackIS-637: Short Message ServiceIS-707: Data ServiceBuilt-in TCP/IP : AnyDATA proprietary softwareIS-657 : packet dataIS-856 : packet data2.Pin Descriptions2.1.Pin AssignmentThe interface of CTM-680 consists of most possible features with 60 pin connector.GND 1 2 GNDUART1_TXD 3 4 UART1_RXDUART3_TXD 5 6 UART3_RXDRUIM_PCLK 7 8 /RUIM_PRESETRUIM_PDATA 9 10 VREG_RUIM/EAR_DET 11 12 MIC2_PHPH_R 13 14 HPH_LMIC1_P 15 16 EAR_10PEAR_10N 17 18 AUX_PCM_CLKAUX_PCM_DOUT 19 20 AUX_PCM_DINAUX_PCM_SYNC 21 22 POWER_ONISNS_P 23 24 USB_IDCHG_CTL_N 25 26 USB_CTL_N/TRST 27 28 RTCKTDO 29 30 TDITMS 31 32 TCKVREG_MSMP(2.6) 33 34 JTAG_RESOUT_NPS_HOLD 35 36 BATT_IDGPIO5, BUSY 37 38 GPIO9, SMSGND 39 40 GNDUART1_RFT 41 42 UART1_CTSUART1_RI 43 44 GPIO26, I2C_SDAUART1_DTR 45 46 GPIO27, I2C_SCLSPK_OUT_P 47 48 SPK_OUT_NUSB_DP 49 50 USB_DMUSB_VBUS_CON 51 52 VBATT_INTVEXT_DC 53 54 VBATT_INTVEXT_DC 55 56 VPH_PWRGPIO11, IDLE 57 58 VPH_PWRGND 50 60 GNDFigure 2-1. Pin-outs for CTM-680 Connector2.2.Pin DescriptionPin Signal Name Type Pin Description1 GND V Ground2 GND V Ground3 UART1_TXD O UART1 TX DATA4 UART1_RXD I UART1 RX DATA5 UART3_TXD O UART3 TX DATA6 UART3_RXD I UART3 RX DATACLK7 RUIM_PCLK O RUIMRESET8 RUIM_RESET O RUIMDATA9 RUIM_DATA I/O RUIMVREG10 VREG_UIM V RUIM11 EAR_DET I EAR KEY DETECT12 MIC2P O EAR MIC OUT13 HPH_R O EAR(+)JACK(-)14 HPH_L O EARJACKMIC15 MIC1P O External(+)16 EAR_1OP O Receiver(-)17 EAR_1ON O ReceiverAudio18 AUX_PCM_CLK O DigitalAudio19 AUX_PCM_DOUT O Digital20 AUX_PCM_DIN I DigitalAudioAudio21 AUX_PCM_SYNC O DigitalON/OFF22 POWER_ON I POWER23 ISNS_P I Charger24 USB_ID I USB25 CHG_CTL_N O Charger26 USB_CTL_N O Charger27 /TRST I/O JTAG28 RTCK I/O JTAG29 TDO I/O JTAG30 TDI I/O JTAG31 TMS I/O JTAG32 TCK I/O JTAG33 VERG_MSMP(2.6) V POWER34 JTAG_RESOUT_N O JTAG35 PS_HOLD O External RESET36 BATT_ID V Battery Detect37 GPIO_INT05/BUSY O LED -BUSY38 GPIO_INT09/SMS O LED –SMS39 GND V Ground40 GND V Ground41 UART1_RFR O UART1 – Ready for Receive42 UART1_CTS I UART1 – Clear To Send43 UART1_RI O UART1 – Ring Indicator44 I2C_SDA I/O RESERVED45 UART1_DTR I UARTI - Data to Ready46 I2C_SCL I/O RESERVED47 SPK_OUT_P O SPEAKER OUT (+)48 SPK_OUT_N O SPEAKER OUT (-)49 USB_DP O USB DATA (+)50 USB_DM O USB DATA (-)51 USB_VBUS_CON I USB DC POWER INPUT52 VBATT_INT I INTERNAL BATTERY53 VEXT_DC V EXTERNAL DC POWER54 VBATT_INT I INTERNAL BATTERY55 VEXT_DC V EXTERNAL DC POWER56 VPH_PWR V POWER SUPPLY57 GPIO11/IDLE O LED - IDLE58 VPH_PWR V POWER SUPPLY59 GND V Ground60 GND V Ground3.Example Module Application Circuit3.1.Power Management Circuit1.Input DC Power 4.0V(3.7~4.2V) to No.53 pin - for MSM booting2.Input DC Power 4.0V(3.7~4.2V) to No.56 pin - for MSM booting3.Input DC Power 5.0V to No.51 Pin (USB_VBUS_CON) – for USB Operation4.Connect GND3.2.UIM Circuit Design1.Connect No.9 Pin and RUIM_DATA Line2.Connect No.7 Pin and RUIM_CLK Line3.Connect No.8 Pin and RUIM_RESET/ Line4.Connect No.10 Pin and VERG_RUIM LinePin DescriptionUIM Connector PinName1 VERG_RUIM2 RUIM_PRESET3 RUIM_PCLK4 GND5 NA6 RUIM_PDATA3.3.Ear-Mic Circuit Design1.Connect No.11 Pin and EAR_SENSE (EAR_DETECTED) Line2.Connect No.13 Pin and HPH_R Line3.Connect No.14 Pin and HPH_L Line4.Connect No.12 Pin and MIC2_P3.4.RS232C Data Line Circuit Design1.Connect No.3 (UART1_TXD).2.Connect No .4 (UART1_RXD)3.CTM-680 use 2-wired connection. This below reserved.4.Connect No.42 (UART1_CTS).5.Connect No.41 (UART1_RFR).6.Connect No.45 (UART1_DTR).4. Electrical Characteristics4.1 Absolute Maximum RatingsOperating the CTM-680 under conditions that exceed those listed in Table 