Upload
sri-sai
View
219
Download
0
Embed Size (px)
Citation preview
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
1/61
Comprehensive Identification
from
FrEquency ResponsesAn interactive facility for
system identification and verification
CIFER WINTEL
INSTALLATION GUIDE AND
RELEASE NOTES(Version 4.1.00)
Comprehensive Identification
from
FrEquency ResponsesAn interactive facility for
system identification and verification
CIFER WINTEL
INSTALLATION GUIDE AND
RELEASE NOTES(Version 4.1.00)
October, 2004 CasalCorp, USA
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
2/61
Authors: Paul W. Salchak (CasalCorp) with major contributions and revisions by Dexter L. Hermstad
(University of California) and Revision: 01 November, 2004. Original document by Gary Villere.with
revisions by Lawrence E. Pierce (Raytheon ITSS).
ii
CASALCORP SOFTWARE LICENSING AGREEMENT
Comprehensive Identification from FrEquency Responses (CIFER)
RECITAL: CasalCorp HAS ACQUIRED FOR DISTRIBUTION, SUPPORT, AND REUSE UNIQUE ANALYSISSOFTWARE FOR MODELING COMPLEX SYSTEM BEHAVIOR BASED UPON LIVE OR RECORDED DATA USING
A TECHNIQUE CALLED SYSTEM IDENTIFICATION (SOFTWARE).
IMPORTANT READ CAREFULLY: This End-User License Agreement (EULA) is a legal agreement between you(either an individual or a single entity) and CasalCorp for the above identified software and associated documentation(Software). By installing, copying, or otherwise using Software, you agree to be bound by the terms of this EULA. If youdo not agree to the terms of this EULA, do not install or use Software. CasalCorp. (LICENSOR) IS WILLING TO
LICENSE SOFTWARE TO YOU (LICENSEE) ONLY IF YOU ACCEPT ALL OF THE TERMS IN THE LICENSEAGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS, LICENSOR WILL NOT LICENSE THIS SOFTWARE TOYOU, AND IN THAT CASE YOU SHOULD RETURN THIS PRODUCT PROMPTLY TO THE PLACE OF PURCHASEFOR A FULL REFUND.
OWNERSHIP OF THE SOFTWARE: The Licensor software program identified above and the accompanying
documentation are owned by Licensor and are protected by United States copyright laws, by laws of other nations, and byinternational treaties. Licensor owns rights to all copyright, trade secret, patent, and other proprietary rights in the Software.This License gives you no rights to such content. In addition, under no circumstances is reverse engineering of the softwareprogram, algorithms, or features/functions in whole or in part allowed.
LICENSE: The Licensee is hereby granted a non-exclusive license to use the Software for up to and including the number of
seats specified in the accompanying ordering agreement.
Licensee may not: (a) permit other individuals to use the Software except under the terms listed herein; (b) use or permit others
to use the Software for any commercial purpose; (c) modify, translate, reverse engineer, decompile, disassemble (except to theextent applicable laws specifically prohibit such restriction), or create derivative work based on the Software; (d) copy theSoftware (except) for back-up purposes); (e) rent, lease, transfer or otherwise transfer rights to the Software; or (f) remove anycopyright, trademark or other proprietary notices or labels on the Software.
DISCLAIMER OF WARRANTY: The software is licensed on an AS IS basis, without warranty of any kind, including
without limitation the warranties of merchantability, fitness for a particular purpose and non-infringement. The entire risk asto the quality and performance of the Software is borne by Licensee. Should the Software prove defective, Licensee and notCasalCorp assumes the entire cost of any service and repair. In addition, the security mechanism implemented by the Softwarehas inherent limitations, and Licensee must determine that the Software sufficiently meets Licensees requirements. This
disclaimer of warranty constitutes an essential part of the agreement. SOME STATES DO NOT ALLOW EXCLUSIONS OFAN IMPLIED WARRANTY, SO THIS DISCLAIMER MAY NOT APPLY TO LICENSEE. YOU MAY HAVE OTHERLEGAL RIGHTS THAT VARY FROM STATE TO STATE OR BY JURISDICTION.
LIMITATION OF LIABILITY: UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, TORT,CONTRACT, OR OTHERWISE, SHALL CASALCORP OR ITS SUPPLIERS BE LIABLE TO LICENSEE OR ANYOTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANYCHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE,COMPUTER FAILURE OR MALFUNCTION OR ANY AND ALL OTHER COMMERICAL DAMAGES OR LOSSES. INNO EVENT WILL CASALCORP BE LIABLE FOR ANY DAMAGES, EVEN IF CASALCORP SHALL HAVE BEENINFORMED OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY OTHER PARTY. THE
LIMITATION OF LIABILITY SHALL NOT APPLY FOR DEATH OR PERSONAL INJURY TO THE EXTENTAPPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME STATES DO NOT ALLOW THE
EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION ANDEXCLUSION MAY NOT APPLY TO LICENSEE.
TERMINATION: This License will terminate automatically if Licensee fails to comply with the limitations described above.
On termination, Licensee must return all copies of the Software.
EXPORT CONTROLS: None of the Software or underlying information or technology may be shipped, transferred, or
exported into any country prohibited by the United States Export Administration Act or used for any purpose prohibited by theAct.
U.S. GOVERNMENT RESTRICTED RIGHTS: Use, duplication or disclosure by the Government is subject to restrictionsset forth in subparagraphs (a) through (d) of the Commercial Computer-Restricted Rights clause at FAR 52.227-19 when
applicable, or in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
MISCELLANEOUS: This Agreement represents the complete agreement concerning this license between the parties and
supersedes all prior agreements and representations between them. It may be amended only by a writing executed by bothparties. If any provision of this Agreement is held to be unenforceable for any reason, such provision shall be reformed only to
the extent necessary to make it enforceable.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
3/61
Authors: Paul W. Salchak (CasalCorp) with major contributions and revisions by Dexter L. Hermstad
(University of California) and Revision: 01 November, 2004. Original document by Gary Villere.with
revisions by Lawrence E. Pierce (Raytheon ITSS).
iii
CIFER/WINTEL INSTALLATION GUIDE AND RELEASE NOTES
1. Introduction 1
2. System Requirements 5
3. Installation 5
4. Uninstalling CIFER 8
5. The CIFER Environment and Directory Structure 10
6. Running CIFER 24
7. Using CIFER: Setting Up Databases and SIFDEF files 30
8. Multiple-User CIFER Systems 35
Appendix A: Manually Uninstalling CIFER 38 Appendix B: Installing CIFER Patches 40 Appendix C: Installing CIFER Training Database 40 Appendix D: Validating the CIFER Installation 41 Appendix E: Installing CIFER Extras for WINTEL Versions 46 Appendix F: CIFER Run-Time Licensing on a WINTEL Platform 50 Appendix G: Implementing a CIFER READMIS Library 51
Appendix H: Working with CIFER Graphics Output 56
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
4/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-1
CIFER / WINTEL Installation Guide and Release Notes
Document Terms and Conditions
This material is restricted to your Company or Agency use only under the terms of
purchase, and is for use only at your site. It may be installed for execution on one systemat a time for individual or group presentation. Discs and supporting documents may becopied only upon prior approval. This restriction includes prohibition from use by
contractors or outside agents unless their sole use will be at your site.
1. Introduction
This document describes the procedures necessary to install/uninstall CIFER on a WindowsWINTEL (NT, W2K, XP) platform and to create an end-user database. It also contains
information on minimum system requirements, directory structures, and procedures which youmay use to verify that your CIFER package has been correctly installed.
CIFER is the worlds premier System Identification solution. The CIFER system, shown
in Figure 1-1, is a high-performance interactive and complete software facility used for a widerange of systems synthesis, optimization, and validation. While the software suite can beexecuted as a stand-alone tool, interface provisions are made for common external data sets oninput (e.g., Data Acquisition standards, MATLAB) and plotting/reporting tools on output. Thecapability also exists for individual users to integrate to their custom or proprietary data setsthrough a published intermediate format and templatecalled READMIS. This supports ASCII,
telemetry-encoded, or even binary level data samples.
FRESPID - Frequency Response
Identification
MISOSA - Multi-Input
Conditioning
COMPOSITE - Multi-Window
Averaging
Time HistoryData
Frequency Response Identification
(FRESPID)
Multi-Input Conditioning
(MISOSA)
Window Combination
(COMPOSITE)
Derivative Identification
(DERIVID)
State Space Verification
(VERIFY)
Frequency Response Fitting
(NAVFIT)
Frequency Response
Plot and Report Utilities
Model Matrices
Comprehensive Identification from FrEquency Responses (CIFER)
DERIVID- Generalized StabilityDerivative
Identification (from frequency responses)
VERIFY-State Space Model Verification
NAVFIT - Calculates Low-Order Transfer
Function (from hi-order transfer function or
frequency response data)
Screen Subsystem - User Interface
Utilities Suite - Special functions, plotting,
conditioning, etc.
