How to implement my right angle routing strategy in Ultiboard?

Hi,
 I want to design a PCB to save me from a lot of dirty work with SCB68 blocks. We are using many PCI-6225 cards to aquire 0-10V signals from a test rig. The signals are bundled together as 20 channels per cable including 20 signal wire and 1 AI_SENSE wire.
So I need to convert two SCSI 68pin connector to four Dsub37 female connectors for each PCI-6225 card. I used Multisim to build the schematics and Ultiboard to draw PCB. First I cannot find PCI-6225 connector's information in multisim, so I used M_series 60x1's symbol in the library and modified it to meet the datasheet of PCI-6225. 
Then when I transport the file to Utilboard, the auto routing algorithm gave me a spider web :-( So I want to use the following right angle routing strategy to get a simpler PCB. red line is in the copper_bottom, green line in the copper_top, and blue circles are vias. the rest of the board will be covered with GND.
The only problem is: I do not know how to implement this alogrithm. Can anyone help me?
P.S. I do not have strong EMI requirements. So I think this design should be fine in my low speed DAQ application.
DI CHENG
Attachments:
设想.png ‏20 KB
6225_2xSCSI68_4xD37F.zip ‏272 KB

程迪,
You could also route a bus - create all signals on the 68 pin connector as part of a bus group then press (Ctrl_B) and click on all signals that you want to route within the bus and then start routing away from the connector on your preferred layer.
These best practices guides in Ultiboard should also help with routing techniques...
https://decibel.ni.com/content/docs/DOC-26701
Regards,
Pat N

Similar Messages

  • How to implement Digital Rights Management (DRM) on a document library in share point 2010

    Helloo,
    Does any one has an idea about DRM (Digital Rights Management) and how to implement it in share point 2010.
    I have a requirement to secure some excel and pdf files using DRM in sharepoint 2010. Can anyone help me here..
    Thanks
    Razi

    See if this helps you...
    http://blogs.msdn.com/b/ecm/archive/2010/02/13/introducing-records-management-in-sharepoint-2010.aspx
    http://technet.microsoft.com/en-us/library/cc261982.aspx
    http://www.cmswire.com/cms/document-management/the-scoop-sharepoint-2010-records-management-005948.php
    "T" | community.zevenseas.com/Blogs/Tanmay/default.aspx

  • How to implement invoker rights in oracle 9i

    implement invoker rights in oracle 9i

    Invoker rights is a new model for resolving references to database elements in a PL/SQL program unit. From Oracle 8i onwards, we can decide if a program unit should run with the authority of the definer or of the invoker. This means that multiple schemas, accessing only those elements belonging to the invoker, can share the same piece of code.
    To enable code to run with Invoker rights, an AUTHID clause needs to be used before the IS or AS keyword in the routine header. The AUTHID clause tells Oracle whether the routine is to be run with the invoker rights (CURRENT_USER), or with the Owner rights (DEFINER). If you do not specify this clause, Oracle by default assumes it to be AUTHID DEFINER.
    create or replace procedure update_par(pi_parcod  in     varchar2,
                                           pi_val     in     varchar2,
                                           pio_status in out varchar2)
    authid current_user is
    begin
      pio_status = 'OK';
      update appparmst
      set    parval = pi_val
      where  parcod = pi_parcod
      and    rownum = 1;
      if sql%notfound then
        pio_status = 'Error in resetting the parameter';
      end if;
    end; Restriction in using Invoker rights
    1. When compiling a new routine, direct privileges are only considered to resolve any external references. Grants through roles are ignored. The same applies when executing a routine created with invoker rights.
    2. AUTHID is specified in the header of a program unit. The same cannot be specified for individual programs or methods within a package or object type.
    3. Definer rights will always be used to resolve any external references when compiling a new routine.
    4. Maintain extra caution on privileges being assigned to a different user. If the wrong privileges are assigned, a routine with invoker rights may have a mind of its own! Such issues would be difficult to debug. So ensure that the grants are perfectly in place.
    5. For an invoker rights routine referred in a view or a database trigger, the owner of these objects is always considered as the invoker, and not the user triggering it.
    ~ Madrid.

