Preview

Yu Ijkjkji

Powerful Essays
Open Document
Open Document
72003 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Yu Ijkjkji
C H A P T E R

2

Alarm Troubleshooting

Note

The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration. Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's path protection feature, which may be used in any topological network configuration. Cisco does not recommend using its path protection feature in any particular topological network configuration. This chapter gives a description, severity, and troubleshooting procedure for each commonly encountered Cisco DWDM alarm and condition. Tables 2-1 through 2-5 provide lists of DWDM alarms organized by severity. Table 2-6 on page 2-7 provides a list of alarms organized alphabetically. Table 2-7 gives definitions of all DWDM alarm logical objects, which are the basis of the alarm profile list in Table 2-8 on page 2-13. For a comprehensive list of all conditions and instructions for using TL1 commands, refer to the Cisco SONET TL1 Command Guide . An alarm’s troubleshooting procedure applies to both the Cisco Transport Controller (CTC) and TL1 version of that alarm. If the troubleshooting procedure does not clear the alarm, log into the Technical Support Website at http://www.cisco.com/techsupport for more information or call the Cisco Technical Assistance Center (1-800-553-2447). For more information about alarm profiles, refer to the “Manage Alarms” chapter in the Cisco ONS 15454 DWDM Procedure Guide.

Note

Unless otherwise noted, ONS 15454 refers to the ANSI and ETSI versions of the platform.

2.1 Alarm Indexes
The following tables group alarms and conditions by their default severities in the ONS DWDM system. These severities are the same whether they are reported in the CTC Alarms window severity (SEV) column or in TL1.

Note

The CTC default alarm profile contains some alarms or conditions that are not

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Appendix A: All Rules and SummariesAdministrationEXEC Passwords Not Using Type 5 Encryption (1 note)User Account Not At Level 1 (2 notes)Route Maps and ACLsDeny All ACL (1 warning)System LoggingACL Deny Statement Not Logged (1 note)…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    7. Basic Router Configuration and Command Line Interface Page 55 8. Switch and Router Security a. Setting Routing Passwords - Source documents located in Student CD > ICND-1-SB-Part1-SettingRouterPassword.pdf b. Setting Switch Passwords - Source documents located in Student CD > ICND-1-SB-Part1-SettingSwitchPassword.pdf c. Switch Security I - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityI.pdf d. Switch Security II - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityII.pdf e. Switch Security III - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityIII.pdf f. Switch Security IV - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityIV.pdf 9.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Monitored the GCCS-m system hardware, software, common procedures, standards, and numerous applications and interfaces provided worldwide connectivity with all levels of command.…

    • 478 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Netw420 Week 4 lab report

    • 726 Words
    • 3 Pages

    This week’s assignment is to describe various event categories and event based transactions that are used by the Network Management System. It would be impossible to categorize all potential causes for alarms in all existing network systems however, understanding some common alerts and categories is essential for any network manager.…

    • 726 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    python cheat sheet v1

    • 513 Words
    • 13 Pages

    sys Variables String Methods Datetime Methods capitalize() * lstrip() today() fromordinal(ordinal) builtin_module_names Linked C modules center(width) partition(sep) now(timezoneinfo) combine(date, time) byteorder Native byte order count(sub, start, end) replace(old, new) utcnow() strptime(date, format) check_interval Signal check frequency decode() rfind(sub, start ,end) fromtimestamp(timestamp) utcfromtimestamp(timestamp)…

    • 513 Words
    • 13 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Integrated Public Alert and Warning System (IPAWS) was launched in 2006 due to Presidential Executive Order 13407, which called for the United States to have “an effective, reliable, integrated, flexible and comprehensive system to alert and warn the American people in situations of war, terrorist attack, natural disaster or other hazards to public safety (Bristow 2011, para.3). Prior to IPAWS, emergency managers struggled to effectively and efficiently alert and mobilize the citizens in emergency situations. The IPAWS is comprised of several components that tie together to form a vital service to the public. The Integrated Public Alert and Warning System is a comprehensive alert system designed to alert the public of emergency situations by way of various communication and interface devices.…

    • 388 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The INWS is a combination of methods using audible and visual signals, verbal messages, and electronic communication. Communication modes include sirens, horns, radio tone alerting, MNS, unaided voice systems, public and broadcast address systems, local area network messaging, telephone alert conferencing, pagers, television, radio, flags, signs, and other electronic or mechanical methods. Air National Guard units must develop an alert system for their Traditional members during non-drill weekends. This system will be utilized not only to call up members for base pre-incident preparation, post-incident recovery but for accountability after a major incident. Ensuring all unit members are safe and accounted for is the first step in recovering and preparing mitigation for future…

    • 1598 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Karen Leary

    • 846 Words
    • 4 Pages

    Reread the Open Systems resource (found in the resources tab) to help construct your answer.…

    • 846 Words
    • 4 Pages
    Good Essays
  • Better Essays

    State Farm Insurance (2006). Security Alarms Systems, Retrieved on October 19, 2007 from the World Wide Web:…

    • 1272 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    12. Be sure to do the Packet Tracer Exploration 9.3.4: Examine and Modify the EIGRP Metric.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Here, POS, CLAIM, QUOTE, DNW,SO are different teams in ST responsible for different tasks and whose applications use different packaged products like that of EDI, ModelN, B2B etc. All these applications interact with Esicom2 (which is central database for managing all the applications).…

    • 907 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Juniper Jncis Sp

    • 7180 Words
    • 29 Pages

    * logical-system logical-system-name (family inet and inet6 only) * loss-priority (high | medium-high | medium-low | low) * next term * next-hop-group group-name (family inet only) * policer policer-name * port-mirror (family bridge, ccc, inet, inet6, and vpls only) * prefix-action action-name (family inet only) * reject (family inet and inet6 only)…

    • 7180 Words
    • 29 Pages
    Satisfactory Essays
  • Powerful Essays

    mloojoji ujgbuh iijijj

    • 1238 Words
    • 5 Pages

    How is starch and cellulose treated to allow them to be used by the yeast?…

    • 1238 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Uart

    • 19141 Words
    • 77 Pages

    This section of the manual contains the following major topics: 47.1 47.2 47.3 47.4 47.5 47.6 47.7 47.8 47.9 Introduction .................................................................................................................. 47-2 Non-Maskable Traps.................................................................................................... 47-7 Interrupt Processing Timing ....................................................................................... 47-12 Interrupt Control and Status Registers....................................................................... 47-15 Interrupt Setup Procedures........................................................................................ 47-65 Register Maps............................................................................................................ 47-68 Design Tips ................................................................................................................ 47-70 Related Application Notes.......................................................................................... 47-71 Revision History ......................................................................................................... 47-72…

    • 19141 Words
    • 77 Pages
    Powerful Essays
  • Powerful Essays

    Sallu

    • 11646 Words
    • 47 Pages

    References: [1] Systems Operation Manual, MTNL [2] Traffic Datasheets, MTNL [3] Book on ICT- Stephan Doyle [4] Operation Manuals: Hardware Systems, MTNL [5] ISDN Manual, MTNL [6] System Maintenance, MTNL…

    • 11646 Words
    • 47 Pages
    Powerful Essays

Related Topics