DBSubsystem - Raw, Intermediate,
Processed data and indexing
FRESPID - Frequency Response
Identification
MISOSA - Multi-Input
Conditioning
COMPOSITE - Multi-Window
Averaging
Time HistoryData
Frequency Response Identification
(FRESPID)
Multi-Input Conditioning
(MISOSA)
Window Combination
(COMPOSITE)
Derivative Identification
(DERIVID)
State Space Verification
(VERIFY)
Frequency Response Fitting
(NAVFIT)
Frequency Response
Plot and Report Utilities
Model Matrices
Comprehensive Identification from FrEquency Responses (CIFER)
Time HistoryData
Frequency Response Identification
(FRESPID)
Multi-Input Conditioning
(MISOSA)
Window Combination
(COMPOSITE)
Derivative Identification
(DERIVID)
State Space Verification
(VERIFY)
Frequency Response Fitting
(NAVFIT)
Frequency Response
Plot and Report Utilities
Model Matrices
Comprehensive Identification from FrEquency Responses (CIFER)
DERIVID- Generalized StabilityDerivative
Identification (from frequency responses)
VERIFY-State Space Model Verification
NAVFIT - Calculates Low-Order Transfer
Function (from hi-order transfer function or
frequency response data)
Screen Subsystem - User Interface
Utilities Suite - Special functions, plotting,
conditioning, etc.
DBSubsystem - Raw, Intermediate,
Processed data and indexing
Figure1-1:
The Top-Level
C I F E R
Product
Organization
In the past, CIFERs primary use has been for high-performance aerodynamic
systems/controls modeling, analysis, test, and optimization. It has also been uniquely proven forhandling qualities and related analyses; particularly for frequency-domain intensive ADS-33referenced specification and testing. Vibration analysis; flutter analysis; wind tunnel and flight
test characterizations; and simulator development, validation, and optimization are just a few ofits other past and continuing uses. Other high value CIFER adaptations are not based on how it
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
5/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-2
has been used, though. Rather it is based on what CIFER does. For any measurable system
excitation/response set (time or fr equency domain), CI F ER
assesses th e f r equency content
and produces an accurate mathematical description of that systems complex dynamic
behaviors. With its strong basis in proven signal processing and analysis techniques, CIFERuses extend well beyond the flight/vehicle development and test regime.
Figure 1-2 depicts the overall CIFER process. This is an empirically based technique,operating on measured excitation data (continuous or pulse) and system responses. For ourpurposes the system/subsystem/component can be of any size or domain, so long as it can be
instrumented to collect the needed signal data.
Fi gure 1-2: CIFER
is based not only on sound science, but on sound engineering
Other important aspects of our use of CIFERs processing features in our approach include:
Tools and results exercised and proven over 12 years of use; recognized as world best-
in-class for applications addressing real-world problems in real-world conditions
Significant relevant data and experience can be supplemented with minimal additional effortand cost to any future program(s)
Non-real-time and real-time analysis directly supported
Directly relevant identification algorithms are highly exercised and tuned
Flexible and interactive definition of identification model structures
Non-Parametric Modeling directly supported no a priori assumptions are needed
about the system order, structure, or composition Fully automated weighting function selection based on frequency-response accuracy
Built-in and reliable parameter accuracy metrics provides added confidence in results overspectral region of interest and importance
Integrated procedure for identification and model structure determination
Time-domain verification of models, including identification of offsets and biases
Available NOW for most current OSs, including WINTEL (NT, W2K, XP); Unix (IRIX,Solaris); and MAC (OS 9 and OS X) [MAC installation requires additional 3 rd party software]
Frequency
Inputs
(Stimulus/Events)
Raw Response
Collection
Data Compatibility
& State Estimation
Multi-variable
Spectral Analysis
Conditioned
Frequency-Responses
&
Partial Coherences
Transfer-Function
Modeling
Identification
Algorithm
Freq.-Response
IdentificationCriterion
Mathematical Model
Dynamic Behavior Derivatives
and Time Delays
Initial
Values
Dissimilar Reference
Data not used in
IdentificationVerification
Sensitivity Analysis
&
Model Structure
Determination
ANALYSIS APPLICATION (interactive, semi-automated, automated)
+
-
TheCI FERThe CI F ER
Frequency-domainFrequency-domain
system identificationsystem identification
processprocess
Frequency
Inputs
(Stimulus/Events)
Raw Response
Collection
Data Compatibility
& State Estimation
Multi-variable
Spectral Analysis
Conditioned
Frequency-Responses
&
Partial Coherences
Transfer-Function
Modeling
Identification
Algorithm
Freq.-Response
IdentificationCriterion
Mathematical Model
Dynamic Behavior Derivatives
and Time Delays
Initial
Values
Dissimilar Reference
Data not used in
IdentificationVerification
Sensitivity Analysis
&
Model Structure
Determination
ANALYSIS APPLICATION (interactive, semi-automated, automated)
+
-
TheCI FERThe CI F ER
Frequency-domainFrequency-domain
system identificationsystem identification
processprocess
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
6/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-3
1 .1 T y p e s o f C IF E R In s t a l l at i o n s
There are two versions of CIFER available for the WINTEL platform.
The basic CIFER package contains all of the functionality needed to perform frequency
response analysis of multiple input dynamical systems, and to produce transfer function
models of those systems.
The primary CIFER components included in this installation are FRESPID, MISOSA,COMPOSITE, and NAVFIT. In addition to these modules, the package contains anextensive suite of utilities which provide various database maintenance and data input/outputcapabilities.
The full CIFER Pro installation contains all of the functionality of basic CIFER, withthe addition of state-space modeling capability as provided by the DERIVID and VERIFYmodules. The Pro package also includes an expanded suite of utilities, which provideadditional ancillary capabilities specifically required by the DERIVID and VERIFY
components.
1 .2 W h a t W i l l b e I n s t a ll e d
Regardless of which CIFER version1 you have purchased, the following components willbe installed on your system:
CIFER. The CIFER package itself is installed into a directory tree created explicitly forthe CIFER executables, scripts, databases and other miscellaneous components. Also, inaddition to the usual registry entries made by application installers, two system-wideenvironment variables will be created during the installation process. Initially, these variables(cifroot and cifhome) will both point to the root of the CIFER directory tree; usuallyCIFER_PRO. A more detailed description of the contents of these directories and purpose ofthese environment variables is provided in Section 5 of this IGRN.
Mortice Kern Systems (MKS) Toolkit COE (Client Operating Environment). CIFERwas ported to the WINTEL operating systems from the Unix platform, and many of its
modules and scripts require elements of the Unix API. For this reason CIFER relies on theMKS Toolkit COE (a.k.a. NuTCRACKER COE). Your CIFER license includes an end-userlicense for the MKS Toolkit COE, which is automatically installed on your system by theCIFER installer. (If your system already has MKS Toolkit installed, then the CIFERinstaller will only update your installation as required for CIFER support.)
If you already use NuTCRACKER, or if, for any other reason, you have files named
profile.ksh and/or environ.ksh in your logon directory (i.e.,
%HOMEDRIVE%%HOMEPATH%) you should rename them. The CIFER installer mustcreate its own versions of these files in your directory. After the installation is complete, youcan merge them as necessary (see IGRN section 4.4 for information on this process). Theinstaller will warn you if it detects these files in your logon directory and you will be given achance to terminate the installation.
PLEASE NOTE THAT in addition to support for CIFER, with the MKS Toolkit COE we
provide a fully operational Unix emulation that can be accessed via the CIFER shell
shortcut, the MS-DOS command shell, or the Run command in the Start menu. In addition
1 Indeed, nothing in the remaining sections of these notes depends upon which version of CIFER is
being installed, and for that reason, the distinction between the two packages will be dropped at this
point. In the remainder of the document CIFER and CIFER_Pro will both be referred to as CIFER.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
7/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-4
to the Korn shell, you will have access to many of the common Unix commands and utilities(e.g., vi, grep, sed, awk, perl, etc.).
After reading and acknowledging acceptance of the license agreement, you will be asked toenter your product serial number (prior to Version_4.1.00 only). Installation cannot proceedwithout a properly entered license key. Run-Time Keys will also be required to execute
CIFER functionality following a successful installation. These are described in a latersection of this Notes manual.
You will be given the opportunity to select a destination folder for the CIFER software. Ifyou elect to change the default location, please be careful to choose a path which does notcontain embedded blanks. (Actually, you will be prohibited from doing so!)
When you are asked to enter a destination folder for the NuTCRACKER Client OperatingEnvironment (COE), this will pertain to the location of that portion of the environment whichresides on the Installation Drive as shown in Table 1. You cannot change the location ofthe System Drive component of the operating environment. Also, there is no requirement
that CIFER and the NuTCRACKER COE reside on the same disk drive (or partition).