3-1 may result in damage to the module. Absolute maximum ratings are limiting values, and are considered individually, while all other parameters are within their specified operating ranges.Table 4-1. Absolute Maximum RatingsSymbol Parameter Min Max Unit T S Storage temperature -30 +85 ℃ V EXTPower supply voltage-0.5 5 V V USB USB supply voltage (USB_VBUS) - 6.5 V V ESD Electrostatic discharge voltage*-TBDV(* : Human Body Model)4.2 Recommended Operating ConditionsTable 4-2. Recommended Operating ConditionsSymbol Parameter Min Max Unit T A Operating temperature -25 +60 ℃ V EXT Power supply voltage3.74.2 V V USB USB supply voltage (USB_VBUS)4.05.2V4.3 Power consumptionsTable 4-3. Current ConsumptionsSymbol Parameter Min Max Unit I EXT_MAX Max current in conversation mode - 620 mA I EXT_SLEEP Sleep current in Stand-by mode-2mA5Mechanical Dimensions5.1Out Line< TOP VIEW > 5.2Application for Customer PCB Board6Connectors6.1Interface Connector (60 pin)Table 6-1. CTM-680 Interface Connectors Vendor Connectors Part NumberNAISPlug : LWBP05-xxST Receptacle : LWBP05-xxSHNote. The receptacle is mounted in host device because the plug is in bottom side of the CTM-680.A 18.00B 14.50C 17.20H=1.5Socket 1.35Plug 1.25 Figure 6-1. 60Pin Connector ReceptacleA 18.00B 14.50C 17.20H=1.5Socket 1.35Plug 1.25 Figure 6-2. 40Pin Connector Plug6.2RF Switch and ConnectorThe MCM-620 has a RF coaxial connector or a RF switch or both in Table 6-2 for the connection between a antenna or the host device and the CTM-680.Table 6-2. RF Coaxial ConnectorPart Description Part Number Vendor RF Coaxial Connector MM9329-2700B Murata RF Switch MM8430-2600 MurataFigure 6-2 RF Connector。
嵌入式系统开发软件使用方法Chapter 1: Introduction to Embedded Systems Development SoftwareEmbedded systems development software plays a crucial role in the design and implementation of embedded systems. It provides a platform for developers to create, test, and debug software for microcontrollers or microprocessors that are embedded within a larger system. This chapter will provide an overview of the different types of embedded systems development software and their uses.1.1 Integrated Development Environments (IDEs)An IDE is a software application that provides a complete set of tools for developing embedded systems software. It typically includes a source code editor, compiler, debugger, and other utilities. IDEs provide developers with a unified platform for writing and managing code, as well as testing and debugging their applications.1.2 Cross-CompilersCross-compilers are a type of compiler that generates machine code for a different target platform than the one on which the compiler is running. In the case of embedded systems development, cross-compilers are used to compile code on a host computer to run on the embedded target device. This allows developers to write code in a high-level programming language and then compile it for the specific architecture of the target device.Chapter 2: Choosing an Embedded Systems Development SoftwareWhen selecting an embedded systems development software, it is important to consider several factors. This chapter will discuss these factors and provide guidance on choosing the right software for your needs.2.1 Target Architecture SupportOne of the key considerations when choosing embedded systems development software is whether it supports the target architecture of your embedded system. Different microcontrollers and microprocessors have different instruction sets and architectures, and the software you choose must be