  • How to implement Failover in VPN Router

    Hi Everyone,
    I have got Cisco 3845 VPN router which is currently running in our network. We have purchased one more Cisco 3845 router as a standby for VPN router.
    I am planning to make the new router as a secondary router which should be connected on LIVE network. If primary router fails, secondary router should run automatically after certain period of time.
    When i was looking for such kind of solution i came across of Implementing FAILOVER and LOAD BALANCING method for such kind of scenerio. As i am new to this kind of method, so i would suggest some help from the experts out here.
    How do i implement Failover and Load Balancing with my TWO Cisco 3845 VPN router?
    Helping hands are highly appreciated...
    Thanks,
    TashiBDFCL                  

    hi ,
    Please refere below link to get things clear.....
    https://sites.google.com/site/amitsciscozone/home/security/load-balancing-with-2-isps
    thanks

  • How to determine the right PR Release strategy

    Hi Experts,
    Could u help me to solve this problem!
    As our business, we want the system automatically determine the right Release Strategy based on the total Amount(amt) of PR such as
    - if PR total amt <= 1000 USD --> must  checked by only Department Manager (DM)
    - if PR total amt >1000 USD --> must checked by  Department Manager (DM) and General Director (GD) 
    so i've already configured system like that:
    1. Create characteristic : CEBAN_GSWRT (Structure CEBAN ; Field GSWRT)
    2. create anew Class CEBAN_GSWRT, which associated with above Characteristic
    3. Create release Group "03", which associated with above Class (CEBAN_GSWRT) and cheked "Overall Release PR"
    4. Create Release Code DM ; GD
    5. Create two Release Strategy such as:
      5.1.  Strategy 01 - DM Only, which have only DM release code & assigned to class  CEBAN_GSWRT and the value identified here is <=1000 USD
    5.2  Strategy 02 - DM -GD , which have DM & GD release code & assigned to class  CEBAN_GSWRT and the value identified here is >1000 USD
    then, i created two PRs, one have amt <1000 USD , another >1000 USD, but the system alway get the same Release Strategy 01,its mean that system allway apply the first case Amt of PR <1000 USD.
    Note: In the Document Type i checked Overall Release also!
    So, pls help me to show out wrong or missing steps!
    Thanks in advance
    Vietttq.
    Edited by: viettq on Sep 1, 2009 4:32 AM

    Hi,
    Please open the below link, it will help you to understand the complete step by step  process:
    http://www.sap123.com/showthread.php?t=59

  • How to implement Strategy pattern in ABAP Objects?

    Hello,
    I have a problem where I need to implement different algorithms, depending on the type of input. Example: I have to calculate a Present Value, sometimes with payments in advance, sometimes payment in arrear.
    From documentation and to enhance my ABAP Objects skills, I would like to implement the strategy pattern. It sounds the right solution for the problem.
    Hence I need some help in implementing this pattern in OO. I have some basic OO skills, but still learning.
    Has somebody already implemented this pattern in ABAP OO and can give me some input. Or is there any documentation how to implement it?
    Thanks and regards,
    Tapio

