NS 3000/Ix Error Messages Reference Manual

Total Page:16

File Type:pdf, Size:1020Kb

NS 3000/Ix Error Messages Reference Manual NS 3000/iX Error Messages Reference Manual HP e3000 MPE/iX Computer Systems Edition 10 Manufacturing Part Number: 36923-90043 E0801 U.S.A. August 2001 Notice The information contained in this document is subject to change without notice. Hewlett-Packard makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for direct, indirect, special, incidental or consequential damages in connection with the furnishing or use of this material. Hewlett-Packard assumes no responsibility for the use or reliability of its software on equipment that is not furnished by Hewlett-Packard. This document contains proprietary information which is protected by copyright. All rights reserved. Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowed under the copyright laws. Restricted Rights Legend Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. Rights for non-DOD U.S. Government Departments and Agencies are as set forth in FAR 52.227-19 (c) (1,2). Acknowledgments UNIX is a registered trademark of The Open Group. Hewlett-Packard Company 3000 Hanover Street Palo Alto, CA 94304 U.S.A. © Copyright 1988–1994, 1998 and 2001 by Hewlett-Packard Company 2 Contents 1. CIERR Error Messages Network Services Environment Error Messages . 28 2. DSERR Error Messages 3. NS/NFTERR and NS/NFTWARN Messages 4. NFT/3000 Error Messages 5. NetIPC (SOCKERRS) Error Messages 6. Virtual Terminal (VT ERROR) Error Messages 7. Network Services Information Messages 8. Remote File Access Error Messages 9. Remote Process Management Error Messages 10. Network Transport Protocol (PMERR) Error Messages 11. FPARSE Error Messages 12. NETXPORTERR Error Messages 13. NSCONTROL Error Messages 14. VALERR and VALWARN Messages 15. LAN, LAN/Console, Token Ring LAN Error Messages 16. 100VG-AnyLAN and HP-PB 100Base-T Error Messages SDI Generic Status Values . 164 SDI Driver Specific Status Values. 170 Logging Sublocation Codes. 199 17. PCI 100Base-T Error Messages SDI Generic Status Values . 280 SDI Driver Specific Status Values. 286 Logging Sublocation Codes. 312 18. PCI LAPBMUX Link Error Messages SDI Generic Status Values . 378 SDI Driver Specific Status Values. 383 Logging Sublocation Codes. 402 3 Contents 19. FDDI Error Messages 20. LAP-B Link Error Messages LAP-B Link Startup Error Messages . .438 LAP-B Link Driver Error Messages . .443 LAP-B Link Shutdown Error Messages . .458 21. Logging Location Codes Logging Formats . .462 Logging Subsystems . .463 Network Transport Subsystem Logging . .464 PARM Value . .468 Network Services Subsystem Logging . .468 Network IPC Subsystem Logging . .469 Using Log Files . .470 Internal Errors . .470 Informative and Non-Critical Errors . .470 Statistics Logging Example . .471 ARP Logging Location Codes . .475 Control Process Logging Location Codes . .479 NS Configurator Logging Location Codes . .534 CX Logging Location Codes . .539 DC/LDM Logging Location Codes. .542 Dial ID Logging Location Codes . .547 DSDAD Logging Location Codes . .556 DSSERVER Logging Location Codes . .559 DSUTIL Logging Location Codes . .561 ENV Logging Location Codes . .562 ICMP Type/Code Words . .564 IP Logging Location Codes . .568 IPU Logging Location Codes. .577 L2Resolve Logging Location Codes . .580 22. Logging Location Codes Continued Mapping Table . .586 Net Timers Logging Location Codes. .588 NETIPC Logging Location Codes . .601 NFT Logging Location Codes . .605 NI Logging Location Codes . .606 Path Result Code Table . .614 Probe Logging Location Codes . .616 PTOP Logging Location Codes . .620 PXP PM Logging Location Codes . .621 PXP SIP Logging Location Codes . .626 RASERVER Logging Location Codes . .630 Remote Link Manager Logging Location Codes . .635 RFA Logging Location Codes . .648 RPM Logging Location Codes . .653 4 Contents TCP Logging Locations . 657 UDP Logging Locations . 692 X.25 Logging Location Codes. 698 A. Submitting a CR B. Subsystem Identifiers C. Native Mode and Compatibility Mode Buffer Manager Error Codes 5 Contents 6 Figures Figure 21-1. Formatted Log Record . 462 Figure 21-2. Non-Critical Transport Error . 471 Figure 21-3. Logging Statistics Example . 472 7 Figures 8 Tables Table 21-1. Logging Subsystems and Class Names. 463 Table 21-2. Network Transport Entities . 465 Table 21-3. Network Service Modules . 469 Table B-1. Subsystem Identifiers . 717 Table C-1. Native Mode NS 3000/iX Buffer Error Codes . 725 Table C-2. Compatibility Mode Buffer Error Codes . 728 9 Tables 10 Preface.
