QoS and1000v packet and control traffic

It is important to reserve bandwidth for 1000v packet and control. However, I know of now way to mark those packets so that they can be given end to end QoS treatment.
The 1000v allows me to match traffic on output queuing using the following.
match protocol n1k_control
match protocol n1k_packet
With that, in conjunction with a policy-map type queuing, I can reserve bandwidth for1000v packet and control traffic leaving the VEM towards the upstream switch. However, once it gets to the upstream switch, the lack of an appropiate CoS value prevents me from properly queuing the traffic as it heads towards the VSM.
I have the following configuration.
A pair of N7Ks.
1000v VSM running on a pair of 1010 Appliance connected to the N7Ks
A pair of UCS 6248UP connected to the N7Ks
B200 M2 Blade Server with M81KR converged Network Adapter in a 5108 Chassis running ESXi with the VEM installed.
2208XP I/O Modules connecting the 5108 to the 6248UP
vCenter running on a separate ESXi host outside the UCS connected to the N7Ks
Once the 1000v packet and control traffic leaves the VEM, it is unmarked. As a result it hits the 2208 and lands in the best effort queue all the way through the 6248 and into the N7K.
Everything I've read suggests 1000v packet and control traffic should be marked with a CoS value of 6 but how do I do that for packets leaving the 1000v?
Thanks in advance for your help.
Jim Marinelli

Hi Jim,
As you pointed out, the VEM would mark the control/packet traffic with CoS 6. You can set the UCS vNIC policy to accept this tag by setting the 'Host Control' parameter to 'Full':
http://www.cisco.com/en/US/docs/unified_computing/ucs/sw/gui/config/guide/2.1/b_UCSM_GUI_Configuration_Guide_2_1_chapter_010100.html
So this tag would persist till it leaves the UCS Fabric Interconnects.
Thanks,
Shankar

Similar Messages

  • How does QoS work with WAAS WCCP? What's the interaction between QoS Traffic Classification and WAE Traffic Application Policy?

    How does QoS work with WAAS WCCP? What's the interaction between Router QoS Traffic Classification and WAE Traffic Application Policy?

    By default, WAAS preserves the DSCP marking on intercepted packets.  There is a configuration option to set/override the DSCP value at the global (device), application, and classifier levels.  Currently WAAS provides marking only.  There is no action taken by WAAS based on the DSCP value.
    Regards,
    Zach

  • Best Practices for vMotion QoS in N1kv and UCS?

    Hi,
    I'm looking at a few technical documentation on what's the recommended way to provide QoS to vMotion.
    From VMWare's website on vSphere deployment with N1kv,
    They are using
    policy-map type qos vmotion
         class class-default
              police cir percent 30 bc 200 ms conform transmit violate drop
    This rate-limits vMotion traffic to 3Gbps and excess traffic will be dropped.
    Would this be better if I were to use:
    policy-map type qos vmotion
         class class-default
              police cir percent 30 bc 200 ms conform set-cos-transmit 4 exceed drop
    policy-map type vethernet vMotion
         switchport access vlan 900
         service-policy type qos in vmotion
         pinning id 0
    I'm marking vmotion traffic with a CoS of 4 and pin it to Fabric-A. I will have my management VLAN pinned to Fabric-B.
    Also, do I need to configure QoS settings in UCS as well?
    For the upstream switch, if I'm using a Catalyst 3750, would it be sufficient just to do a mls qos trust cos?
    Appreciate your advice.
    Thanks..

    Steven,
    Yes. You can use the modified QoS policy which changes the COS Values.
    We need to do some more configuration in Fabric Interconnect for the COS Values that are modified by Nexus 1000v to keep it as it is.
    The M81KR adapter works in a “no trust” QoS model which means that it will overwrite the CoS value set by an upstream entity (Nexus 1000v for example). For Nexus1000v deployments, it is highly recommended to do the CoS marking at the Nexus 1000v level. This means changing the QoS model to “trust” on the M81KR.
    To create a QoS policy to achieve this, look into the attached file. We need to have option "Full" enabled in it.
    Here are further details about this configuration from UCS Manager help:
    Host Control field
    Whether Cisco UCS controls the class of service (CoS). This can be:
    None—Cisco UCS uses the CoS value associated with the priority selected in the Priority drop-down list regardless of the CoS value assigned by the host.
    Full—If the packet has a valid CoS value assigned by the host, Cisco UCS uses that value. Otherwise, Cisco UCS uses the CoS value associated with the priority selected in the Priority drop-down list.
    Regards
    Nethaji V