Please note that the installation of the NuTCRACKER COE can run for several minutes and
that no progress indicator is displayed for portions of the procedure. Allow ample time for itscompletion before proceeding.
On some earlier Windows XP systems, you may get a message that reads something likeThe ordinal xyzcould not be located. Dismiss such messages by clicking OK.
1 .3 W h a t w i l l n o t b e I n s t al l e d
SCO XVision Server. CIFER relies on the X Window system for display of on-screen graphics. As a result, it is necessary for a local X Window server to be
installed on your system. The SCO XVision X Window server can be installed fromyour 2
ndNT CIFER distribution CD. If your system already has a local X server,
such as cygwin-X, you may wish to use that software instead; CasalCorp cannotguarantee the outcome in all such cases.
TeX. Some of the ancillary utilities that support DERIVID and VERIFY produceoutput which is designed to be typeset using the TeX typesetting program developedat Stanford University by Donald Knuth. MiKTeX is the WINTEL version of this
utility set, and as of Version 4.1.00 is included as a part of the CIFER software
system. Upon installation, this software will be deposited in the Extras/ subdirectoryof the CIFER Home Directory (usually CIFER_Pro). This installation must beseparately initiated, however.
1 .4 A d m i n i s t r a t i v e P r i v i le g e s R e q u i r ed f o r In s t a l l a ti o n
Because several of the CIFER support components install Windows services, it will be
necessary to have administrative privilege to perform this installation.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
8/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-5
2. System Requirements
2 .1 O p e ra t in g S y s t em
CIFER and its supporting components should run on any NT4, W2K, or XP WINTELworkstation or server system. CIFER was initially developed on an NT workstation running
Service Pack 3.
No attempt has been made to test CIFER on Windows 95, 98, or ME and no representationis made as to CIFERs suitability for use on such systems.
2 .2 P r o c es s o r a n d M em o r y
CIFER will execute efficiently on any current-generation processor (Pentium or later). Atleast 64 MB of random access memory (RAM) is recommended for systems running the CIFER
package. 256MB or more is recommended for optimum performance, particularly if processing
larger data sets.
2 .3 D is k S t o r ag e Disk requirements vary greatly, and are primarily driven by the size of the data sets that will
be collected and processed using the CIFER software system. It is left to the user and their
system administration to establish appropriate capacity for their particular requirements.
If all defaults and installation options are exercised, the CIFER software system storagerequirements include:
CIFER_Pro, with all documentation, datasets: 435 MB
NutCracker Operating Environment: 30 MB
XVision Server and Utilities: 20 MB
MiKTex (all possible options with full installation; not required for normal use): 640 MB
Ghostview (PostScript viewer and report conditioning): 4 MB
Browser Interactive Training Modules (Intro to SYSID, Case Studies, Labs): 760 MB
3. Installation
CIFER for the WINTEL platform is distributed on an autorun CD-ROM; installation
should be automatically initiated when the CD is inserted into the CD-ROM drive. If the setupprogram does not automatically execute, you may manually initiate execution by double-clickingthe icon for the setup.exe program which is located in the root directory of the CD. Once initiated,
the setup program will guide you through a relatively standard installation sequence, most ofwhich will not be discussed in detail here. The following bullet items cover the salient points inapproximately the order in which they will be encountered during installation:
Important note: if there is already a version of CIFER installed on your computer system,
you should do the following prior to installing the newer version: make a backup copy ofyour CIFER_Pro folder (note: it isprobably best not to use CIFER if you backup to a folderon the same system), and then completely uninstall the older version of CIFER (please refer
to section 3 for detailed uninstallation instructions). NOTE that it is not necessary touninstall/reinstall XVision if the version on your system is current (compare version numberof installed XVision with version number on XVision CD that came with your new version of
CIFER). To determine the version number of your installed XVision, make sure that the
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
9/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-6
XVision server is running (check for green XV icon in Windows status bar); if it is notrunning, start it via Start->Programs->Vision->XVisionServer. Next, right-click on the green
XV icon in the Windows status bar; in the pop-up menu, select Help->AboutXVision.Finally, observe the XVision version number that appears in the About XVision window.
The setup program cannotbe run from a network drive. If you do not have a local CD-ROM
drive on your system, you may copy (via a network connection!) all of the files from the CD-ROM to a folder on a local hard drive. The top-level Setup.exe program may then belaunched directly from the local disk by double clicking.
If you already use NuTCRACKER, or if, for any other reason, you have files named
profile.ksh and/or environ.ksh in your logon directory (i.e.,
%HOMEDRIVE%%HOMEPATH%) you should rename them. The CIFER installer mustcreate its own versions of these files in your directory. After the installation is complete, you
can merge them as necessary (see section 5.4 below for information on this process). Theinstaller will warn you if it detects these files in your logon directory and you will be given achance to terminate the installation.
In some rare situations, the installer may not be able to copy the profile and environment files
to your logon directory. In these cases a warning will be issued during installation, and you
can then manually rectify this failure after the installation is complete. To correct theproblem simply copy2 the profile.ksh and environ.ksh files, which you will find in
the folder%cifroot%\scripts\, to your logon directory.
You will be given the opportunity to select a destination folder for the CIFER software. If
you elect to change the default location, please be careful to choose a path which does not
contain embedded blanks.3
(Actually, you will be prohibited from doing so!)
When you are asked to enter a destination folder for the NuTCRACKER Client Operating
Environment (COE), this will pertain to the location of that portion of the environment whichresides on the Installation Drive. You cannot change the location of the System Drivecomponent of the operating environment. Also, there is no requirement that CIFER and the
NuTCRACKER COE reside on the same disk drive (or partition).
Please note that the installation of the NuTCRACKER COE is lengthy (running for severalminutes) and that no progress indicator is displayed.
The NuTCRACKER COE is a shared resource; it may support multiple end-user applications
on a given platform. If your machine already has a NuTCRACKER COE installed, the
installer will only add and/or update those components necessary to support the CIFERpackage.
On some older Windows XP systems, you may get a message that reads something like The
ordinal xyzcould not be located. Dismiss such messages by clicking OK.
XVISION INSTALLATION and SETUP
CIFER requires a local X server for on-screen display of graphical output. The SCO
XVision server is suitable and can be installed from your 2nd
distribution CD (please read thesubsequent bullets for details). However, if your machine already has a local X server installed,you may wish not to install the SCO server. If you elect not to install the SCO server, you will be
responsible for insuring that CIFER can communicate with your server.
2 Do not move them! The originals must remain in the %cifroot%\scripts directory.3 CIFER originated from Unix-based software, which does not readily tolerate embedded blanks in
directory paths.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
10/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-7
To install XVision, remove the 1st CD from the drive and insert the 2nd CD (labeled
XVision). If the XVision installer does not appear after a few moments, double-click onthe My Computer desktop icon and then double-click on your CD-drive icon. If the XVision
installer still does not appear you will see a listing of files on the CD; double-click on theinstall file to invoke the XVision installer.
The XVision installer will ask what type of installation you wish to perform. A "Typical"installation is strongly recommended.
For some versions of the SCO XVision server, installation can run for several minutes.
During this time, you may not see a progress indicator and the installer may seem to
disappear after updating the registry and telling you it is checking directory structure; pleasebe patient and allow the installation to complete. When the installation is complete, you will
be notified via a small dialog box (which will also ask if you wish to restart the computer; in
order to avoid possible confusion, please choose No).
After completing the CIFER installation and XVision installation it will be necessary toreboot your machine before attempting to use the software. In order to avoid possible confusion,
please do the following before initiating a restart: close any windows (especially windows that are
exploring or browsing the CIFER CD) and then remove the CD from the drive.In order for CIFER to be able to communicate with the XVision server, the TCP-Unix
transport protocol must be enabled. You may check that this is the case by launching the VisionCommunications applet from the Control Panel (Figure 3-1a). Then select the Transports taband look for the TCP-Unix transport in the list box. If it is not enabled, select it in the list and
click on the "Properties" button. In the property sheet (Figure 3-1b), select the "Enable thistransport" radio button, then click "Apply". Finally, close the "Vision Communications" panel byclicking "OK". Note: For older WINTEL installations (e.g., Windows 2000) this procedure may causethe process dbserv.exe to crash (click OK in the error dialog window); if this occurs, you will need to
logout (or possibly even restart) to restore proper XVision operation (and enable CIFER screen plotting).
Before attempting to generate any screen plots in CIFER, please make sure that the
XVision Server is running. If you do not see a green XV icon in the status bar (near theclock), then the XVision Server is not running. It can be invoked from the Start menu (Start -
> Programs -> Vision -> XVision Server); wait until the green XV icon appears in thestatus bar before commencing with screen plots. If you would like the XVision Server tostart when Windows starts, please refer to the next bullet.