    Keshav has already outlined required logic, so let me fulfill his answer with a snippet
    An Interface
    INTERFACE lif_payment.
      METHODS pay CHANGING c_val TYPE p.
    ENDINTERFACE.
    Payment implementations
    CLASS lcl_payment_1 DEFINITION.
      PUBLIC SECTION.
      INTERFACES lif_payment.
      ALIASES pay for lif_payment~pay.
    ENDCLASS.                 
    CLASS lcl_payment_2 DEFINITION.
      PUBLIC SECTION.
      INTERFACES lif_payment.
      ALIASES pay for lif_payment~pay.
    ENDCLASS.                   
    CLASS lcl_payment_1 IMPLEMENTATION.
      METHOD pay.
        "do something with c_val i.e.
        c_val = c_val - 10.
      ENDMETHOD.                   
    ENDCLASS.                  
    CLASS lcl_payment_2 IMPLEMENTATION.
      METHOD pay.
        "do something else with c_val i.e.
        c_val = c_val + 10.
      ENDMETHOD.  
    Main class which uses strategy pattern
    CLASS lcl_main DEFINITION.
      PUBLIC SECTION.
        "during main object creation you pass which payment you want to use for this object
        METHODS constructor IMPORTING ir_payment TYPE REF TO lif_payment.
        "later on you can change this dynamicaly
        METHODS set_payment IMPORTING ir_payment TYPE REF TO lif_payment.
        METHODS show_payment_val.
        METHODS pay.
      PRIVATE SECTION.
        DATA payment_value TYPE p.
        "reference to your interface whcih you will be working with
        "polimorphically
        DATA mr_payment TYPE REF TO lif_payment.
    ENDCLASS.                  
    CLASS lcl_main IMPLEMENTATION.
      METHOD constructor.
        IF ir_payment IS BOUND.
          me->mr_payment = ir_payment.
        ENDIF.
      ENDMETHOD.                  
      METHOD set_payment.
        IF ir_payment IS BOUND.
          me->mr_payment = ir_payment.
        ENDIF.
      ENDMETHOD.                  
      METHOD show_payment_val.
        WRITE /: 'Payment value is now ', me->payment_value.
      ENDMETHOD.                  
      "hide fact that you are using composition to access pay method
      METHOD pay.
        mr_payment->pay( CHANGING c_val = payment_value ).
      ENDMETHOD.                   ENDCLASS.                  
    Client application
    PARAMETERS pa_pay TYPE c. "1 - first payment, 2 - second
    DATA gr_main TYPE REF TO lcl_main.
    DATA gr_payment TYPE REF TO lif_payment.
    START-OF-SELECTION.
      "client application (which uses stategy pattern)
      CASE pa_pay.
        WHEN 1.
          "create first type of payment
          CREATE OBJECT gr_payment TYPE lcl_payment_1.
        WHEN 2.
          "create second type of payment
          CREATE OBJECT gr_payment TYPE lcl_payment_2.
      ENDCASE.
      "pass payment type to main object
      CREATE OBJECT gr_main
        EXPORTING
          ir_payment = gr_payment.
      gr_main->show_payment_val( ).
      "now client doesn't know which object it is working with
      gr_main->pay( ).
      gr_main->show_payment_val( ).
      "you can also use set_payment method to set payment type dynamically
      "client would see no change
      if pa_pay = 1.
        "now create different payment to set it dynamically
        CREATE OBJECT gr_payment TYPE lcl_payment_2.
        gr_main->set_payment( gr_payment ).
        gr_main->pay( ).
        gr_main->show_payment_val( ).
      endif.
    Regads
    Marcin

  • How to Implement Management Chain in External routing Service

    hi,
    I am using External Routing Service to Assign & route the tasks.
    I will get the authorisation workflow in our external Routing class , Now I am suppose to implement that workflow in BPM worklist for that human task.
    One way is to know the way to implement management chain in the External Routing Service.
    I have found some BPEL classes for doing the same eg. ParticipantsType.ManagementChain, objFactory.createParticipantsTypeManagementChain().
    But not able to find any sample code to implement.
    Does any body knows how to implement the same.
    Is their any other way to resolve this issue.
    you can also refer the following thread to understand the problem statement: PROGRAMMATICALLY PERSISTING THE APPROVAL WORKFLOW FOR A HUMAN TASK.
    thanks
    Jagdish

    I have tried the below mentioned code for implemnting management chain...
         private Participants createParticipant() {
              System.out.println("1");
              String user = users[numberOfApprovals++];
              ObjectFactory objFactory = new ObjectFactory();
              Participants participants = objFactory.createParticipants();
              participants.setIsAdhocRoutingSupported(false);
                   StageType stage = objFactory.createParticipantsTypeStage();
                   stage.setName("Stage1");
                   System.out.println("2");
                   SequentialParticipant seqParticipant = objFactory.createParticipantsTypeSequentialParticipant();
                   seqParticipant.setName("Stage1.Participant1");
                   System.out.println("3");
                   ListType listType = objFactory.createList();
                   ManagementChainListType managementListType = objFactory.createManagementChainListType();
                   // adding Resource in the management chain
                   ResourceType resourceChain = objFactory.createResourceType("fkafka");
                   resourceChain.setIsGroup(false);
                   resourceChain.setType("STATIC");
                   resourceChain.setIdentityType("user");
                   managementListType.getResource().add(resourceChain);
                   System.out.println("4");
                   // adding levels in the management chain
                   ParameterType levelParameterType = objFactory.createParameterType("2");
                   levelParameterType.setType("STATIC");
              managementListType.setLevels(levelParameterType);
                   System.out.println("5");
                   // adding title in the management chain                    
                   ParameterType titleParameterType = objFactory.createParameterType("Vice President");
                   titleParameterType.setType("STATIC");
                   managementListType.setTitle(titleParameterType);
                   System.out.println("6");
                   listType.setManagementChain(managementListType);
                   System.out.println("7");
                   seqParticipant.setList(listType);
                   System.out.println("8");
                   stage.getParticipantOrSequentialParticipantOrAdhoc().add(seqParticipant);
                   System.out.println("9");
              participants.getParticipantOrSequentialParticipantOrAdhoc().add(stage);
              System.out.println("10");
              return participants;
    The above code doesnot give error during execution but It doesnot work, what It's suppose to be...
    what It does is..It calls onInitiation method number of times [equal to the number of levels given in hierachy +1] at one shot. without being assigned to anybody and come out of the human task.
    please let me know..If am missing something...
    thanks
    Jagdish Khera