  • Police and prioritize traffic

    i have an mpls service from provider that provides a guaranteed bandwidth of 200 mbps (total) to traffic marked af11 or af12 and best effort for unmarked traffic.
    i want to create a marking / policing policy that allows customer to prioritize af11 over af12 in ce facing provider.
    ce device should transmit af11 traffic up to 200 mbps and if it exceeds 200 mbps mark down before sending to provider.
    if no af11 traffic is present ce device should transmit af12 traffic up to 200 mbps and if it exceeds 200 mbps mark down
    before sending to provider.
    If both af11 and af12 traffic are present however, af11 should be prioritised over af12 traffic.
    i.e. if af11 traffic is at 150 mbps and af12 at 50 mbps and af11 traffic increases to 160 mbps this should now cause af12
    traffic in excess of 40 mbps to be marked down before sending to provider.
    Not sure if this is possible but would really appreciate your input.

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    I think you'll find the matching rate-limit will "win", i.e. it's not recursive.
    I believe I understand what you want to accomplish, but still don't see a way to accomplish it, even across multiple devices.
    Also, I cannot see how it can be done with "stock" QoS features, because to do this, a process really needs to analyze a packet stream before it's transmitted.  Basically given a set of packets with the AF11 and AF12 markings, you need to "look" ahead at the packets that will "fit" in the Tc for the physical egress rate.  Once that's determined, you can allow up to Bc of AF11 packets.  If Bc isn't fully consumed by AF11 packets, you allow what's left over to AF12 packets.
    Policers/rate-limiters don't look ahead.

  • Copp and management traffic

    Good afternoon fellow Ciscorians.
    I have configured a Copp to rate limit ICMP traffic and fragmented traffic from saturating the RP via the control-plane and also ignore the same traffic class from our trusted IP addresses.  But i am wondering about management traffic such as telnet and SSH, we have an access list on the VTY lines dropping traffic from un-trusted sources on 22+23, i am wondering what the benefits are to employing a Copp policy as well as the access-list on the VTY lines?
    Could an attack still saturate the RP with an access-list dropping the un-trusted traffic on the VTY lines?  (6509-Sup720)
    Matthew.

    Hi Matthew,
    access-list applied on interface is applicable for all traffic, data traffic (transit traffic) and control-plane traffic (destined to router or punted to RP), while CoPP is only applicable to traffic punted to RP.
    Access list will either permit or drop but CoPP is service-policy and you can rate-limit the traffic. So if we take example of ICMP traffic, and requirement is we want to allow ICMP traffic to router (ICMP is useful tool to check reachability and latency) but not more than 500kbps (to avoid any DDOS attack), in this case blocking ICMP with ACL on interface will not solve the purpose but CoPP will do the job.
    If you are blocking some traffic via ACL, it should not saturate the RP.
    --Pls dont forget to rate helpful posts--
    Regards,
    Akash

  • What is control traffic in LWAPP

    Hi all,
    As per Ciso book LWAPP handles the control traffic between Controller and Access point.
    IF someome can explain me what is control traffic please?
    thanks
    mahesh

    Hi Mahesh,
    Hers is the detailed information on LWAPP and CAPWAP..
    http://tools.ietf.org/html/draft-ohara-capwap-lwapp-04#section-4.1
    Lemme know if this answered your question..
    Regards
    Surendra

  • Application Visibility And Control Bittorrent

    Hello,
    I can use the Application Visibility And Control does not block the traffic from Bittorrent? Or have I misunderstood?
    However, I have on my WLC 2504 that configures goes Bittorrent still.
    Regards