Recommended publications
  • Lecture 8: Overview of Computer Networking Roadmap
    Lecture 8: Overview of Computer Networking Slides adapted from those of Computer Networking: A Top Down Approach, 5th edition. Jim Kurose, Keith Ross, Addison-Wesley, April 2009. Roadmap ! what’s the Internet? ! network edge: hosts, access net ! network core: packet/circuit switching, Internet structure ! performance: loss, delay, throughput ! media distribution: UDP, TCP/IP 1 What’s the Internet: “nuts and bolts” view PC ! millions of connected Mobile network computing devices: server Global ISP hosts = end systems wireless laptop " running network apps cellular handheld Home network ! communication links Regional ISP " fiber, copper, radio, satellite access " points transmission rate = bandwidth Institutional network wired links ! routers: forward packets (chunks of router data) What’s the Internet: “nuts and bolts” view ! protocols control sending, receiving Mobile network of msgs Global ISP " e.g., TCP, IP, HTTP, Skype, Ethernet ! Internet: “network of networks” Home network " loosely hierarchical Regional ISP " public Internet versus private intranet Institutional network ! Internet standards " RFC: Request for comments " IETF: Internet Engineering Task Force 2 A closer look at network structure: ! network edge: applications and hosts ! access networks, physical media: wired, wireless communication links ! network core: " interconnected routers " network of networks The network edge: ! end systems (hosts): " run application programs " e.g. Web, email " at “edge of network” peer-peer ! client/server model " client host requests, receives
    [Show full text]
  • QUESTION 20-1/2 Examination of Access Technologies for Broadband Communications
    International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies eport on broadband access technologies QUESTION 20-1/2 R International Telecommunication Union ITU-D THE STUDY GROUPS OF ITU-D The ITU-D Study Groups were set up in accordance with Resolutions 2 of the World Tele- communication Development Conference (WTDC) held in Buenos Aires, Argentina, in 1994. For the period 2002-2006, Study Group 1 is entrusted with the study of seven Questions in the field of telecommunication development strategies and policies. Study Group 2 is entrusted with the study of eleven Questions in the field of development and management of telecommunication services and networks. For this period, in order to respond as quickly as possible to the concerns of developing countries, instead of being approved during the WTDC, the output of each Question is published as and when it is ready. For further information: Please contact Ms Alessandra PILERI Telecommunication Development Bureau (BDT) ITU Place des Nations CH-1211 GENEVA 20 Switzerland Telephone: +41 22 730 6698 Fax: +41 22 730 5484 E-mail: [email protected] Free download: www.itu.int/ITU-D/study_groups/index.html Electronic Bookshop of ITU: www.itu.int/publications © ITU 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies DISCLAIMER This report has been prepared by many volunteers from different Administrations and companies.
    [Show full text]
  • Wang Systems Networking VS Network Core (Standard Components) Software Bulletin Release 8.21 Release 8.30
    ... ·.·,:·:··.···'Wang Systems Networkiitg VS Network Core (Standard Components) Software Bulletin Release 8.21 Release 8.30 .. ' ~ t -..~ ~. ·.J. ~ \~ --- ..,·I Wang Systems Networking VS Network Core (Standard Components) Software Bulletin Release 8.21 Release 8.30 1st Edition - July 1986 Copyright c Wang Laboratories, Inc., 1986 71 S-0542.01 i\'14§• WANG LABORATORIES, INC. ONE INDUSTRIAL AVE., LOWELL, MA 01851 TEL. (617) 459-5000, TWX 710-343-6769, TELEX 94-7421 Disclaimer of Warranties and Limitation of Liabilities The staff of Wang Laboratories, Inc., has taken due care in preparing this manual. How­ ever, nothing contained herein modifies or alters in any way the standard terms and conditions of the Wang purchase, lease, or license agreement by which the product was acquired, nor increases in any way Wang's liability to the customer. In no event shall Wang or its subsidiaries be liable for incidental or consequential damages in connection with or arising from the use of the product, the accompanying manual, or any related materials. Software Notice All Wang Program Products (software) are licensed to customers in accordance with the terms and conditions of the Wang Standard Software License. No title or ownership of Wang software is transferred, and any use of the software beyond the terms of the aforesaid license, without the written authorization of Wang, is prohibited. Warning This equipment generates, uses, and can radiate radio frequency energy and, if not ,~ installed and used in accordance with the instructions manual, may cause interference to radio communications. It has been tested and found to comply with the limits for a Class A computing device, pursuant to Subpart J of Part 15 of FCC rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment.
