Device Diagnostic. Introduction
|
|
- Mabel Warren
- 6 years ago
- Views:
Transcription
1 Object Dictionary 1 Device Diagnostic Introduction The Device Diagnostic object supports various diagnostic functions of the device and monitors the device for an overload condition. This object allows a user to view diagnostic statistics of a device such as an N30 Supervisory Controller. May 1, 2002 Johnson Controls, Inc. Code No. LIT Software Release 5.1
2 2 Device Diagnostic Key Concepts Device Overload An overload condition indicates the device is not performing at a satisfactory level. hen an overload condition is detected, the device or the network of devices to which this device is connected may need to be re-engineered to reduce the load on this device. This may include reducing the number of objects contained by the device or adjusting attributes of objects within the device, or other devices, to reduce the burden on the device. It is possible that a device may be overloaded, but the Device Diagnostic object does not detect the condition. Alternatively, the Device Diagnostic object may report an overload condition on a device that is functioning at an acceptable level. The Device Diagnostic object only uses the following criteria for detecting an overload condition: If the lowest available size of the acquired memory pool (Acquired Pool Size attribute of the N30 Device object) drops to 35,000 bytes or less, the device begins to discard all incoming and outgoing communication messages and internally generated alarm messages until the available size of this pool increases. This check is made 15 minutes after a device startup or restart and every 30 minutes thereafter. The acquired memory pool is used for short-term use including communication messages. In this mode, the device may go offline or other devices may be reported offline, control may be lost, and alarm messages may be lost. An over-used network causes this overload condition most often.
3 Object Dictionary 3 If the average Central Processing Unit (CPU) idle time on the device is less than the Overload Threshold attribute of the device object, the default value is 50%, and the average CPU idle time is calculated every 8 seconds using a running average as follows: Average idle = Average idle + (Current Idle Average Idle) * 1% Using this formula, a device that runs at 0% idle time continuously is flagged as overloaded 9 minutes after restart or startup. A device that runs at 50% idle time is flagged as overloaded in about 90 minutes. The formula design allows high CPU usage for short periods of time. A low CPU idle time suggests the device is slow to respond to changing conditions. Note: Changing the Period attribute of this object from the default 8 seconds alters the timing of the overload calculation. An overload condition reports to the user through an alarm message on a device with the text CPU overload or Memory overload, an error log entry, and by the Device Overload attribute of this object. The device generates, at most, one message of each type after a startup or restart. There is no message to indicate a return to normal loading.
4 4 Device Diagnostic Attributes Specific Attributes Table 1: Attribute Properties Attribute Name Metasys Common Attributes Data Type Table 1 lists attributes specific to the Device Diagnostic object. The Device Diagnostic object also has the attributes of the Metasys Common object. Refer to Table 1 in the Metasys Common Object chapter (LIT ) for details. N30 Flags* N30 Default Value Options/Range See Table 1 in the Metasys Common Object chapter (LIT ). Average Idle Float Percent BACnet Object Type BACnet OID Allocated BACnet OID Used Enumerated BACnet Superclass of Object Type Comtest Dest String Maximum 32 characters Comtest orst Comtest Ave Device Overload Enable Diagnostic Error Log Last Idle Sample Last Method Message Receives Method to Stop Track Method To Track Object To Stop Track Float 0 Float Enumeration Normal Normal Memory Overload CPU Overload Boolean False Octet String Float Continued on next page... * - ritable Percent Milliseconds
5 Object Dictionary 5 Attribute Name (Cont.) Object To Track Other Message Count Peak Method Period Record Count Sign Pri Db Size Sign Pri Peak Sign Pri Used Surrogate Cache Cnt Surrogate Cache Max Task Exec Message Count r Db Size r Peak r Used Total Record Count * - ritable Data Type List of N30 Flags* N30 Default Value Options/Range 0 Milliseconds 8 Seconds List of Structures each containing: Task ID Runtime in milliseconds BACoid