F i g u r e 3 -1 a: V i s i o n C o m m u n i c a t i o n s A p p l e t Fi g u re 3 -1 b : Tra n sp o rt Pro p e rti e s Pa n e l
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
11/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-8
To setup the XVision Server to start when Windows starts, follow these steps: select Start ->
Settings -> Control Panel (on Windows XP select Start -> Control Panel and be sure to selectthe classic view); in the resulting window, double-click on the XVision Profiles icon; in the
resulting window, click on the Global Settings tab, and then mark Load XVision at WindowsStartup; then click Apply and OK. You will have to restart your PC and login again to verifythat the Server is properly activated (check for the green XV icon in the status bar after
restarting and logging in).
Please note that the first screen plot issued for any CIFER utility may take several secondsto appear. Subsequent screen plots (issued in the same session of the given CIFER utility)should appear more quickly.
The CIFER documentation files are available as Microsoft Word files and Adobe Portable
Document Format (PDF) files. The PDF files may be viewed and printed with the Adobe
Acrobat Reader, which is a free program, available from the Adobe web site. As aconvenience you will find a copy of the Adobe Acrobat Reader installer in an appropriatelylabeled folder. [For Version 4.1.00 or later, this will be found in the Extras subdirectory
under the main CIFER directory; usually CIFER_PRO/Extras. Prior to Version 4.1.00please use the separately distributed EXTRAS CD.]
4. Uninstalling CIFER
Before uninstalling CIFER, you should first BACKUP any data in the CIFER (orCIFER_Pro) folder. Specifically, you may want to backup the contents of the Data and Jobs sub-folders. To be really safe, you could backup the entire CIFER (or CIFER_Pro) folder to make
sure you capture everything (such as READMIS modules you developed, for example). If youbackup to a folder on the same system, it is probably best not to use CIFER in the name of thebackup folder.
CIFER may be uninstalled via the Add/Remove Programs applet in the Control Panel.Select Start -> Settings -> Control Panel, or on XP systems Start -> Control Panel; on Windows
XP systems be sure to select the classic view; in the Control Panel window, double click on theAdd/Remove Programs icon; in the resulting Add/Remove Programs window, click on theInstall/Uninstall tab (on XP or Windows 2000 systems click on Change or Remove Programs);select CIFER in the list of programs and then click on the Add/Remove button to initiate theuninstall (on Windows 2000 and Windows XP systems, click on the Remove button).
Please note, however, that the CIFER uninstaller will notremove the NuTCRACKER COEor the XVision server. Because these components are shared resources, they cannot be
automatically removed when CIFER is removed from your machine.
However, if you wish to remove NuTCRACKER and/or the XVision server software, youmay use the uninstallers provided for that purpose (using the aforementioned Add/Remove
procedure). But, before doing so, you should make certain that these components are not required
by other software on your system. In the case of the NuTCRACKER COE, this can beaccomplished by checking the Registered Applications list in the Information tab of the
NuTCRACKER Control Panel applets window (Figure 4-1). Unfortunately, there is nocorrespondingly simple method for determining the number of clients on your system that mayrequire the XVision server.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
12/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-9
Finally, to ensure proper uninstallation of the packages components, the software should beremoved in the order shown below:
CIFER
SCO XVision Eclipse (see NOTE below)
MKS Platform Components 7.x (or later)
NOTE: if you are uninstalling CIFER so that you can install a newer version of CIFER, itmay not be necessary to uninstall SCO XVision Eclipse (please refer to section 2 for details).
If you are uninstalling an older version of CIFER (e.g., 3.60r3 dated May 2000) then theseare the components you must remove (in the order shown):
CIFER
XVision
NuTCRACKER Unix Utilities Plug-in, Deluxe
NuTCRACKER Operating Environment Plug-in
Note: to ensure that the list of software components displayed by the Add/Remove applet isupdated, you may close and reopen the Add/Remove applet after uninstalling each component.
Note: after uninstalling XVision, you should check to make sure it is really gone (see the
previous note). If it is not gone, it may need to be uninstalled using the installation CD (you may
or may not see a window entitled Installation Media Not Found; if you see it, just hit its Cancelbutton). To uninstall from the CD, insert the CD that was used to install XVision. If a Setup
dialog appears, hit the Cancel button (and then confirm that you want to quit by hitting the Yesbutton). Then uninstall XVision (using the Add/Remove Programs control panel). If you cometo an XVision Setup window that has a Remove All button, click that button (and then click Yes
to confirm); on Windows 2000 and Windows XP systems please consult us if you encounter thissituation before making a choice. If you are asked whether to restart Windows, check the No
button and click Next. After a few moments you may remove the CD from the drive.
Fi g u re 4 -1 : N u TC R AC KER Ap p l e t
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
13/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-10
Note: during some uninstallations a dialog entitled Remove Shared File? may appear. Ifyou see this dialog, click the Yes To All button and then confirm by hitting the Yes button
(on Windows XP and Windows 2000, click the No To All button and confirm). At the end ofthe uninstallation you may see a message like Some elements could not be removed. The
procedure for removing such elements is described in the note (about doing a really clean
uninstall) below.
Note: during (or after) some uninstallations you may see a message The system cannot findthe file specified. Just click the OK button to dismiss such messages.
Note: after uninstalling all of the CIFER, XVision, and MKS (or NuTCRACKER)components you should restart the computer.
Note: for a really clean uninstall, you should also search for files and/or folders that did not
get uninstalled by the Add/Remove procedure and the restart. Such scouring will also increasethe odds of a successful reinstallation (or installation of a more recent CIFER product). Theseinstructions assume you did a Typical installation of CIFER to the C: disk. To initiate the
search, open the Find applet (Start -> Find -> Files or Folders). In the resulting window, select theName & Location tab. Specify C: in the Look In field. Make sure Include Subfolders is checked.Then enter a name (e.g., Vision) in the Named field and click Find Now. When the search is
completed, you may wish to expand the window and also expand the In Folder portion of the list.You can select files and folders in the leftmost column of the list, and drag-and-drop them intothe Recycle Bin. When you are done disposing of items, be sure to empty the Recycle Bin (right-mouse on it and select Empty Recycle Bin from the resulting pull-down menu). You should
search on the following strings: Vision, SCO, Nut, and CIFER (on XP or 2000, just search onCIFER). You should remove the following files/folders if you uninstalled Xvision (skip this stepon XP and 2000 do not remove any Vision or SCO files/folders): Vision (in C:\), Vision (inC:\Common Files), and Sco (in C:\WINNT\Profiles\administrator\Application Data). If youuninstalled MKS Toolkit then you should remove Nutcroot (generally in C:\) but do not remove
Nutcroot on XP or 2000 systems. You may remove CIFER or CIFER_Pro (in C:\) but BACKUP
the data therein before doing so (your CIFER databases, plots, job outputs, and other items maybe there); if you backup to a folder on the same system, it is probably best not to use CIFER inthe name of the backup folder.
Note: It is possible, in rare circumstances, for the CIFER setup program to be unable touninstall the CIFER package. In these situations the uninstaller may seem to run whenactivated from the Add/Remove panel, but later inspection will reveal that none of the files or
shortcuts have been removed. Furthermore, it will then be impossible to reinstallCIFER usingthe original CD. To correct this problem, it is necessary to manually uninstall CIFER asdescribed in Appendix A.
5. The CIFER Environment and Directory Structure
This section describes the organization of the CIFER file system that has been installed on
your computer. In order to effectively utilize CIFER, you will have to have some familiaritywith the structure of these directories, as well as the scripts, and environment settings upon whichCIFER depends for execution.
Much of the information contained in this section is detailed in nature, and need not be fullyassimilated on a first reading. However, it is advisable for the new CIFER user to at least
browse these pages in order to glean an overview of the topics contained therein.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
14/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-11
5 .1 T h e P r i m a r y CI FE R E n v i r o n m e n t Va r i ab l e s
During installation, two system-level environment variables are defined on your computer:
c i f r o ot and c i f h o me . Initially, these variables are defined with the same value, the path to
the root of the CIFER directory tree, i.e., the path to the CIFER destination folder, that you
provided during installation. (For information on situations in which these variables will have
distinct values, see the next section.)These environment variables control every aspect of CIFERs operation. They are used to
establish the path to the target scripts executed by the CIFER shell shortcut (see the section onrunning CIFER, below), and in the definitions of many secondary CIFER environmentvariables which identify specific subfolders and objects within the CIFER directory tree.
You may examine the primary CIFER environment variables by selecting theEnvironment tab of the System applet in the Control Panel (Figure 5-1). Note: on XP and2000 systems, select the Advanced tab of the System applet and then click on theEnvironment button; the resulting window will look similar to (but not the same as) Figure 3.
