top - download
⟦d979ed5be⟧ Wang Wps File
Length: 8636 (0x21bc)
Types: Wang Wps File
Notes: Spelunked
Names: »~ORPHAN08.00«
Derivation
└─⟦62d458081⟧ Bits:30006246 8" Wang WCS floppy, CR 0154A
└─ ⟦this⟧ »~ORPHAN08.00«
WangText
…00……00……00……00……08……02……08…
…07……0e……07……02……07…
…07… …07……05……07……06……06……08……06……09……86…1 …02… …02…
…02…PC/ICD/001
…02…851221…02…
PROTOCOL INTERFACE CONTROL DOCUMENT
…02……02… PC
1 SUMMARY .....................................
2 MISSIONAND OBJECTIVES ......................
3 ENVIRONMENTAL FACTORS .......................
3.1 EXTERNAL FACTORS .........................
3.2 INTERNAL ORGANIZATION ....................
4 STRATEGY ...................................
4.1 BUSINESS AREAS ...........................
4.2 SYSTEMS/PRODUCTS .........................
4.3 MARKETING AND SALES ......................
4.4 COST EFFECTIVENESS .......................
4.5 WORKING CLMATE ..........................
5 3 YEAR BUDGET ESTIMATES .....................
5.1 ASSUMPTIONS ..............................
5.2 BUDGET SUMMARY ...........................
6 GOAL AND ACTION PROGRAM ....................
6.1 MARKETING PLAN ...........................
6.2 STANDARDIZATION PROGRAM ..................
6.3 WORKING TOOLS AND ENVIRONMENT ............
7 1 YEAR BUDGET ...............................
7.1 BUDGET SUMMAR ...........................
7.1.1 Sales ................................
7.1.2 Standard Cost of Sales ...............
7.1.3 Variance from Standards ..............
7.1.4 Other Costs ..........................
7.1.5 Inventory Adjustment .................
7.1.6 Other Costs ..........................
7.1.7 Gross Profit Before R&D ..............
7.1.8 R & D Costs ..........................
7.1.9 Marketing Costs .....................
7.1.10 Net A & H ...........................
7.1.11 Charges .............................
7.1.12 Operating Profit ....................
7.1.13 Interest ............................
7.1.14 Non OperatingIncome ................
7.1.15 Operating Income ....................
7.1.16 Fee .................................
7.1.17 Pretax Income .......................
7.1.18 Taxes ...............................
7.1.9 Net Income ..........................
7.2 CASH FLOW SUMMARY ........................
7.3 BACKLOG AND NEW ORDERS BUDGET ............
7.4 PROFIT AND LOSS PROJECT BUDGETS ..........
7.5 MANPOWER BUDGET .........................
7.6 INVESTMENT BUDGET ........................
…86…1 …02… …02… …02… …02…
7̲ ̲ ̲E̲X̲A̲M̲P̲L̲E̲S̲ ̲O̲N̲ ̲M̲E̲S̲S̲A̲G̲E̲S̲ ̲T̲R̲A̲N̲S̲A̲C̲T̲I̲O̲N̲S̲ ̲S̲E̲Q̲U̲E̲N̲C̲E̲S̲
The examples in the following section is decribed on
the overall PC-CCIS Link Protocol Handling. The description
is not based onlevels but on logical and physical components.
The examples will cover the normal message and the
error handling. Error recovery is not shown as it is
an end user responsibility.
The examples shown will be:
7.1 LINE CONNECTION
7.2 LINE DISCNNECTION
7.3 MESSAGE TRANMISSION CCIS TO PC
7.4 MESSAGES TRANSMISSION PC TO CCIS
7.5 BURST MESSAGE HANDLING
7.6 OVERRIDE MESSAGE TRANSMISSION
7.1 L̲I̲N̲E̲ ̲C̲O̲N̲N̲E̲C̲T̲I̲O̲N̲
This example is divided into the following four subexamples:
1. Succesfl line connection
with disconnection of line first.
2. Successful line connection
without disconnection of line first.
3. Unsuccesful line connection.
Wrong password.