  • How to implement redundant with 1 CE router to 2 MPLS service providers

    Dear all,
    Our head-office are currently have 1 Cisco CPE 3825 router with 2 WAN connections to our branches. We are now using static routing protocol in our network infrastructure, we consider how to implement the redundancy for networks by the redundant circuits connection to 2 MPLS providers, only when the primary connection to the primary MPLS L3 provider fail, the backup link to the second MPLS Layer 2 provider automatically active. Anybody knows where can I find information, tips or examples, how we'd handle the routing for that?
    We are now have:
    1 G0/1 interface connect to primary MPLS L3 Provider (the 2nd G0/2 interface is a leased-line connection to our partner, and we not consider here)
    1 HWIC (layer 2) card, with 4 ports, which has interface F0/2/3 connected to the backup MPLS Layer 2 provider.
    Thanks in advance.
    PS: Current configuration : 3727 bytes
    version 12.3
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname Router
    boot-start-marker
    boot system flash c3825-entservicesk9-mz.123-11.T7.bin
    boot-end-marker
    logging buffered 4096 debugging
    logging monitor xml
    no aaa new-model
    ip subnet-zero
    ip cef
    no ftp-server write-enable
    no spanning-tree vlan 4
    no spanning-tree vlan 5
    interface GigabitEthernet0/1
    description connect to VDC MPLS$ETH-WAN$
    mtu 1480
    ip address 222.x.x.66 255.255.255.252
    ip flow ingress
    ip flow egress
    service-policy output SDM-QoS-Policy-1
    ip route-cache flow
    duplex auto
    speed auto
    media-type rj45
    fair-queue 64 256 256
    no cdp enable
    interface FastEthernet0/2/0
    switchport access vlan 2
    no cdp enable
    interface FastEthernet0/2/3
    description ToTBToverFPT
    switchport access vlan 5
    no cdp enable
    interface Vlan2
    description CONNECT TO MPLS_VDC
    ip address 192.168.201.9 255.255.248.0
    interface Vlan5
    description Connect to HoChiMinhCity
    ip address 172.16.1.5 255.255.255.252
    ip classless
    ip route 0.0.0.0 0.0.0.0 Dialer1
    ip route 172.16.244.0 255.255.255.0 222.255.33.65
    ip route 192.168.0.0 255.255.248.0 222.255.33.65
    ip route 192.168.24.0 255.255.254.0 222.255.33.65
    ip route 192.168.30.0 255.255.254.0 222.255.33.65
    ip route 192.168.32.0 255.255.254.0 222.255.33.65
    ip route 222.x.x.68 255.255.255.252 222.255.33.65
    ip route 222.255.33.72 255.255.255.252 222.255.33.65
    ip route 222.x.x.196 255.255.255.252 222.255.33.65
    ip route 222.x.x.200 255.255.255.252 222.255.33.65
    ip http server
    ip http authentication local
    no ip http secure-server
    ip http max-connections 3
    control-plane
    line con 0
    logging synchronous
    stopbits 1
    line aux 0
    stopbits 1
    line vty 0 4
    password
    login
    transport input telnet
    line vty 5 14
    privilege level 15
    password
    login
    transport input telnet
    line vty 15
    privilege level 15
    password
    login
    transport input telnet
    parser view SDM_Monitor
    scheduler allocate 20000 1000
    end