Note that you will generally not see the definitions of the secondary CIFER environmentvariables in the System applet window. This is because those variables are only defined in the
MKS Korn shell within which CIFER executes.
5 .2 S i n g l e an d M u l t i p l e U s e r C IF E R S y s t e m s
Before discussing the structure of the CIFER directory tree, it is necessary to distinguishbetween two types of CIFER installations: single and multiple user.
A single user CIFER installation is one in which only one person of the (perhaps) many
people with accounts on the system, actually uses CIFER. On such a system, it is unnecessaryto create separate user configurations and directory structures in order to segregate the operational
F i g u r e 5 -1 : E n v i r o n m e n t T a b o f t h e S y s t e m A p p l e t
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
15/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-12
environments of multiple users. In this case, the CIFER user can create databases andcustomized data input routines directly within the primary CIFER directory tree without fear of
impacting others.
However, on systems which support multiple CIFER users, it is necessary to duplicate, on aper user basis, certain portions of the primary CIFER directory structure in order to provide
segregated areas for the storage of user data. In these installations, thec i f r o ot
environmentvariable will point to the primary CIFER directory (as created during installation), while the
c i f h o me environment variable will point to the root of each individual users CIFER directory
tree. These per user directory trees are not subtrees of the primary CIFER (CIFER_Pro)directory, but rather, are usually located in the users own directory. (For specific instructions on
creating these user directories, see section 8 below.)
5 .3 T h e C IF E R R o o t Di r e c t o r y T re e
This is the primary CIFER directory tree, as created by the installer. The path to the root of
this tree is contained in the c i f r o ot environment variable. Figure 5-2 illustrates the
organization of this tree while Table 2 summarizes its content.
A discussion of the format and directory
structure ofType One time history filesmay be found in the document
Implementing READMIS (also included
in this IGRN as an Appendix G)
A discussion of the format and directory
structure ofType One time history filesmay be found in the document
Implementing READMIS (also included
in this IGRN as an Appendix G)
Folder must be copied in whole when
creating individual user accounts
Folder must be copied in part when
creating individual user accounts
< CIFROOT >
A discussion of the format and directory
structure ofType One time history filesmay be found in the document
Implementing READMIS (also included
in this IGRN as an Appendix G)
A discussion of the format and directory
structure ofType One time history filesmay be found in the document
Implementing READMIS (also included
in this IGRN as an Appendix G)
Folder must be copied in whole when
creating individual user accounts
Folder must be copied in part when
creating individual user accounts
A discussion of the format and directory
structure ofType One time history filesmay be found in the document
Implementing READMIS (also included
in this IGRN as an Appendix G)
A discussion of the format and directory
structure ofType One time history filesmay be found in the document
Implementing READMIS (also included
in this IGRN as an Appendix G)
Folder must be copied in whole when
creating individual user accounts
Folder must be copied in part when
creating individual user accounts
Folder must be copied in whole when
creating individual user accounts
Folder must be copied in part when
creating individual user accounts
< CIFROOT >
Figure 5-2: CIFER Directory Structure
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
16/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-13
Table 2: The CIFER Root Directory Tree
\... The root of the primary CIFER directory tree.
bin Contains the CIFER executables and dynami-
cally linkable libraries (DLLs).
data The data directory is the default location forSIFDEF files and the SIFDEF template file. Italso contains various subdirectories which may,
depending upon installation parameters, containuser created databases and sample datacorresponding to the exercises in the CIFERclass notes.
data\th The default location for CIFER time historydata. If you elect a typical installation, sample
type one time history data files will be placed inthe subtree beneath this directory. You will find a
detailed explanation of this directory structure andfile naming conventions for type one timehistory data files in the Implementing Readmis
document.
data\der_dat Contains sample simulation data files.
data\db This directory is the default target for newlycreated CIFER database files. A sampledatabase, containing some of the classroom
exercises for aircraft 703 (the XV-15), is placed inthis directory during installation if you elect thetypical configuration.
extras This directory provides specialized utilities, post-release patches/updates, and 3
rdparty software that
augment the performance of the baseline CIFERsoftware system as installed.
scripts Contains shell and PERL scripts which are usedduring the execution of some CIFER utilities.Many of the scripts in this directory are useful in ageneral context; see in particular 'mkbackup',
'purgefiles', and 'vdiff'. The end-user scripts in thisdirectory have man-page style documentationembedded in the file. For the PERL scripts, thisdocumentation can be accessed by typing a
command of the form ' !' atthe command prompt in the CIFER shell.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
17/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-14
Table 2: (continued . . . )
source This is the root of the source subtree (althoughsource code per se is not distributed withWINTEL CIFER!). The directories in this treecontain items such as CIFER screen definition
files, NASADIG font files, and templates forconstructing customized READMIS libraries.
source\cifincludes Contains a header file which is used by someCIFER scripts when accessing user databases.
source\readmis This folder contains sample READMIS projects(for Visual C/C++ and DEC Visual Fortran) which
can be used to construct customized time historydata input libraries. For a detailed discussion ofuser data input libraries see the document
Implementing READMIS.
source\cifscreen Contains a folder of CIFER screen definitionfiles. These files are utilized by the screensubsystem to generate the CIFER user interface.
source\nasadig This subtree contains font and map resources forCIFERs customized NASADIG plottingsoftware.
documentation Contains CIFER documentation, primarily inPDF format. (These files require the AdobeAcrobat Viewer, which is distributed withCIFER.)
jobs The (initial) default location for storing the end-user output from the various CIFER utilities.
jobs\plots The (initial) default location for storing end-userplot output.
ui Contains CIFER User Interface (CIFUI) files.These files are present for compatibility with Unix
versions of CIFER. In general, end-useradjustment of these files is not required on NT
systems.
ui\terminfo Contains keymap files. These files are present forcompatibility with Unix versions of CIFER.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
18/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-15
5 .4 T h e C IF E R Profile and Environ Files
In addition to the files contained in the primary CIFER directory tree described in the
previous section, two critically important files will be copied to your disk during installation. Theinstaller will place these files in your logon directory
4during setup. (Or, if you are a secondary
user, i.e., someone other than the user who installed CIFER, they will be copied to your logon
directory the first time you run the program). The files, collectively known as shell environment
files, are named profile.ksh and environ.ksh; they are required in order for theCIFER shell to launch properly.
The CIFER shell is really an MKS Korn shell within which the CIFER script executes.
As with all Korn and Bourne shells, the CIFER shell will read the users profile.ksh file atstartup, if one can be found in the logon directory.
Among other things, the CIFER profile.ksh defines several aliases and functionswhich may be of general use when working within the shell after a CIFER session. (You maywish to peruse the file to become familiar with these shortcuts if you intend to make use of theshell environment.) However, the most important segment of the profile file will be found near
the end, in the sections labeled CIFER Environment and CIFER Autolaunch. The first ofthese segments defines various CIFER environment variables by source-ing the ancillary
cifrc.ksh file; the second segment actually launches CIFER.
In a shell environment, the profile file is read only once, when the login shell is initiated. Ifthere are initializations which must be performed every time a shell is launched (e.g., whenever a
non-login shell is spawned), then those initializations must be placed in the environ.ksh file,
since it is processed each time a shell launches. In the case of CIFER, the environ.ksh file isprimarily used to provide (redundant) definitions of two important CIFER environment variables
in order to ensure their availability in all child processes.
Merging Shell Environment Files. If you are one of the class of users who, for whatever
reason, has a pre-existing set of environment files (i.e., a profile.ksh and/or environ.kshfile) in your logon directory, you will be warned, prior to installation, to save these files in orderto preclude their being overwritten during the installation process. In general, you will then want
to merge these files once the installation has completed, per the guidelines in this section.
If your environment files originated from the installation of MKS NuTCRACKER withanother software product, or as part of a software development environment, andif you have not
customized these files in any way, then you may be able to safely discard them. You shouldexamine the original files, looking for remarks to the effect that the file is a sample. Usuallythe files installed by NuTCRACKER are for illustrative purposes and do not perform anycritically necessary operations (or, at least, any operations that are not also performed in thedefault CIFER-installed files).
On the other hand, if you have customized your existing files or, if they were part of another
software installation, then you will probably want to merge them with CIFER s files. Veryprobably this can be accomplished without conflicts arising, but it will be necessary to examine
the files in some detail. The only items which are critical for CIFERs operation are thefollowing:
The profile.ksh file must source cifrc.ksh, which is located in the
${cifhome}/scripts directory.
4 Your logon directory is defined by a concatenation of the system environment variables
%HOMEDRIVE% and %HOMEPATH%. You may determine your logon directory by typing the
command echo %HOMEDRIVE%%HOMEPATH%in a DOS shell.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
19/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-16
The HASHBANG environment variable (exported from environ.ksh) must not be unset.
(This variable is initially defined in the cifrc.cmd script; see the next section.)