    Here is the protocol list supported in NBAR2
    http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6558/ps6616/product_bulletin_c25-627831.html
    I can see "bittorrent", "encrypted-bittorrent", "bittorrent-networking" as recognised protocol in the list, but nothing for utorrent.
    From WLC code 7.5 onwards you can update these protocol packs on your controller (see below for more detail)
    http://www.cisco.com/en/US/docs/wireless/controller/technotes/7.5/AVC_dg7point5.html
    Protocol pack 4.1.1 is the latest for 7.5 code. Here is the more information about it.
    http://www.cisco.com/en/US/docs/wireless/controller/nbar2_prot_pack/4.1.1/b_nbar2_prot_pack_411.html
    Latest protocol pack (pp-AIR-7.6-13-6.3.0.pack) is available for 7.6 code version if you would like to test it out.

  • BCM4311 dropping packets and occasionally connection

    I got a new Dell Latitude D820 (refurbished really) onto which I installed Arch.  I installed the b43-firmware for the AUR and not I can connect to my network, but I drop about 8% of my packets and occasionally I just flat out loose my connection.
    I had an old Dell Latitude D620 before and I believe I mirrored the set up over but something still isn't working.  I can get ethernet, but not wireless fully working. 
    lspci:
    09:00.0 Ethernet controller: Broadcom Corporation NetXtreme BCM5752 Gigabit Ethernet PCI Express (rev 02)
    0c:00.0 Network controller: Broadcom Corporation BCM4311 802.11b/g WLAN (rev 01)
    ip link: (At this point the wireless had cut out on me)
    1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    2: enp9s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 00:26:b9:22:57:f5 brd ff:ff:ff:ff:ff:ff
    3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DORMANT group default qlen 1000
    link/ether 00:19:7d:a7:a6:53 brd ff:ff:ff:ff:ff:ff
    dmesg | grep wlan0:
    [ 6119.953556] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6119.966765] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6119.968507] wlan0: authenticated
    [ 6119.968734] b43 ssb0:0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 6119.968742] b43 ssb0:0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 6119.968759] b43 ssb0:0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 6119.969517] wlan0: associate with 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6119.991765] wlan0: RX AssocResp from 00:0f:66:2a:e4:c4 (capab=0x411 status=0 aid=7)
    [ 6119.992219] wlan0: associated
    [ 6235.492798] ieee80211 phy0: wlan0: No probe response from AP 00:0f:66:2a:e4:c4 after 500ms, disconnecting.
    [ 6236.788531] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6236.800563] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6237.002809] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6237.206171] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6237.409479] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
    [ 6239.110336] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6239.123422] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6239.326144] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6239.529459] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6239.732828] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
    [ 6241.930312] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6241.949734] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6242.152878] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6242.356763] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6242.559472] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
    [ 6254.933596] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6254.952971] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6255.156156] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6255.359467] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6255.562800] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
    [ 6291.486796] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6291.500114] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6291.501985] wlan0: authenticated
    [ 6291.502211] b43 ssb0:0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 6291.502229] b43 ssb0:0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 6291.502235] b43 ssb0:0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 6291.502844] wlan0: associate with 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6291.706153] wlan0: associate with 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6291.909466] wlan0: associate with 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6292.112807] wlan0: association with 00:0f:66:2a:e4:c4 timed out
    [ 6334.220299] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6334.233449] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6334.436126] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6334.438547] wlan0: authenticated
    [ 6334.438771] b43 ssb0:0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 6334.438789] b43 ssb0:0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 6334.438795] b43 ssb0:0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 6334.439466] wlan0: associate with 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6334.441680] wlan0: RX AssocResp from 00:0f:66:2a:e4:c4 (capab=0x411 status=0 aid=7)
    [ 6334.442197] wlan0: associated
    [ 6362.492825] ieee80211 phy0: wlan0: No probe response from AP 00:0f:66:2a:e4:c4 after 500ms, disconnecting.
    [ 6363.793623] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6363.806747] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6364.009457] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6364.212796] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6364.416144] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
    [ 6366.117386] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6366.130453] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6366.332781] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6366.536110] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6366.739513] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
    [ 6368.946982] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6368.960041] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6369.162846] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6369.366121] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6369.569458] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
    [ 6381.956831] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6381.970081] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6382.172794] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6382.376128] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6382.579456] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
    [ 6406.143601] wlan0: authenticate with 00:0f:66:2a:e4:c4
    [ 6406.156739] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
    [ 6406.359456] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
    [ 6406.562790] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
    [ 6406.766124] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out