    [Show full text]
  • Telemedicine and Rural Health Care Applications 
    Symposium www.jpgmonline.com TTelemedicine elemedicine and Rural Health Care Applications Smith AC, Bensink M, Armfield N, Stillman J, Caffery L The University of ABSTRACTABSTRACTA ABSTRACTABSTRACTBSTRACT Queensland, Centre for Telemedicine has the potential to help facilitate the delivery of health services to rural areas. In the right Online Health, Australia. circumstances, telemedicine may also be useful for the delivery of education and teaching programmes and Correspondence: the facilitation of administrative meetings. In this paper reference is made to a variety of telemedicine applications Anthony C. Smith, in Australia and other countries including telepaediatrics, home telehealth, critical care telemedicine for new E-mail: [email protected] born babies, telemedicine in developing countries, health screening via e-mail, and teleradiology. These applications represent some of the broad range of telemedicine applications possible. An overriding imperative is to focus on the clinical problem first with careful consideration given to the significant organisational changes which are associated with the introduction of a new service or alternative method of service delivery. For telemedicine to be effective it is also important that all sites involved are adequately resourced in terms of staff, equipment, telecommunications, technical support and training. In addition, there are a number of logistical factors which are important when considering the development of a telemedicine service including site selection, clinician empowerment,
    [Show full text]
  • Introduction to Data Communications & Networks What Is Data Communication?
    LECTURE-1 Introduction to Data Communications & Networks What is data communication? Not to be confused with telecommunication— ◦ Any process that permits the passage from a sender to one or more receivers of information of any nature, delivered in any easy to use form by any electromagnetic system. What is data communication? Data communication- ◦ Defined as a subset of telecommunication involving the transmission of data to and from computers and components of computer systems. More specifically data communication is transmitted via mediums such as wires, coaxial cables, fiber optics, or radiated electromagnetic waves such as broadcast radio, infrared light, microwaves, and satellites. History of Telecommunications Invention of telegraph Samuel Morse – 1837 Invention of telephone- Alexander Graham Bell – 1876 Development of wireless – 1896 Concept of universal access and growth of AT&T (American Telephone & Telegraph) - 1983 History of Telecommunications Continued…. Telecommunications Act of 1996 Three main developments that led to the growth of data communications systems: ◦ Large-scale integration of circuits reduced the cost and size of terminals and communication equipment ◦ Developments of software systems made establishment of communication networks easy ◦ Competition among providers of transmission facilities reduced the cost of data circuits History of Data Communication Transistor developed by Bell Labs Hush-a-Phone Case Carterfone case MCI (Microwave Communications Inc.) and Long Distance Creation of networks (LAN’s and WAN’s) Data Link Protocols Microcomputers Hush-a-Phone Case The Hush-A-Phone was a device designed to attach to the transmitter of a telephone to reduce noise pollution and increase privacy. A voice silencer designed for confidential conversation, clear transmission and office quiet.
    [Show full text]
  • 1 China's CSNET Connection 1987 – Origin of the China Academic
    China’s CSNET Connection 1987 – origin of the China Academic Network CANET by Werner Zorn (29.06.2012, 23:00/10.07.2012) Hasso-Plattner-Institute at Potsdam University/KIT - Karlsruhe Institute of Technology The Chinese – German computer network cooperation, leading to the E-Mail “Across the Great Wall we can reach every corner in the world” on Sep. 14, 1987, had its origin in a World Bank project 1982, out of which 19 Chinese universities were equipped with SIEMENS computers. Prof. Wang Yunfeng, being the lead of that project from the university side, renewed his contacts to the German scientific- technical community from the 1940ies, as he studied machinery in Berlin as scholar of the Humboldt foundation. The important milestones within our cooperation are listed in the following timeline, chosen under the aspect that, if not successfully reached, the project itself would have ended at that point unconditionally. An explanation strictly following the timeline might be boring and also unnecessary with respect to the available literature [1]. It was therefore decided to comment and emphasize selected items under the following aspects: The key note speech in 09/1983 about the newly launched DFN-project in Germany immediately raised the request from the audience of not only telling but also supporting the participating institutes and scientists in building up similar network infrastructures and services in China. This whole issue took place at a time, where such networks did not exist in Germany, nor elsewhere in Europe, and regarding the underlying OSI-architecture and protocols nowhere in the world, not even in US.