    Hi Mr jianqu,
    Because of our customer now has 2 main central offices, and all other sub branches are now connected to each of these main central office via one primary full-meshed MPLS VPN of 1st Service Provider, so If I use the float static routes, and when there is a failure at one link at a CENTRAL CE Router to primary link to primary MPLS VPN Service Provider, but still there is no failure at the other site from a router CE sub branch with the the PE of the primary full-meshed MPLS VPN Layer 3 Service Provider,so It cannot cause a failover to a second redundant link of the 2nd Service Provider?
    So with our system, do we only have one solution like this:
    -Configure BGP as the routing protocol between the CE and the PE routers.
    -Use local preference and Multi Exit Discriminator (MED) when running BGP inside a our customer VPN to select the primary and backup links.
    -Use AS-override feature to support overlapping AS numbers between customer sites

  • This is a silly question but how do you close the angle editor in the timeline and go back to my master multicam clip for editing? I'm having a brain **** right now...

    This is a silly question but how do you close the angle editor in the timeline and go back to my master multicam clip for editing? I'm having a brain **** right now...

    Never mind...found the cure  Command-{  ...thanks to a  TWolfsky thread...

  • My iphone 4 photo auto rotation was not functioning, might be accidentally locked as I can see a locked symbol with a circle with an arroe surrounding it at the top right angle , next to the power % indicator. Please advise how to unlock it.

    My iphone 4 photo/message auto rotation was not functioning, might be accidentally locked as I can see a locked symbol with a circle with an arroe surrounding it at the top right angle , next to the power % indicator. This function was working perfectly since day 1.
    Please advise how to unlock it.

    Swipe upwards from the bottom of the screen to open Control Center. You will then find the orientation lock in the top row, last icon on the right. White is on, black is off. Tap and turn it off. If you see the lock symbol, then orientation lock is on, and that is what is keeping it in the portrait mode.

  • How to implement route cipher using java?

    Hi guys,,,
    I really got a headache solving how to implement route cipher using java lang,,i already got the concept but i really dont get how to implement it using java actually i want to make a presentation of how route cipher works using "adobe flash" but first i will implement it using java coz flash actionscripts are closer to java lang.
    Hope you could post some examples or ideas...i would really appreciate it!
    thank you so much...

    just add an action listener (either keypressed or keytyped) to the frame that you want to record. I did this in NetBeans in about 2 seconds. I can simplify it if you need. As for loging it just write the characters to a file output stream.
    public class test extends javax.swing.JFrame {
        /** Creates new form test */
        public test() {
            initComponents();
        /** This method is called from within the constructor to
         * initialize the form.
         * WARNING: Do NOT modify this code. The content of this method is
         * always regenerated by the Form Editor.
        // <editor-fold defaultstate="collapsed" desc=" Generated Code ">
        private void initComponents() {
            setDefaultCloseOperation(javax.swing.WindowConstants.EXIT_ON_CLOSE);
            addKeyListener(new java.awt.event.KeyAdapter() {
                public void keyTyped(java.awt.event.KeyEvent evt) {
                    formKeyTyped(evt);
            pack();
        // </editor-fold>
        private void formKeyTyped(java.awt.event.KeyEvent evt) {
            System.out.println(evt.getKeyChar());
         * @param args the command line arguments
        public static void main(String args[]) {
            java.awt.EventQueue.invokeLater(new Runnable() {
                public void run() {
                    new test().setVisible(true);
        // Variables declaration - do not modify
        // End of variables declaration
    }

  • How to create right-angled arrows or lines to connect forms?

    Hello,
    I am new in this forum and I would like to know whether there is an easy way to create right-angled arrows to conncet forms. Currently I create several lines and put them together manually. This is very time-consuming.
    Is there an easier way to do this in pages1 or keynote2?
    (I want to create an organization chart!)
    Thanks for your help.
    Juergen
      Mac OS X (10.4.8)   iMac G5 20"

    A copy and paste procedure might help here, but Apple's Clipboard only holds one item at a time, which is limiting. Copy something else and your previous item is gone. One way to overcome that limitation is with a utility called CopyPaste available from scriptsoftware.com. CopyPaste offers a hundred or more clipboards. I use it to store either text or objects that I use over and over. The palette collapses and a small icon floats above all else. Just stick it in a convenient place and it will open when you mouse over it. You could create your arrow once, copy it to Copy Paste, and paste it in where ever you need it. It won't be erased from the clipboard when you copy something else and it will be remembered when you shut down or restart. You can create, name, and organize multiple clipboards to file items you constantly reuse.
    To be able to move your arrows arround, be sure to click outside the layout area before pasting.
    Hope this helps.
    Walt