6 6 Device Diagnostic Attribute Definitions Table 2: Attribute Definitions Attribute Name Metasys Common Attributes Average Idle BACnet Object Type BACnet OID Allocated BACnet OID Used Comtest Dest Comtest orst Comtest Ave Device Overload Enable Diagnostic Error Log Last Idle Sample Last Method Message Receives Method to Stop Track Method To Track Object To Stop Track Object To Track Table 2 lists the definitions of the attributes specific to Device Diagnostic object. Definition See Table 2 in the Metasys Common Object chapter (LIT ). Displays the average percent of the time the device is running in the idle task. Contains the generic BACnet base (super) class for the object. Displays the number of entries available in the BACnet Object Identifier (BACoid) table. This table maps external BACoid numbers to internal object identifiers. Every object available that communicates via BACnet requires a unique BACoid. Displays the number of entries currently in use in the BACoid table. Indicates the destination object for the communications test. Indicates the longest time for a message to complete during a communications test. Indicates the average time for a message to complete during a communications test. Indicates if a device overload condition has been detected since the last device startup or restart. hen this attribute is not Normal, refer to the device error log for additional information. The value can be reset to Normal only by a device restart or startup. The value reflects the last detected condition since the last restart or startup. Activates the method timing feature built into the Object Method (code execution). hen enabled, six other attributes provide a way to measure the duration of any method of any object or the start of the method of one object until the completion of the method of another object. The six attributes are Peak Method, Last Method, Method to Track, Object to Track, Method to Stop Track, Object to Stop Track. It should normally be disabled. Represents the error log as an octet string. Used for advanced troubleshooting. Displays the last sample of the processor idle time calculated. Displays the last measured time for the method sequence being timed. Indicates the total number of messages received as part of the communications test. Specifies the method number which, along with the Object to Stop Track, completes a timing sequence. To time a particular method of an object, this would normally be set to the same value as the Method to Track. Indicates the method number which, along with the Object to Track, defines when a new timing sequence starts. Timing begins any time this method of the specified object starts. Indicates the internal Object Identifier of the object whose method, when complete, completes a timing sequence. Upon completion, the Last Method is updated as well as the Peak Method if this is a new Peak Method. Indicates the internal Object Identifier of the object whose method the timing should start on. Other Message Count Displays the number of messages excluding periodic timer messages received by the object engine. This includes both offbox as well as onbox messages; Offbox meaning messages are not on (or off of) the local device, such as an N30 Supervisory Controller, and onbox meaning messages are on the local device. Continued on next page...
7 Object Dictionary 7 Attribute Name (Cont.) Peak Method Period Record Count Sign Pri Db Size Sign Pri Peak Sign Pri Used Surrogate Cache Cnt Surrogate Cache Max Task Exec Message Count r Db Size r Peak r Used Total Record Count Definition Resets to zero when any of the attributes of this feature are modified. It returns in milliseconds the worst case time measured for the method sequence being timed. This attribute supports triggering (automatically updating when a value changes). Defines in seconds how often this object will run and update the Average Idle and Last Idle Sample attributes as well as the Device Overload attribute. Displays the total number of entries currently used in the object database. Displays the total number of entries available in the signup/priority database for reading attribute signups and prioritized writes to attributes. Displays the largest number of entries ever used in the signup/priority. Displays the total number of entries currently used in the signup/priority database. Displays the current number of entries used in the surrogate cache. This is a cache of offbox references no longer used by the device, but kept in memory to optimize a future reference. Displays the maximum number of entries allowed in the surrogate cache. Contains task runtime information. Used for advanced troubleshooting. Displays the number of timer messages received by the object engine. Displays the total number of entries available in the timer database. This database is used to queue incoming messages to objects either from offbox or onbox. Displays the largest number of entries ever used in the timer database. Displays the total number of entries currently used in the timer database. Returns the number of entries currently available in the object database. This database will hold each object in the device as well as each string and list information. Controls Group 507 E. Michigan Street P.O. Box 423 Milwaukee, I Printed in U.S.A.
Object Dictionary 1. Pager. Introduction
Object Dictionary 1 Pager Introduction The Pager object provides alarm notifications via pager to personnel at a remote location who would otherwise not be aware of the alarm coming into a workstation
More informationN2 Analog Input/ BACnet Analog Input
Object Dictionary 1 N2 Analog Input/ BACnet Analog Input Introduction Note: The Johnson Controls N2 Analog Input object is considered a BACnet Analog Input object because it supports BACnet functionality.
More informationRuntime Totalization. Introduction
Object Dictionary 1 Runtime Totalization Introduction The Runtime Totalization object tracks the time that elapses while a designated input, such as a binary or multistate value, matches a specified state.