    [Show full text]
  • Module 2 Communication Switching
    Module 2 Communication Switching Version 1 ECE , IIT Kharagpur Lesson 3 Message and Packet Switching Version 1 ECE , IIT Kharagpur LESSON OBJECTIVE General This lesson will develop the concepts of message and packet switching. Specific The learner shall be able to 1. Understand what are Message and Packet switching. 2. Know the application of Packet switching. 3. Know statistical multiplexing and its usefulness. 2.2.1 MESSAGE SWITCHING It has been explained earlier that switching plays a very important role in telecommunication networks. It enables any two users to communicate with each other. Voice being a very vital medium of human communication, telephone was invented. It permitted long distance voice communication. The need of a user to talk to a desired person out of many persons on a real time basis lead to the concept of establishing a direct path between the caller and the called users. Circuit switching was conceived to be an appropriate technique for the purpose. Telephone systems use circuit switching largely to date because it serves the purpose very well. However, a major drawback of circuit switching is the requirement of a dedicated path between the calling and the called parties. This means reserving resources like the chain of switches and transmission media over the entire path. This is obviously a costly proposition. A question arises : is there a cheaper solution? It took quite some time – many years to get the answer. However, it is interesting to know that electrical communication in the form of Telegraph arrived earlier than the Telephone. Further, telegraph was much cheaper than telephone communication.
    [Show full text]
  • The Road to Telehealth
    THE ROAD TO TELEHEALTH Kathy J. Chorba Executive Director [email protected] What Is Telemedicine? Direct clinical care provided from a distance using electronic communication to provide or support clinical care What Is Telehealth? Telehealth is a more global term, which includes Telemedicine and other uses of communication technology • Health Professional Education • Disaster Response • Public Health • Consumer Education • Evaluation Research • Regional Health Information Sharing Telemedicine Technologies • Live video is used for real-time patient-provider consultations, provider-to-provider discussions, and language translation services. • Store & Forward technologies electronically transmit patient information between primary care providers and medical specialists. Information could include digital images, X-rays, video clips and photos. • Remote patient monitoring uses telehealth technologies to collect medical data from patients in one location and electronically transmit that information to health care providers in a different location, real-time and/or store & forward. Live Video Teleconsultation Live Video is used for real-time patient-provider consultations, provider-to-provider discussions, and language translation services. High-speed broadband Outpatient or Inpatient specialty consultation “The Primary Care Provider can’t be an expert in every field” Javeed Siddiqui, MD, Infectious Disease Specialist Telehealth specialty Referring •Education catered to the consultation gives individual needs Provider •Reduced Isolation
    [Show full text]
  • The Project the Project IP Contribution at Work Now and in the Future
    TheThe ProjectProject IPIP contributioncontribution atat workwork NowNow andand inin thethe futurefuture Abdelrahim Suleiman ASBU Technical Director Jean-Pierre De Muyt VP Sales Newtec Agenda •The drivers • What it is now • The network opening up • The technology •Future roadmap ASBU : The next generation network This presentation outlines the implementation of the new ASBU Network based on the latest advanced technologies. MENOS Network (Multimedia Exchange Network Over Satellite), as first of its kind, enables new business models and create tremendous opportunities for the ASBU members and all potential users in the value chain of satellite networks. ASBU Broadcasters challenges • Multi-channel, multi-platform universe — requires massive investment to keep pace • Cost of current generation Audio- and TV Earth Station • Cost of keeping up with technology CAPEX changes (DVB-S2, MPEG-4) and • New service demands (VoIP, Store & Forward, Archiving, File Exchange, E-mail, Internet Access, …) • Complexity of managing multiple networks & technologies • Cost-efficient exchange of data, voice, audio OPEX and video • Supporting a broad range of TX bit rates • Careful manual planning & coordination of transmissions in pre-defined satellite slots • Control & Manage multitude of services (Video, Audio, Data, Tel., Intranet, …) ASBU Key Advantages • Easy to use terminals –Always on –Automated • Lower terminal cost –Small, low power –IP based • Higher flexibility – Multiplexing of all services over IP • Lower operational cost – Better use of space capacity
    [Show full text]
  • Telemedicine in College Health: Pre-Travel Consultations