The TK_PERL_USE_COMSPEC environment variable must be unset. (This is done in the
CIFER environ.ksh file). (This variable is unset in the cifrc.cmd script; see thenext section.)
Note that it is not actually necessary for the profile.ksh file to launch CIFER. Removingthis segment from the merged profile file (or equivalently, unsetting the CIFAUTO-LAUNCH
variable) would mean only that CIFER shell users would have to manually enter a cifercommand after shell startup. Such a compromise might be necessary if the resultant
profile.ksh file will be required to support more than one software environment.
Finally, a word about so-called secondary users (see the definition at the beginning of thissection) who have pre-existing environment files in their logon directories. Normally, when asecondary user first starts a CIFER shell, the CIFER environment files will be copied to hislogon directory. However, if that user has pre-existing environment files in his directory, theCIFER shell will not overwrite them. Then, because the user does not have the proper
environment files, the shell will fail to launch CIFER; furthermore, the user will not be able to
manually launch CIFER from within the shell, because the cifer command (alias) will nothave been defined. The solution to this problem is, of course, to merge the environment files5 in
the manner described above.
5 .5 C IF ER s Secondary Environment Variables
During the CIFER shell startup process, a large number of secondary CIFERenvironment variables are defined. In this section we will catalog the most important of them,
indicating which ones might be modified by the user and to what purpose.
The CIFER Startup Process. The CIFER startup process is illustrated in Figure 5-3.It will be noted that a large number of script files (six) are involved in the sequence, some ofwhich have already been described in this document. Shell startup begins when the user double-
clicks the CIFER shell shortcut on the desk top, or selects the shortcut from theSTART>Programs> CIFER>CIFER Shell menu item6.
Examining the Target field of the Shortcut tab in the properties panel of the shortcut will
reveal the command used to initiate this sequence:
%SystemRoot%\system32\cmd.exe /c%cifhome%\scripts\cifrc.cmd && %NUTCROOT%\mksnt\sh.exe L
The cifrc.cmdfile, located in the scripts directory beneath %cifhome% is executed
before the MKS Korn shell (sh.exe) is launched. This file defines the most important CIFERsecondary environment variables and makes them available within the WINTEL command shellenvironment7. These variables are then automatically imported into the MKS Korn shell
environment when it launches.
5 Original versions of CIFERs environment files will be found in the scripts directory beneath
%cifroot%.6 This section is designed to provide technical information on the mechanics of CIFERs operation. For
a general introduction to running CIFER and customizing its shell interface, see section 5.7 For secondary CIFER users, the cifrc.cmd script has another important function. If a user does
not have copies of the CIFER profile.ksh and environ.ksh files in his logon directory,
cifrc.cmd will copy these files to the logon directory, thereby allowing the subsequent launch of the
Korn shell to proceed without failing.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
20/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-17
Fi gure 5-3: The CIF ER Shell Startup Process
Since the MKS Korn shell launches as a login shell (note the -L switch), it will attempt to
read the profile.ksh file located in the users logon directory. As described in the previoussection, the special CIFER profile file further prepares the Korn shell by defining certain
functions and aliases. It does this, in part, by source-ing the cifrc.ksh file, a Korn shellcounterpart to the cifrc.cmd file.
Among other things, the cifrc.ksh file makes certain adjustments to the shells PATHvariable and defines the cifer command which allows users to (re)launch CIFER from theshells command prompt.
Once the cifrc.ksh file has been executed, the profile.ksh script actually launches8
CIFER by executing the cifer script located in the %cifroot%\ scripts directory. (Thecareful reader will have noted that some scripts in this sequence are launched from the
%cifroot% directory, while others are launched from the %cifhome% directory. The reasonsfor these differences are more clear when multiple user systems are discussed in section seven.)
The cifer script, in turn, immediately sources the SIFDEF and CIFUI scripts. Thesescripts define additional environment variables which pertain to the particular dataset in useduring the CIFER session and to the terminal characteristics of the users system9. These two
script files are maintained by various components of the CIFER utility package, and, with theseutilities, can be changed by the user during the course of a session.
8 CIFER will be launched automatically from the profile.ksh file only if the CIFAUTOLAUNCH
variable (defined in cifrc.cmd) is set to a non-zero length string.9 This latter group of variables, involving terminal characteristics, is retained for compatibility with the
Unix versions of CIFER. When working with the MKS NuTCRACKER console interface, it is
unnecessary to adjust terminal characteristics.
CIFER
Shell Shortcut
WINTEL
Command Shell
(DOS Shell)MKSKorn Shell
cifrc.cmd profile.ksh cifrc.ksh
cifer
SIFDEF CIFUI
(Most of the secondary CIFER
environment variables are defined
in the cifrc.cmd script)
Process Boundary(The CIFER shell does not operate in a
separate process space but many of it s
components do)
Script File(Digit indicates processing order)
Shell
Shortcut
10
2
3
45
6
7 8
CIFER
Shell Shortcut
WINTEL
Command Shell
(DOS Shell)MKSKorn Shell
cifrc.cmd profile.ksh cifrc.ksh
cifer
SIFDEF CIFUI
(Most of the secondary CIFER
environment variables are defined
in the cifrc.cmd script)
Process Boundary(The CIFER shell does not operate in a
separate process space but many of it s
components do)
Script File(Digit indicates processing order)
Shell
Shortcut
Process Boundary(The CIFER shell does not operate in a
separate process space but many of it s
components do)
Shortcut (prog. Launch)(Digit indicates processing order)
Shell
Script File
10
2
3
45
6
7 8
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
21/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-18
In all cases, the script files described in this section are heavily commented and may beviewed using any simple text editor (e.g., WordPad). However, the user is advised not to modify
these files without careful consideration, and under no circumstances should the end user ever
modify the SIFDEF and CIFUI files directly, since these files are maintained by CIFERutilities.
The Secondary Environment Variables. The bulk of CIFERs secondary environmentvariables are defined in three of the startup script files: cifrc.cmd, SIFDEF, and CIFUI.Table 3, below, describes these environment variables; it is segmented by file. Table 3a
describes the environment variables declared in cifrc.cmd, Table 3b describes those declared
in the SIFDEF file, and Table 3c describes the variables defined in the CIFUI file. Figure 5-4gives a schematic overview of the interrelationships among these files and variables.
As has been noted, SIFDEF and CIFUI files are never edited directly by the end user.
Instead, they are maintained by various CIFER utilities, and, in order to better understand some ofthe terminology used in discussing these files and the variables which they define, it will beuseful to give an overview of this maintenance process. For brevity, we will discuss only the
SIFDEF files in what follows; the CIFUI files are handled in a similar manner10.
In order to launch, CIFER requires that there be a file named SIFDEF in the directorypointed to by the %DEFLOC% environment variable ($DEFLOC within the Korn shell). This file
is called the active SIFDEF file. The active SIFDEF file must have a parent SIFDEF file,
which is named SIFDEF... Here and
represent file name extensions formed from the definitions of the ARCRFT and ANALYSIS
environment variables. These variables are defined in the SIFDEF file itself.
Whenever the Change CIFER Defaults utility under CIFER menu item 10 is used to editthe SIFDEF file, it is the active SIFDEF file which is being modified. Then, when the default
ANALYSIS value is accepted, the active SIFDEF file is copied over its parent SIFDEF file,thereby preserving the modifications. The user may enter a new ANALYSIS value instead,thereby creating a new parent SIFDEF file. Whenever the user selects a SIFDEF file by
specifying the . string of a (parent) SIFDEF file other than those ofthe currently active SIFDEF, the contents of that parent file will be copied over the currentlyactive SIFDEF file, making that ARCRFT/ ANALYSIS active.
10 On the WINTEL platform, the utility (item 91) for modifying the CIFUI file is simpler than in the Unix
version. Three standard CIFUI files for three screen plotting modes are accessible via a prompt.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
22/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-19
Table 3a: CIFERSecondary Environment Variables
$ c i f h o m e / s c r i p t s / c i f r c . c m d
DEFLOC Default: %cifhome%\data
DEFLOC points to the directory which contains the usersSIFDEF files. This directory will contain a SIFDEF file for each
of the users CIFER databases. SIFDEF files, in turn, tell CIFER
where to find the databases themselves, together with otherassociated files and directories (see Table 3b and Figure 6).
UILOC Default: %cifroot%\ui
UILOC points to the directory containing the users CIFER User
Interface (CIFUI) files. There is one CIFUI file for each of thethree screen plotting options. Unlike for the Unix version, the
keyboard information is unchangeable.