More informationDisplay. Introduction
Object Dictionary 1 Display Introduction The Display object configures the display of a Local Display Terminal (LDT) in an N30 supervisory controller. Use Project Builder to create a Display object for
More informationMultistate Value/ BACnet Multistate Value
Object Dictionary 1 Multistate Value/ BACnet Multistate Value Introduction Note: The Johnson Controls Multistate Value object is considered a BACnet Multistate Value object because it supports BACnet functionality.
More informationN2 Binary Input/ BACnet Binary Input
Object Dictionary 1 N2 Binary Input/ BACnet Binary Input Introduction Note: The Johnson Controls Binary Input object is considered a BACnet Binary Input object, because it supports BACnet functionality.
More informationN2 Multistate Output/ BACnet Multistate Output
Object Dictionary 1 N2 Multistate Output/ BACnet Multistate Output Introduction Note: The Johnson Controls N2 Multistate Output object is considered a BACnet Multistate Output object because it supports
More informationN2 Binary Output/ BACnet Binary Output
Object Dictionary 1 N2 Binary Output/ BACnet Binary Output Introduction Note: The Johnson Controls Binary Output object is considered a BACnet Binary Output object because it supports BACnet functionality.
More informationTrend Log/BACnet Trend Log
Object Dictionary 1 Trend Log/BACnet Trend Log Introduction Notes: The Johnson Controls Trend Log object is considered a BACnet Trend Log object because it supports BACnet functionality. In addition, this
More informationEthernet IP Datalink. Introduction
Object Dictionary 1 Ethernet IP Datalink Introduction The Ethernet Internet Protocol (IP) Datalink object manages the Ethernet communications bus and the messages transmitted on it. This object allows
More informationSchedule/BACnet Schedule
Object Dictionary 1 Schedule/BACnet Schedule Introduction Note: The Johnson Controls Schedule object is considered a BACnet Schedule object because it supports BACnet functionality. In addition, this object
More informationDownloading Metasys Integrator 300 Series Code
M-Tool Manual 693 System Tools Applications Section Issue Date 0101 APPLICATION NOTE Downloading Metasys Integrator 300 Series Code Downloading Metasys Integrator 300 Series Code...3 Introduction...3 Key
More informationWorking with Runtime Totalization Objects
N30 Supervisory Controller User s Manual 25-1 Chapter 25 Working with Runtime Totalization Objects Introduction The Runtime Totalization object tracks the number of one minute time intervals that elapse
More informationGuidelines and Recommendations for Better Graphics Performance with Integrated N1 Networks
M-Graphics User s Manual G-1 Appendix G Guidelines and Recommendations for Better Graphics Performance with Integrated N1 Networks Introduction This chapter discusses guidelines and recommendations for
More informationWorking with Demand Limiting/Load Rolling (DLLR) Objects
N30 Supervisory Controller User s Manual 19-1 Chapter 19 Working with Demand Limiting/Load Rolling (DLLR) Objects Introduction The Demand Limiting/Load Rolling (DLLR) object selectively sheds loads to
More informationWorking with Objects and the M-View Screen
Project Builder User s Guide 6-1 Chapter 6 Working with Objects and the M-View Screen Introduction The Project Builder uses a variety of objects to configure controllers and perform tasks. This chapter
More informationTECHNICAL BULLETIN. Using M-Authorize. Using M-Authorize...2. Introduction Key Concepts... 3
Issue Date May 31, 2002 TECHNICAL BULLETIN Using M-Authorize Using M-Authorize...2 Introduction... 2 Key Concepts... 3 Software Authorization... 3 Johnson Controls Software Authorization Form... 3 Detailed
More informationBACnet Controller Integration with NAE/NCE/ODS Technical Bulletin
BACnet Controller Integration with NAE/NCE/ODS Technical Bulletin Code No. LIT-1201531 Software Release 9.0 Issued August 2017 Refer to the QuickLIT website for the most up-to-date version of this document.