4. Unsuccessful line connection.
DINDAC not loaded.…86…1 …02… …02… …02… …02…
…86…1 …02… …02… …02…
…02… …86…1
…02… …02… …02… …02…
…86…1 …02… …02… …02… …02…
…86…1 …02… …02… …02… …02… …02…
7.2 L̲I̲N̲E̲ ̲D̲I̲S̲C̲O̲N̲N̲E̲C̲T̲I̲O̲N̲
The two ways of disconnection of the line is the same
for both PC and CCIS so the two ways is described from
only one side.
This example is divided into te following two subexamples:
1. Disconnection with response.
2. Disconnection without response.…86…1 …02… …02…
…02… …02… …02… …86…1
…02… …02… …02… …02… …02…
7.3 M̲E̲S̲S̲A̲G̲E̲S̲ ̲T̲R̲A̲N̲S̲M̲I̲S̲S̲I̲O̲N̲ ̲C̲C̲I̲S̲ ̲T̲O̲ ̲P̲C̲
This example is divided into the following subexamples:
1. Several Segmented Message
CCIS and PC has empty queues.
2. Message Transmittd to PC,
PC has a message on queue and CCIS does not.
3. Message transmitted to PC, CCIS has message on
queue and PC does not.
4. Message transmitted to PC, CCIS has message on
queue PC has message on queue, both with the same
precedence
5.Message transmitted to PC, CCIS has message on queue,
PC has message on queue, PC's message has higher precedence.
6. Message transmitted to PC CCIS has message on queue,
PC has message on queue, CCIS's message has higher
precedence.…86…1 …02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02…
…02… …86…1
…02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02… …02…
…86…1 …02…
…02… …02… …02… …02…
…86…1 …02… …02… …02… …02… …02…
7.4 M̲E̲S̲S̲A̲G̲E̲S̲ ̲T̲R̲A̲N̲S̲M̲I̲S̲S̲I̲O̲N̲ ̲P̲C̲ ̲T̲O̲ ̲C̲C̲I̲S̲
This example is divided into the following subexamples:
1. Several Segmented Message
CCIS and PC has empty queues.
2. Message transmittd to PC, CCIS has message on queue
and PC does not.
3. Message Transmitted to PC,
PC has a message on queue and CCIS does not.
4. Message transmitted to CCIS, PC has message on
queue, CCIS has message on queue, both with the
same precedence
5. Message transmitted to CCIS, PC has message on
queue, CCIS has message on queue, CCIS's message
has higher precedence.
6. Message transmitted to CCIS, CCIS has message on
queue, PC has message on queue, PC's message has
higher precedence.…86…1 …02… …02… …02… …02…
…02… …86…1 …02… …02…
…02… …02… …02… …86…1
…02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02…
…02… …86…1
…02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02… …02…
7.5 B̲U̲R̲S̲T̲ ̲M̲E̲S̲S̲A̲G̲E̲ ̲H̲A̲N̲D̲L̲I̲N̲G̲
This example is divided into the following subexamples:
1. Message is transmitted to CCIS, PC and CCIS has
empty queues. PC wants to discontinue tranmission
of the message.
2. Message is transmitted to CCIS, PC and CCIS has
empty queues. PC wants to discontinue transmission
of the message.
3. Message transmitted to CCIS. PC has higher precedence
message on queue to transmit next.
4. Messae transmitted to PC. CCIS has higher precedence
message on queue to transmit next.
5. Message transmitted to CCIS. CCIS has higher precedence
message on queue to transmit next.
6. Message transmitted to PC. PC has higher precedence
message on qeue to transmit next.
6. Message transmitted to PC. PC and CCIS has messages
on queue with same higher precedence message to
transmit next.
7. Message transmitted to CCIS. PC and CCIS has messages
on queue with same higher precedence message totransmit
next.…86…1 …02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02…
…02… …86…1 …02… …02…
…02… …02… …02…
…86…1 …02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02…
…02… …86…1 …02… …02… …02…
…02… …02… …86…1
…02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02… …02…
7.6 O̲V̲E̲R̲R̲I̲D̲E̲ ̲M̲E̲S̲S̲A̲G̲E̲ ̲H̲A̲N̲D̲L̲I̲N̲G̲
This example is divided into the following two subexamples:
1. Message is transmitted to CCIS. CCIS wants to override
the message and transmit a hgher precedence message.
2. Message is transmitted to PC. PC wants to override
the message and transmit a higher precedence message.…86…1
…02… …02… …02… …02… …02…
…86…1 …02… …02… …02… …02… …02…