    Telemedicine in College Health: Pre‐travel consultations Bill Neighbor, MD and Anne Terry, ARNP Objectives 1. To identify potential uses for telemedicine services within a clinical system focused on college health 2. To understand how to implement a telemedicine program 3. To understand reimbursement for telemedicine services Purpose • Our purpose is to ensure that clinicians providing health care to college students are aware that telemedicine services can be utilized. Overview Terminology • Telehealth—larger umbrella including telenursing, telepharmacy • Telemedicine=delivery of medical care Types of Telehealth • Asynchronous=Store and Forward, e.g., E‐care • Synchronous=Interactive in real time • Remote monitoring=data gathered from devices stored in EHR • Case‐based teleconferencing • Mobile health—uses mobile devices Examples of use by specialty • Radiology—half of all telehealth • Trauma • Dermatology • Preventive health services (exercise, nutrition, weight, tobacco) • Mental Health • Diabetes • Stroke • Prison Health • Burns • Community Health Services, .e.g, • Pain management Extension for Community Health Outcomes (ECHO) at UW Why Telehealth • Access • Low‐value in office visits • Cost of care in dollars • Technologies becoming less expensive • Cost of care in patient time and tavel • High mobile phone use • Cost of care in facilities • Potential for greater patient • Lost work time involvement in their own care (eg. mobile apps) • Coordination of care & health outcomes Barriers • Reimbursement • Security and Privacy • Privileging
    [Show full text]
  • Circuit Switching
    Circuit Switching Network resources (e.g., bandwidth) divided into “pieces” Pieces allocated to and reserved for calls Computer Networks Resource idle if not used by owner (no sharing) Ways to divide link bandwidth into “pieces” • frequency division multiplexing (FDM) frequency Example: Lecture 36: 4 users time QoS, Priority Queueing, VC, WFQ • time division multiplexing (TDM) frequency time Packet Switching Bandwidth division into “pieces” Packet Switching: Dedicated allocation Each end-to-end data stream Resource reservation Statistical Multiplexing divided into packets 10 Mbps C Packets from multiple users share network resources A Ethernet statistical multiplexing Each packet uses full link bandwidth B 1.5 Mbps Resources used as needed queue of packets waiting for output Resource contention: link • aggregate resource demand can exceed amount available D • congestion: packets queued, wait for link use E • store and forward: packets move one hop at a time Sequence of A’s and B’s packets does not have a fixed • each node receives complete packet before forwarding pattern ⇒ statistical multiplexing Packet vs. Circuit Switching Pros and Cons of Packet Switching Packet switching allows more users to use network! Advantages: great for bursty data • resource sharing For example: • simpler, no call setup • 1 Mbps link • each user: • sends 100 kbps when “active” Disadvantages: excessive congestion, N users • active 10% of time 1 Mbps link packet delay and loss • protocols needed for reliable data transfer circuit-switching: 10 users • congestion control • no service guarantee: “best-effort” service packet switching: with 35 users, probability that more than 10 are active at the same time < .0004 Better than Best-Effort Service Example: HTTP vs.
    [Show full text]
  • Telehealth Laws State & Reimbursement Policies
    FALL 2019 FALL STATE TELEHEALTH LAWS & REIMBURSEMENT POLICIES A COMPREHENSIVE SCAN OF THE 50 STATES & THE DISTRICT OF COLUMBIA & THE DISTRICT OF THE 50 STATES SCAN A COMPREHENSIVE State Telehealth Laws and Medicaid Program Policies INTRODUCTION The Center for Connected Health Policy’s (CCHP) Fall 2019 release of the “State Telehealth Laws and Reimbursement Policies” report highlights the changes that have taken place in state telehealth policy. The report offers policymakers, health advocates, and other interested health care professionals a summary guide of telehealth-related policies, laws, and regulations for all 50 states and the District of Columbia. While this guide focuses primarily on Medicaid fee-for-service policies, information on managed care is noted in the report if it was available. The report also notes particular areas where we were unable to find information. Every effort was made to capture the most recent policy language in each state as of September 2019. Recently passed legislation and regulation have also been included in this version of the document with their effective date noted in the report (if applicable). This information also is available electronically in the form of an interactive map and search tool accessible on our website cchpca.org. Consistent with previous editions, the information will be updated biannually, as laws, regulations and administrative policies are constantly changing. TELEHEALTH POLICY TRENDS States continue to refine and expand their telehealth reimbursement policies though they are not treated across the board in the same manner as in-person delivered services. Limitations in regards to reimbursable modality, services and location of the patient continue to be seen.
    [Show full text]