More informationSite Book User s Guide
Issue Date 11/01/01 USER S GUIDE...3 Introduction... 3 Key Concepts... 5 Related Documentation...5 Communications Options...5 N30 Supervisory Controller...5 Project Builder...6 N30 Upgrade Utility...6
More informationWorking with BACnet Group Objects
N30 Supervisory Controller User s Manual 33-1 Chapter 33 Working with BACnet Group Objects Introduction Note: Do not confuse the BACnet Group object with the Johnson Controls Group object. For information
More informationUsing M-Collector. Using M-Collector...2. Introduction Key Concepts... 3
Technical Bulletin Issue Date October 3, 2003 Using M-Collector Using M-Collector...2 Introduction... 2 Key Concepts... 3 M-Collector... 3 Configuration... 3 Runtime Display...4 Maximum Capacity... 6 Collection
More informationP2000 Commend Intercom Interface Option
P2000 Commend Interface Option Product Bulletin Code No. LIT-12012142 Software Release 3.14 Issued November 30, 2015 Johnson Controls offers a purchase option that enables the P2000 Security Management
More informationM-Password Application Actions
Issue Date 11/01/01 TECHNICAL BULLETIN M-Password s M-Password s...3 Introduction... 3 Key Concepts... 4 M-Password s...4 Analog Profile s...5 AWX Container (M-Alarm View) s...5 AWXInd32 (M-Alarm Indicator)
More informationDirect Connect and Dial-Up Connection on Windows 2000 Operating Systems
Application Note Issue Date March 6, 2003 Direct Connect and Dial-Up Connection on Windows 2000 Operating Systems Direct Connect and Dial-Up Connection on Windows 2000 Operating Systems...2 Introduction...
More informationMetasys Database Manager Installation Instructions Code No. LIT Software Release 9.0 Issued August 2017
Code No. LIT-12011553 Software Release 9.0 Issued August 2017 Refer to the QuickLIT website for the most up-to-date version of this document. Document Introduction...2 Summary of Changes...2 Metasys Database
More informationN30 Supervisory Controller Quick Start
Issue Date June 30, 2004 TECHNICAL BULLETIN N30 Supervisory Controller Quick Start N30 Supervisory Controller Quick Start...2 Introduction... 2 Key Concepts... 3 Using This Document... 3 Related Information...
More informationLanguage Installation Program Installation Instructions Code No. LIT Software Release 3.0 Issued August 2017
Code No. LIT-12011793 Software Release 3.0 Issued August 2017 Refer to the QuickLIT website for the most up-to-date version of this document. LIP Document Introduction...2 Summary of Changes...2 LIP Documentation...2
More informationMetasys Integrator Powerware Application (previously the Exide Application)
Application Note Issue Date 11/01/01 APPLICATION NOTE Metasys Integrator Powerware Application (previously the Exide Application) lntroduction Page Application Details Component Requirements 4 Vendor Contact
More informationMetasys BACnet System Integrator (BSI) Monitoring
Metasys Connectivity Technical Manual 629.5 Metasys BACnet System Integrator Section Issue Date 73 TECHNICAL BULLETIN Metasys BACnet System Integrator (BSI) Monitoring Monitoring the BSI Communicator...2
More informationM-Alarm Multimedia Extension (MMX)
Issue Date June 18, 2002 PRODUCT BULLETIN M-Alarm Multimedia Extension (MMX) With M-Alarm Multimedia Extension (MMX) software, M-Series Workstations provide direct and comprehensive alarm notification
More informationAPPLICATION NOTE JC/85
Metasys Network Technical Manual 636 App. Notes: Network Communications Section Application Note Issue Date 0401 APPLICATION NOTE JC/85 Gateway Introduction Page 3 Application Details *3 Hardware and Software
More informationMetasys Web Access System Overview
Technical Bulletin Issue Date February 18, 2003 Metasys Web Access System Overview Metasys Web Access System Overview...2 Introduction... 2 Key Concepts... 3 Related Information... 3 Hardware and Software
More informationCHAPTER 11 INTERRUPTS PROGRAMMING
CHAPTER 11 INTERRUPTS PROGRAMMING Interrupts vs. Polling An interrupt is an external or internal event that interrupts the microcontroller To inform it that a device needs its service A single microcontroller
More informationMetasys System Extended Architecture
Product Bulletin Issue Date March 31, 2003 Metasys System Extended Architecture The architecture of the Metasys building automation and facilities management system has been extended to be fully compatible
More informationProject Builder User s Guide