SIFLOC Default: %cifroot%\bin
SIFLOC points to the directory containing the CIFER executables.In some situations, when creating a secondary user account, it may
be desirable to replace %cifroot% with %cifhome%, therebyallowing the secondary user to run from a customized copy of the
CIFER executables located in the bin directory beneath his
private CIFER root, %cifhome%.
cifsrc Default: %cifroot%\source
cifsrc points to the CIFER source directory. This variable isincluded for internal use and should not be modified.
cifbin Default: %cifroot%\bin
cifbin points to the CIFER binaries directory. This variable isincluded for internal use and should not be modified.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
23/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-20
Table 3a: CIFERSecondary Environment Variables(continued ...)
$ c i f h o m e / s c r i p t s / c i f r c . c m d
cifinc Default: %cifroot%\source\includescifinc points to the CIFER include files directory. This variable isincluded for internal use and should not be modified.
cifscripts Default: %cifroot%\scripts
cifscripts points to the CIFER script files directory. Thisvariable is included for internal use and should not be modified.
(NOTE: those scripts which are duplicated during the process ofcreating multiple user systems, are always referenced via the path
%cifhome%\ scripts. Hence, modifying %cifhome% issufficient to ensure that the user-specific versions will be found.)
LOGSCR Default: %cifroot%\source\cifscreen\def
LOGSCR points to the CIFER screen definition files directory. Thisvariable is included for internal use and should not be modified.
NASAFONT Default: %cifroot%\source\nasadig62b\font\NASAFNTS
NASAFONT points to the NASADIG font file. This variable isincluded for internal use and should not be modified.
NASAMAPL Default: %cifroot%\source\nasadig62b\map\WORLDCIL
NASAMAPL points to the NASADIG map file. This variable isincluded for internal use and should not be modified.
PERL Default: %NUTCROOT%\mksnt\perl.exe
PERL points to the MKS PERL executable. This variable is includedfor internal use and should not be modified.
HASHBANG Default: 1
HASHBANG enables recognition of shabang lines in MKS shell
scripts. CIFERwill failifHASHBANG is not set.
TK_PERL_USE_CO
MSPEC
Default: unset
If set, TK_PERL_USE_COMSPEC instructs the MKS Toolkit PERLto run sub-processes in the NT command shell rather than in an MKS
shell. This variable must always be unset, otherwise CIFERwill fail.
CIFAUTOLAUNCH Default: 1
When set, CIFAUTOLAUNCH causes the CIFERprofile.ksh fileto auto-launch CIFER at shell startup.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
24/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-21
Table 3b: CIFERSecondary Environment Variables
$ D E F L O C / S I F D E F
ARCRFT Default: default
ARCRFT specifies the name of the aircraft that will be used during thisCIFER session. This is also the filenameportion of the CIFER databasefile name. It is restricted to a maximum of eight characters
and can be
modified when a new aircraft database is created or when a new SIFDEFfile is selected. (See CIFER menu item number 10, and the section onSetting up Databases and SIFDEF Files in this guide.)
ANALYSIS Default: default
ANALYSIS is used by CIFER to distinguish among different analyses ofthe same aircraft. It will be initialized to 'default' when a new aircraftdatabase is created and can be modified after CIFER utility number 11,
Change CIFER Defaults, is used. A maximum of eight characters is
allowed. (See the section on Setting up Databases and SIFDEF Files inthis guide.)
LOGDEF Default: $cifhome/data/dbThe directory path to the CIFER database for this aircraft. This variableand all of the remaining variables in Table 3b can be modified using CIFERutility number 11, Change CIFER Defaults.
THLOC Default: $cifhome/data/th
The directory path to the time history data. (NOTE: CIFER Type Onetime history files require special directory structures and file namingconventions. Please see the Implementing READMIS document for
details.)
PLTDIR Default: $cifhome/jobs/plots
The path to a catchall directory for plot output files. This directory can be
declared separately for each ARCRFT/ANALYSIS pair.
BATDIR Default: $cifhome/jobsThe path to a catchall directory for background job scripts and output files.
(CIFER utilities which deposit files in the 'tfdata' directory will attempt tocreate that directory as a sub-directory of this batch directory.) Thisdirectory can be declared separately for each ARCRFT/ANALYSIS pair.
FREQ_UNITS Default: RADSpecifies the user's choice of frequency units. (CIFER performs all internalcalculations in radians per second; however, the user may select screendisplays in Hz by setting this variable accordingly.)
Valid characters include alpha-numeric characters, dashes, and underscores; blanks are not allowed.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
25/61
CI FE R - Th e Power to M odel Your Worl d
CasalCorp October 2004 IGRN-22
Table 3c: CIFERSecondary Environment Variables
$ U I L O C / C I F U I
CIFUI Default: nutc_default
The CIFUI environment variable identifies the parentCIFUI file. This
file is named CIFUI., where is an extension
formed from the definition of the %CIFUI% environment variable.
CIFERTERM Default: u n s e t
CIFERTERM is the name of the terminal which is used during CIFERexecution. This becomes the entry into the TERMINFO capabilities
database. If it is undefined, the system default terminal type is used.
TERMINAL Default: X11
The TERMINAL environment variable contains a code which tells theCIFER graphics routines what type of graphics terminal your system
supports or, more precisely, what type of graphics terminal youremulator emulates. NT platforms should always use X11 emulation.
EMULATION Default: u n s e t
The EMULATION variable provides CIFER with the name of yourgraphics emulation software. On NT platforms, this variable should beunset. (i.e., undefined).
DOFORK Default: no
The DOFORK variable indicates whether plots should bespawned in a separate process. It is used only when TERMINAL
is "X11". On NT platforms, this variable can be yes orno.
STICKY Default: no
The STICKY variable indicates whether or not plots remain on
the screen after a carriage return is depressed while focus is in
the plot window. It is used only when TERMINAL is "X11". On
NT platforms, this variable can be yes orno.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
26/61
CIF ER - The Power to M odel Your World
CasalCorp October 2004 IGRN-23
%cifhome%\scripts\cifrc.cmd
SIFDEF
.dat
D EF LO C p oi nt s t o t he d ir ec to ry
containing the active SIFDEF file. (This
file is always named SIFDEF, without
any extensions.) The SIFDEF file defines
two environment variables; ARCRFT and
ANALYSIS, which are used to identify the
active database files and the parent file of
the active SIFDEF file.
(active database files)SIFDEF.
(parent SIFDEF file)
.idx
CIFUI
Time History Data
NOTE: CIFER Type One time
history data requires special
directory and file naming
conventions. See Implementing
READMIS in Appendix G.
The directories identified by the
BATDIR and PLTDIR environment
variables will receive, respectively,
the output and plot files from CIFER
jobs run while this SIFDEF is a ctive.
SIFLOC points to the directory containing the
CIFER executables. Normally this is the
%cifroot%\bin directory, but in some
circumstances, such as when a user has
implemented a special READMIS.DLL, this
may be the %cifhome%\bin directory.
(SIFLOC)
(UILOC
)
(DEFOC)
(LOGDEF)
(THLOC)
(PLTDIR
)(BATDIR)
%cifhome%\scripts\cifrc.cmd
SIFDEF
.dat
D EF LO C p oi nt s t o t he d ir ec to ry
containing the active SIFDEF file. (This
file is always named SIFDEF, without
any extensions.) The SIFDEF file defines
two environment variables; ARCRFT and
ANALYSIS, which are used to identify the
active database files and the parent file of
the active SIFDEF file.
(active database files)SIFDEF.
(parent SIFDEF file)
.idx
CIFUI
Time History Data
NOTE: CIFER Type One time
history data requires special
directory and file naming
conventions. See Implementing
READMIS in Appendix G.
The directories identified by the
BATDIR and PLTDIR environment
variables will receive, respectively,
the output and plot files from CIFER
jobs run while this SIFDEF is a ctive.
SIFLOC points to the directory containing the
CIFER executables. Normally this is the
%cifroot%\bin directory, but in some
circumstances, such as when a user has
implemented a special READMIS.DLL, this
may be the %cifhome%\bin directory.
(SIFLOC)
(UILOC
)
(DEFOC)
(LOGDEF)
(THLOC)
(PLTDIR
)(BATDIR)
Fi gure 5-4: Relationships Among CIF ER Environment Variables
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
27/61
CasalCorp October 2004 IGRN-24
6. Running CIFER
Once you have completed the installation of the CIFER package, made any necessarymanual adjustments to the XVision transport protocols (see Section 3), and rebooted yourmachine, you should be able to invoke CIFER either by double-clicking the shortcut that theinstaller placed on your desktop11, or by selecting the START>Programs> Cifer>CIFER Shell
menu item (Figure 6-1). Note that two different methods for starting CIFER may give youslightly different CIFER windows with different properties (e.g., a CIFER window started viathe desktop shortcut may be physically shorter than a CIFER window started from the Startmenu).