  • How do I set up WRT54G router with 4 computers and WVC54GC Wireless Camera

    Can anyone please tell me how to set up my Home Network with full security turned on?
    I have at least 4 neighbors that show up on my wireless connections list. I have a daughter that loves music and is constantly downloading viruses but only on one wireless connection. The rest of us want to be protected from that computer. My system consists of the following:
    One Linksys WRT54G Router
    Two Linksys WMP54G Wireless PCI adapters,
    Two Linksys WVC54GC Wireless Cameras  (Possibility four if the 1st two ever work OK.)
    Two Linksys LNE100TX PCI Ethernet Cards,
    One HP Ethernet Printer
    Three computers were connected by Ethernet cable and one was wireless. I did not change the admin password and I thought everything was working fine for a couple of years until I found that the wireless computer was acting as a “drone” and slowing everything down to a snails pace.  It could even turn itself on.
    I changed one of the Ethernet computers to wireless and decided that it might be time to also change the password and increase security.  Setting up security completely shutdown the wireless drone computer. I was OK with that, at least until I can reformat that harddrive.
    I then decided while I was at it, I would add a wireless camera (WVC54GC). I set it up using the software and Ethernet cable that came with it. After 6 tries I finally got the camera to work with the cable attached, but it does not work wireless and now none of the other computers connect any more. Is there a limit on how many connections? Should I reset the router and if so, do I disconnect the DSL modem? I’m afraid of the “drone” computer because I found some very bad malware on it. One in particular caused me to replace a hard drive.
    I’ve read page after page of network stuff on the Internet and I guess I just don’t know how to ask the right questions. I’m tired of fooling with this.

    hi , when u talk about security , are u referring to the "viruses" your daughters PC may be propogating to the rest of the network , or are u referring to external attacks on the router or your wireless PC"s ???
    In case u are referring to the "virus" attacks , the best you can do is install a good antivirus software on all PC"s and keep the virus definations updated....
    In case u are referring to the wireless security , i'd suggest that your use WPA2 personal. you can select WPA2 by going to the "wireless security" option.
    let me know if u need anything more.

  • How to implement this typical sign workflow? Urgent

    Hi Adobe Experts,
    I am new to LC (two months only). Recently company is doing some evaluation on LC 8.2 and my boss assigned the following task to me  (I simplified it):
    Form: (Enclosed)
    * Two text fields: CommentTextField1 and CommentTextField2
    * Two signature fields: SignatureField1 and SignatureField2
    I've associated the SignatureField1 to lock CommentTextField1 and associated the SignatureField2 to lock CommentTextField2.
    The progress to implement is:
    Step 1) Ray Woodard open the form in workspace, type in CommentTextField1, Sign the SignatureField1, Submit.
    Step 2) Alex Pink open the form in workspace, type in CommentTextField2, Sign the SignatureField2, Submit.
    Any suggestions on how to implement the progress? Please help! Thanks a lot!
    (What I am able to accomplish so far is the step 1, but I am not confident about that. Please point me the right solution. Should I use xfaForm or Document Form, render/submit as default or PDF, submit as XDP or PDF etc...? I am so confused and frustrated now!)

    Steve, thank you so much!!!
    Your example helped me a lot. I am able to run the process, but I still have three doubts:
    1) When I set "Submit As" to "PDF" rather than "XDP" by default, I am not able to submit the form in the workspace client with "Adobe Reader" installed. But I am able to submit the form in the workspace client with "Adobe Acrobat" installed. Is it normal?
    2) What does "Form Bridge" do in this whole process here?
    3) If I don't want to hard code the submit URL  in the form, do I have another option, like using other renders?
    Thanks again!
    Wayne

  • Help!!! How to implement a special useful button in tool bar?

    How to implement a special useful button in tool bar, when the button is clicked, then a menu shows under the button, just like the Internet Explorer's back button and forward button, there is a black arrow at the two buttons right, when click the black arrow, a menu shows under the back button or forward button, how to implement this in java?
    Please help!!!
    Thanks!!!

    Like an enhanced JComboBox?
    ;o)
    V.V.

Maybe you are looking for