M-Tool Manual 693 Project Builder Section Issue Date 0401 Table of Contents Project Builder User s Guide Table of Contents...1 Chapter 1 Using This Guide...1-1 Introduction... 1-1 Key Concepts... 1-2 User
More informationChapter 8: Virtual Memory. Operating System Concepts
Chapter 8: Virtual Memory Silberschatz, Galvin and Gagne 2009 Chapter 8: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating
More informationLCS85 Turnkey User's Guide Part No , Rev. F Software Release 6.1 Issued June 17, 2013 Supersedes January 30, 2011
MS-LCS8520-0 Part No. 24-10526-11, Rev. F Software Release 6.1 Issued June 17, 2013 Supersedes January 30, 2011 Refer to the QuickLIT website for the most up-to-date version of this document. LCS85 Turnkey
More informationAppendix C: Advanced Video Settings
Appendix C: Advanced Video Settings C.1 Configuring a Video Capture Device The Multimedia Video Agent allows you to send a video or a video snapshot to a computer providing alarm information. The general
More informationCall-in Agent Configuration 9
Call-in Agent Configuration 9 9.1 Overview of the Call-in Agent The Call-in Agent enables users to access OPC data over the phone. The Call-in Agent configuration sets up the voice and key entries and
More informationMetasys System Extended Architecture Glossary
Technical Bulletin Issue Date March 31, 2003 Metasys System Extended Architecture Glossary Key Concepts... 2 Metasys System Extended Architecture Component Acronyms... 2 Metasys System Extended Architecture
More informationMetasys Integrator GE Lighting Application
Metasys Connectivity Technical Manual 629.5 Metasys Integrator Section Application Note Issue Date 0998 APPLICATION NOTE Metasys Integrator GE Lighting Application lntroduction Page 3 Application Details
More informationImplementing and Monitoring Alarms and Alarm Log Correlation
Implementing and Monitoring Alarms and Alarm Log Correlation This module describes the concepts and tasks related to configuring alarm log correlation and monitoring alarm logs and correlated event records.
More informationMetasys Integrator Graham Application
Metasys Connectivity Technical Manual 629.5 Metasys Integrator Section Application Note Issue Date 0496 APPLICATION NOTE Metasys Integrator Graham Application Introduction Page 3 Application Details 3
More informationMetasys Integrator Multistack Application
Metasys Connectivity Technical Manual 629.5 Metasys Integrator Section Application Note Issue Date 0998 APPLICATION NOTE Metasys Integrator Multistack Application lntroduction Page *3 Application Details
More informationChapter 9: Virtual Memory
Chapter 9: Virtual Memory Silberschatz, Galvin and Gagne 2013 Chapter 9: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating
More informationMetasys Export Utility Installation Instructions Code No. LIT Software Release 9.0 Issued August 2017
Code No. LIT-12011527 Software Release 9.0 Issued August 2017 Refer to the QuickLIT website for the most up-to-date version of this document. Introduction...2 Summary of Changes...2 Metasys Help Files...2
More informationAppendix C: HVAC PRO Modules
FANs 637.5, 1637.5 Appendix Section Issue Date 0400 APPLICATION NOTE Appendix C: HVAC PRO Modules HVAC PRO Modules...3 Introduction...*3 Key Concepts...*4 ABS VALUE... 6 ADD... 6 ANALOG OUTPUT... 6 AND...
More informationICC. Metasys N2 Master Driver Manual INDUSTRIAL CONTROL COMMUNICATIONS, INC Industrial Control Communications, Inc.
INDUSTRIAL CONTROL COMMUNICATIONS, INC. Metasys N2 Master Driver Manual January 5, 2018 2018 Industrial Control Communications, Inc. TABLE OF CONTENTS 1 Metasys N2 Master... 2 1.1 Overview... 2 1.2 Connections...
More informationDirect Connect and Dial-Up on Windows 98
N30 Supervisory Controller System Communications Manual 689.3 Application Notes Section Issue Date 0101 APPLICATION NOTE Direct Connect and Dial-Up on Windows 98 Direct Connect and Dial-Up on Windows 98...3
More informationI through R. IP SLA Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) 1
I through R icmp-echo, page 2 icmp-jitter, page 4 ip sla, page 6 ip sla group schedule, page 9 ip sla logging traps, page 17 ip sla low-memory, page 19 ip sla reaction-trigger, page 21 ip sla reset, page
More informationM-Tool. Features and Benefits System Configuration and Project Management. Allows fast adjustment and commissioning of systems
Product Bulletin Issue Date July 6, 2006 Supersedes June 30, 2004 M-Tool M-Tool transforms the way you create control strategies by providing a suite of tools with an intuitive and efficient work environment.