    Dornith wrote:
    mkraemer wrote:I can't help with the problem, but take a look at https://bbs.archlinux.org/viewtopic.php?pid=1452652
    I tried all the solutions presented in that forum.  None of them worked.  The link the OP said fixed his problem is now broken.
    hippieben wrote:Try the broadcom drivers in AUR.  I find them to work much better than b43.
    Whenever I install the proprietary drives, When I run and get:
    $ sudo modprobe wl
    modprobe: FATAL: Module wl not found.
    Did you restart after installing?

  • Back flush with both Packet and Bucket

    Dear all,
    We produce consumer goods in our company and we maintain Finish Goods in Packet and Bucket. Can we key in Back flush in both unit Packet and Bucket?
    E.g we have Finish Goods A, Qty = 10 Bucket and 23 Packet
    (1 Bucket = 40 Packet)
    Can we input into Backflush : 10 Bucket + 23 Packet ?
    Or we can input by (10*40+23) Packet only?
    Pls advise us.
    Thank you very much!
    CH

    CH,
    Why do you want to backflush the finished goods.
    I think you want to do auto GR for this FG on order.
    If that is the case then you can do following things.
    You have the base unit of measure as packet.
    In the material master of that FG, in the work scheduling view enter order unit as bucket.
    As soon as you enter system will give you pop up.
    Manintain the relation of both the units there & save.
    Henceforth whenever the production order will be created it will pick up the unit as bucket with relation given in packet in the order header.
    Put auto GR control key in one of the operation in the order.
    So it will suggest the GR with confirmation.
    In MMBE you can see the stock with any of the unit.
    Hope this helps you.
    SmanS

  • I have 3dparty software wirelessly with a cryptographic authentication system without my consent (seems to be new technology developed by stanford) obtaining ownership of my iPhone 4s software and controlling it with remote device to jail break. Now what?

    I have 3rd party software wirelessly injected and used on my iphone with a cryptographic authentication system without my consent (seems to be new technology developed by stanford and apple security is not updated for this technology) obtaining ownership of my iPhone 4s software and controlling it with remote device to jail breaking my phone, adding and removing software, changing settings all from a remotely controled device from different location (I have a Mac address I'd of this device to know for sure). Almost undetectable. When I look at the legal section of my phone it shows a list of all the unauthorized 3rd party software "as is" copyright encrypted on the phone.  This is the most basic way to legally steal software of any kind.  Because of this legalality 3rd party ownership have total control of certain software correlated with hardware use including visualization technology, etc.  most people luckily will never have this happen to them so it's unlikely many readers have not a clue of what I'm saying currently.  Either way, without needing to obtain specific warranty of any kind "as is" copyright control makes system restores not a solution because the source code is not directly encrypted on the actual hardware device only a copy right notice must appear on the specific device 3rd party software validation making it extremely difficult for me to take control of the situation. Apple claims their iOS technology prevents this type copyright obstruction from being possible, however, according to my phone a new form of technology was used developed by Tom wu of Stanford university called the STANFORD SRP AUTHENTICATION TECHNOLOGY which uses Some form of cryptographic authentication system and uses quote "secure remote password" which seems to suceed in hacking iOS apple technology apple claims is not possible to jailbreak an unstolen phone or without the owners consent As well as loading the device with 3rd party copyright Notices to make all of this legalized. My phone shows atleast 30 pages worth of legalized 3rd party copyright permissions! Yesterday my apple care provider labeled me a jailbreaker and refused to look at my legal documented proof which completely blew my mind because it voides my apple care contract I spent 100 on. This employee did not take all factors into consideration and made quick assumptions as well as verbally speaking to me as I'm an automatic criminal. I left the store yesterday with no payed insurance help on a problem I had no control over and couldn't prevent, leaving with voided contracts. This is an apple users worst nightmare and I have spent days researching all of this like i am some kind of lawyer only to be able to use my phone the way it should and spent alot of money on.  I can legally backup any claim I have just wrote above currently and have a large source of data collected to prove apple is wrong in voiding insurance support on this issue. The problem lies in apple avoiding and not wanting to believe their software can legally be obtained ot "hacked". Yet still labeled a jailbreaker basically.. What should I do????? Been to local apple store 3 times and rebooted my phone as well sprint service restore 4 times and spoke with reps twiice on the phone. Spoke with my phone provider who said apple has full control over these matters so they can't help me.  My case is according to apple "still open"...Anyone else heard of this or of Stanford's office of technology licensing? Maybe I need to buy a blackberry again or just use a landline so I can stop being my own lawyer and focus on other productive areas in life instead of this horrible mess. I shouldn't have to prove to apple I not a jailbreaker they should have to prove I'm one before voiding support I desperately need!!