When you launch CIFER, you are actually starting an MKS Korn shell which thenultimately executes the main CIFER script, after first running several intermediate scripts tosetup CIFERs environment. This startup process was discussed at some length in section 5.5
in connection with CIFERs environment variables; for now, it is sufficient to note that you willsee a screen similar to the one shown in Figure 6-2 the CIFER splash screen. Depressingcarriage return will then take you to CIFERs main menu screen (Figure 6-3), from which you
may selectively execute individual CIFER utilities12.
Figure 6-2: CIFER Splash Screen Figure 6-3: CIFER Main Menu
11 If you do not wish to have the CIFER shortcut on your desktop, it may be safely deleted.12 It is not the purpose of this document to discuss in detail the operation of CIFERs various
components. For an introduction to these programs please see volumes 1 and 2 of the CIFER Class
Notes.
Figure 6-1: Starting the CIFER Shell
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
28/61
CasalCorp October 2004 IGRN-25
When you have finished your CIFER session, you will find your cursor at the inputprompt of the CIFER main menu screen. To exit CIFER, simply enter a carriage return and
you will be returned to the Korn shell from which CIFER was initiated. This is a usefulenvironment from which to manipulate CIFER output files, re-launch CIFER, or perform anyother tasks for which you find a Unix-like command line interface well suited. You will find that
most Unix tools and editors are available, and that features such as pipes and backgroundprocessing work as you would expect. Furthermore, all CIFER environment variables aredefined and available for use, making manipulations of CIFER directories and files quite
straightforward. To restart CIFER from within the shell, type cifer (lower case) at the
command prompt. To exit the shell entirely, type any one ofexit, logout, orbye.
6 .1 C u s t o m i zi n g t h e C IF ER S h el l W i n d o w
As they are installed, the CIFER shortcuts present a somewhat vanilla interface in whichimportant features such as cut and paste and scrolling are disabled. You will almost certainlyfind your CIFER user experience more productive if you take a few moments to enable some of
these features. Note, however, that the operations described in this section will requireadministrative privilege, since you will be enabling these features for all users of these system-wide shortcuts.
Begin by launching an instance of the CIFER shell from either the desktop or START menushortcuts. Right click on the title bar of the menu and select Properties. Next select theOptions tab (Figure 6-4). Then, check the box labeled Quick Edit Mode.
With this mode enabled you will be able to capture screen text into the paste buffer by
depressing the left mouse button and dragging across the desired text to highlight it, and thenreleasing the left mouse button to select the highlighted text. Next you can capture the selectedtext by right-clicking. Captured text may be subsequently inserted at the cursor position by right-
clicking a second time. This maneuver is very useful for duplicating complicated CIFERfrequency response names!
Fi gure 6-4: Enabling Quick Edit Mode
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
29/61
CasalCorp October 2004 IGRN-26
To enable scrolling, select the Layout tab of the Properties panel (Figure 6-5). In theScreen Buffer Size pane, enter a suitably large value (e.g., 1000 lines) for the Height;
however, leave the Width set to 80 columns. Next, in the Window Size pane, enter a numberof lines sufficient to give the shell window the screen coverage you would like; again, do not alterthe width of the window.
There is one remaining customization which you may wish to consider when setting up yourCIFER shortcuts. As it is installed, the CIFER shell will always launch with white (actuallygrayish) lettering displayed on a black background. This arrangement can be modified to any
desired combination (e.g., black lettering on a white background) by making suitable adjustmentsin the Colors tab of the property panel (Figure 6-6).
Figure 6-5: Enabling Scrolling in the CIFER Shell
F igure 6-6: Setting CI F E R Shell Background and F oreground Colors
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
30/61
CasalCorp October 2004 IGRN-27
Finally, click OK to close the property panel. When you do so, a dialog will appear askingif you wish to apply the changes only to the current window, or to the shortcut that launched the
window. You should select the latter in order to have the changes take effect for all subsequentlaunches of CIFER from thatshortcut. (You should then launch CIFER from the other of thetwo shortcuts installed by the setup, and repeat these steps to establish the proper defaults for it as
well.)
6 .2 T h e C IF E R K e y b o a r d In t e r f ac e
Many CIFER utilities interact with the user via a series of data entry screens that make useof cursor addressing. Each screen contains a number of data input fields interspersed with
descriptive text. The user can navigate from field to field within a screen using combinations ofthe arrow, tab and return keys. Once the data content of a screens fields is satisfactory, theuser can proceed to the next screen by depressing the F1 key. CIFER does not make use of thecomputers pointing device (mouse).
Table 4a summarizes the functions13
(on a typical keyboard) of the various navigational keysused by CIFER;
Data Entry. Once the user has navigated to a field, the procedure for data entry isstraightforward. In general, all printable characters will appear in the field as they are typed.Please note that CIFER data entry is case sensitive, and many CIFER inputs must be entered
in upper case. In addition to the standard numeric keys, on most keyboards the numerical keypadcan also be used for data entry provided the Num Lock has been set.
The double-width Backspace key located above the return key (see Figure 6-7) is thecharacter rubout key; it will delete the character immediately to the left of the cursor. The smallDelete key, located in the six-key cluster above the arrow keys, can be used to delete the entirecontents of a field.
NOTE: A very important change was implemented for CIFER Version NT12. Except in
the extended editing features described immediately below, the first keystroke in a field will wipe
out that field. This is the behavior of the Unix version, and some users who were familiar with itrequested that it be implemented in the Windows version also.
Extended Editing Features. One CIFER utility, the QPLOT program (utility 19), has anoptional data entry protocol which is designed to provide additional editing features in order tofacilitate the entry of long frequency response names. These features are only available in screen
one of QPLOT. In this situation, all of the descriptions given in Table 4a remain valid, but theadditional capabilities described in Table 4b also apply.
13 Users familiar with the Unix version of CIFER will recall that keyboard mappings could be adjusted
in order to compensate for the vagaries of the many keyboard types encountered on those platforms.
This type of customization is not required on Windows platforms, since the mappings provided by
NuTCRACKER are consistent across all systems.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
31/61
CasalCorp October 2004 IGRN-28
Table 4a: CIFER Keyboard Navigation and Data Entry
tab, right arrow Move data entry focus right by one field. If currently in right-most fieldof a screen row, then wrap to left-most field in the next screen row.
left arrow Move data entry focus left by one field. If currently in left-most field of a
screen row, then wrap to right-most field in the previous screen row.
return, enter,
down arrow
Move data entry focus down to the most closely (vertically) aligned fieldin the next row. When issued from the last line of the screen, the focuswill wrap to the top of the screen.
up arrow Move data entry focus up to the most closely (vertically) aligned field in
the previous row. When issued from the top line of the screen, the focuswill wrap to the bottom of the screen.
any printing
character
Appears in the data field as typed (case sensitive).
backspace Deletes the character to the left of the cursor.
del Deletes the entire content of the current data entry field.
F1 Accepts the data on the current screen as entered and proceeds to the nextscreen.
F2 Presents a secondary navigation menu on the last line of the terminal
screen. The menus options are
Continue Backup Main Exit Update
Selection of items on this menu may be made via the right or left arrowkeys, or by typing the first letter of the desired entry. Once an entry hasbeen selected, depress F1 to accept. Update is an exception. Type T
or F to enable or disable a database update, respectively, to be doneafter selection of an entry. It is not possible to select this item via thearrow keys, nor does typing U have any effect.
F3 This key is only used in specialized situations; see for example,
Class Notes Vol 2, DERIVID operations, screen 4.
F4 Presents a secondary navigation menu of the form:
Go to:
to which the user may respond with a screen number followed by
the F1 key or the RETURN key. Screen numbers entered at thisprompt may be outside of the range of actual screen numbers for
the program; e.g., 99 will take you to the end of the data entry
segment for most of the CIFER utilities.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
32/61
CasalCorp October 2004 IGRN-29
Table 4b: QPLOT Augmented Data Entry Features
CTRL-A Moves cursor to the left end of the current field.
CTRL-D Moves cursor to the right end of the current field.
CTRL-G Moves cursor left by one character.
CTRL-L Moves cursor right by one character.
CTRL-O Enters character insert mode. Any printable character typed will beinserteddirectly above the cursor.
Exits character insert mode.
any printingcharacter
In normal mode, overwrites the character directly above the cursor. Incharacter insert mode, the character is inserted directly above the cursor,moving the right portion of the line one character to the right.
backspace Deletes the character immediately to the left of the cursor, and drags theright portion of the line one character to the left.
del Deletes the entire line, even if the cursor is positioned in the interior ofthe line.
7/28/2019 CIFER_IGRN_V4-1-00_OCT04
33/61
CasalCorp October 2004 IGRN-30
7. Using CIFER: Setting Up Databases and SIFDEF files
This section will provide an overview of CIFER databases and the procedures for creatingthem. SIFDEF files will be described, and the relationship between databases and SIFDEF files
will discussed. Finally, a detailed example of the creation of a user database and its associatedSIFDEF file