compatible with your hardware.2.2 Development WorkflowConsider the development workflow and tools that the software provides. Does it offer features like code navigation, refactoring, and version control integration? A streamlined workflow can significantly enhance productivity and improve code quality.Chapter 3: Getting Started with Embedded Systems Development SoftwareOnce you have chosen the appropriate development software, it's time to get started with the embedded systems development process.This chapter will guide you through the initial setup and usage of the software.3.1 Installation and SetupBegin by installing the software on your development machine. Follow the installation instructions provided by the software vendor. Ensure that you have the necessary hardware drivers installed for debugging and programming the target device.3.2 Creating a New ProjectMost embedded systems development software allows you to create new projects to organize your code and resources. Start by creating a new project and selecting the appropriate target architecture and microcontroller model.3.3 Writing and Compiling CodeUse the integrated source code editor to write your application code. Take advantage of features like code auto-completion and syntax highlighting to improve efficiency and code quality. Once your code is written, use the compiler to generate the binary executable for the target architecture.Chapter 4: Debugging and Testing Embedded Systems SoftwareDebugging and testing are crucial steps in the embedded systems development process. This chapter will explore the debugging and testing features provided by embedded systems development software.4.1 Debugging ToolsEmbedded systems development software often includes debugging tools that allow developers to set breakpoints, inspect variables, and step through code execution. These tools provide valuable insights into the behavior of your application and help identify and fix bugs.4.2 Emulators and SimulatorsEmulators and simulators are software tools that allow you to run and test your application on a host computer without the need for physical hardware. They provide a safe and convenient environment for testing and debugging your software before deploying it to the target device.Chapter 5: Deployment and Optimization of Embedded Systems SoftwareIn this final chapter, we will discuss the deployment and optimization of embedded systems software.5.1 DeploymentOnce you have tested and debugged your embedded systems software, it is time to deploy it to the target device. Use the programming tools provided by the development software to load the binary executable onto the microcontroller or microprocessor.5.2 Performance OptimizationEmbedded systems often have limited resources, so it's important to optimize your software for performance and efficiency. Analyze your code for areas that can be optimized, such as memory usage and execution speed. Use profiling tools provided by the development software to identify bottlenecks and improve overall performance.In conclusion, embedded systems development software is a critical tool for developing software for embedded systems. This article provided an overview of the different types of embedded systems development software, discussed the factors to consider when choosing software, and explained the steps to get started, debug, test, and optimize embedded systems software. With the right software and tools, developers can efficiently create robust and high-quality software for embedded systems.。