    Mullaly75 wrote:
    I assume u guys don't understand what open source software is
    Yes, I think most of us do understand what open source software is. It sounds as if you don't. Here's some information:
    Open-source software (OSS) is computer software that is available in source code form: the source code and certain other rights normally reserved forcopyright holders are provided under an open-source license that permits users to study, change, improve and at times also to distribute the software.
    Open source software is very often developed in a public, collaborative manner. Open-source software is the most prominent example of open-sourcedevelopment and often compared to (technically defined) user-generated content or (legally defined) open content movements.
    from http://en.wikipedia.org/wiki/Open_source_software
    Yes, Tom Wu of Stanford wrote a paper on something called Secure Remote Access Protocol. It's a form of Asymetric Key Exchange and has nothing to do with hacking anything. It's actually intended to protect data.

  • Control parallel port (data and control lines)

    I need to control the output on the parallel port (LPT1) - Both data and control lines.  Once the data is written (Pins2-9), I then need to toggle the Sprocket signal (PIN1) - on the parallel port. The sprocket signal is also referred to as the Data Strobe Output.
    The required method is as follows:
    1. Lower the sprocket signal on PIN1
    2. Send the data (Pins2-9) and wait
    3. Raise the sprocket signal and wait.
    4. Repeat.
    I am looking for a method to control the data on LPT1 pins 2-9 and then be able to toggle PIN1 - Strobe signal - without the data falling from the other pins. What I have found is that whenever the state is changed on the strobe - the data that was written to Pin2-9 falls to zero. This will not work for my application - the strobe tells the hardware device that the data is ready. If it falls to zero when I toggle the strobe - that will not work.
    Regards,
    Guy

    Hello Adam,
    I am familiar with both references.  If you look more closely at the library reference - it allows me to communicate using VISA across the parallel port pins 2-9.  It does not permit direct communication to pin1 (the strobe signal) - property nodes don't allow the strobe to be refereced either (similar to control lines/signals for COM ports).
    Worse, I have also located examples using OUT PORT that does enable pin1 to be toggled.  The problem is, when those VIs are used, the data falls from the data pins when the strobe signal is written, even if its value is not changed.  For example, if the strobe is already high, if another high value is passed, the data falls from the data lines.  The other issue, when using VISA, as soon as the data is writen, the strobe signal automatically goes high even though I need a wait before setting the strobe high.  This is in complete contradiction to the second article you referenced which clearly discusses writing data to pins2-9 then taking the strobe high to indicate to the printer that new data is available.  It must be possible since this is the typical handshake.
    I am still looking for a more complete answer/solution.
    Regards,
    Guy

  • Aging report and Control account value not matching

    Hi All
    The value what i am getting from   Vendor liabilities aging and Control account is not matching  for the same dates, all my parameters or selection criteria are same
    Same report if i am taking for the current date it giving correctly,
    If i am trying for a previous day the problem is happening
    How can i solve this issue

    Hi,
    Please check if the transactions are done for different Control Accounts and both the account balances are included in the Aging Report.
    Also, check that ALL the customers/vendor groups are taken.
    Make sure that you are running the backdated aging with the checkbox as mentioned in the Note 800294.
    If still facing problems may be you can provide with more details as to what the control account balances and what is the Aging, difference.
    PS: Check if there is any manual journal entry is created in the control account?
    Kind Regards,
    Jitin
    SAP Business One Forum Team

  • Can i connect my iMac to a mac mini (wirelessly) and control the mac mini display on my TV?

    Can i connect my iMac to a mac mini (wirelessly) and control the mac mini display on my TV?

    Look up "screen sharing" in help
    You can control your mini (which I am assuming you are hooking to your TV) complete from your iMac.
    After you set up screen sharing, you can go to the finder, under the "go" menu choose "Connect to server" and then browse.  Choose your mac mini's name, and look for the "Screen Sharing" button.
    Choose Apple menu > System Preferences, and then click Sharing.
    Select the Screen Sharing checkbox.
    To specify who can share your screen, select one of the following:
    All users:
    Select this if you want to allow any user with a user account on your computer to share your screen.
    Only these users:
    Select this if you want to restrict screen sharing to specific users.Click Add at the bottom of the Users list and select a user from Users & Groups (accounts you have set up in Users & Groups preferences), Network Users (users on your network), or your Address Book. Or click New Person and enter a name and password to create a sharing account. Then select that user from the list, and then click Select.
    Click Computer Settings and set the following options:
    Anyone may request permission to control screen:
    Select this to allow anyone on your network to request to share your screen.
    VNC viewers may control screen with password:
    Select this and enter a password that VNC viewer applications can enter in order to control your screen.It’s recommended that you not set a password if you only share this computer’s screen using the built-in screen sharing viewer in Mac OS X.

  • MacBook Pro 2.3 os 10.6.8 control-C and Control-v don't work

    On MacBook Pro 2.3 OS 10.6.8, control-c and control-v don't work in any app Please help

    If you mean copy and paste, that's Command c and Command v, not control key.

  • How to create parameter and control file like filename + date

    Hello there
    I am trying to create parameter and control file with following command
    in SQLPLUS
    create pfile='/u03/oradata/WEBDB/backup/initWEBDB.ora' from spfile;
    In RMAN
    copy current controlfile to '/u03/oradata/WEBDB/backup/cf_longterm.cpy';
    how can I put date at the end of filename like
    initWEBDB8jan06.ora and cf_longterm8jan06.cpy
    Thanks in advance
    Lionel

    ASM is reliable but a smart DBA is very careful. If ASM is doing mirroring this is like RAID doing mirroring. What happens if you accidentally delete one copy ... the other one disappears instantly. Not a good idea.
    With respect to redo logs you need a minimum of three groups, two members, and one thread per instance. So a 2 node cluster should, at a minimum have 12 physical files.
    Not mirroring the redo logs, assuming multiple members, is not as critical.

Maybe you are looking for

  • Can't see the sales area in XD01( in all sales area) even  OVXG has defined.

    Hi, In XD01 while creating cusotmer master in all sales area system is not showing  7800-90-01( sales area)even though it is defined in OVXG. This is the  reason why may be am not able to create customer in 7800-90-01sales area. here is the screen sh

  • How to  get the profile object in simple java class  (Property accessor)

    Hi All, Please guide me how to get the profile object in simple java class (Property accessor) which is extending the RepositoryPropertyDescriptor. I have one requirement where i need the profile object i.e i have store id which is tied to profile .s

  • Vault Doesn't Seem to Update

    Am having a problem updating my vault. I have Aperture 3.0.1 and a single 25GB library. Vault has always worked in v 2.1.4. Since upgrading, I've not had any crashes and things seem to be working pretty well. However, my vault shows it needs to be up

  • Backing up crashed HDD

    My mid 2011 MacBook Pro's Hard drive recently became corrupted, I cannot verify or repair the disk, I am also unable to clone it to an external drive. When attempting to repair the disk (in Disk Utility) all goes well, until the repair is moments awa

  • How can i combine the JTabbedPane with JSplitPane?

    there is an example in Notepad++,where when 2 or more tabs are open,we can right-click the tab and choose the "go to another view" command.it's so good that we can check 2 files in two views. so i wanna know how to implement this function in java?and