More informationMetasys Integrator United Power Application
Metasys Connectivity Technical Manual 629.5 Metasys Integrator Section Application Note Issue Date 0998 APPLICATION NOTE Metasys Integrator United Power Application lntroduction Page 3 Application Details
More informationPerformance Objects and Counters for the System
APPENDIXA Performance Objects and for the System May 19, 2009 This appendix provides information on system-related objects and counters. Cisco Tomcat Connector, page 2 Cisco Tomcat JVM, page 4 Cisco Tomcat
More informationVoice Performance Statistics on Cisco Gateways
Voice Performance Statistics on Cisco Gateways The Voice Performance Statistics on Cisco Gateways feature enables the collection of voice call signaling statistics and VoIP AAA accounting statistics based
More informationPerforming Basic System Management
This module describes the basic tasks that you can perform to manage the general system features of the Cisco IOS software--those features that are generally not specific to a particular protocol. Finding
More informationTransport Protocols. Raj Jain. Washington University in St. Louis
Transport Protocols Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 16-1 Overview q TCP q Key features
More informationConfiguring BACP. Cisco IOS Dial Technologies Configuration Guide DC-667
This chapter describes how to configure the Bandwidth Allocation Control Protocol (BACP), described in RFC 2125. It includes the following main sections: BACP Overview How to Configure BACP Monitoring
More informationMetasys Integrator Allen-Bradley Custom Application
Metasys Connectivity Technical Manual 629.5 Metasys Integrator Section Application Note Issue Date 0998 APPLICATION NOTE Metasys Integrator Allen-Bradley Custom Application Introduction Page 3 Application
More information1. Introduction. Be sure to read the release notes in section 10 before operating the Unit.
1. Introduction This manual describes the ways of configuring and monitoring the operation of the PROFINET IO Controller CJ1W-PNT Sample Version V0.00 V67.06 V0.00 (Internal release V6.29). Be sure to
More informationOPERATING SYSTEM. Chapter 9: Virtual Memory
OPERATING SYSTEM Chapter 9: Virtual Memory Chapter 9: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating Kernel Memory
More informationCS307: Operating Systems
CS307: Operating Systems Chentao Wu 吴晨涛 Associate Professor Dept. of Computer Science and Engineering Shanghai Jiao Tong University SEIEE Building 3-513 wuct@cs.sjtu.edu.cn Download Lectures ftp://public.sjtu.edu.cn
More informationConfiguring QoS. Finding Feature Information. Prerequisites for QoS. General QoS Guidelines
Finding Feature Information, on page 1 Prerequisites for QoS, on page 1 Restrictions for QoS, on page 2 Information About QoS, on page 2 How to Configure QoS, on page 10 Monitoring Standard QoS, on page
More informationNxE85 Commissioning Guide
MS-NIE85SW-0, MS-NAE85SW-0 Code No. LIT-12011044 Software Release 9.0 Issued August 2017 Refer to the QuickLIT website for the most up-to-date version of this document. Document Introduction...2 Summary
More informationImplementing and Monitoring Alarms and Alarm Log Correlation
Implementing and Monitoring Alarms and Alarm Log Correlation This module describes the concepts and tasks related to configuring alarm log correlation and monitoring alarm logs and correlated event records.
More informationWilliam Stallings Data and Computer Communications. Chapter 10 Packet Switching
William Stallings Data and Computer Communications Chapter 10 Packet Switching Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection
More informationEthernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub
Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames
More informationConfiguring QoS. Finding Feature Information. Prerequisites for QoS
Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration
More informationAPPLICATION NOTE. N2 Dial Application. Using N2 Dial...3. Introduction...3. Key Concepts...4
FANs 637.5, 1637.5 N2 Dial Section Issue Date 0400 APPLICATION NOTE N2 Dial Application Using N2 Dial...3 Introduction...3 Key Concepts...4 N2 Dial Configuration... 4 Downloading with N2 Dial...*6 Dial-in
More informationChapter 8: Virtual Memory. Operating System Concepts Essentials 2 nd Edition
Chapter 8: Virtual Memory Silberschatz, Galvin and Gagne 2013 Chapter 8: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating
More informationMetasys System Extended Architecture Overview
Technical Bulletin Issue Date March 31, 2003 Metasys System Extended Architecture Overview Metasys System Extended Architecture Overview...2 Introduction... 2 Key Concepts... 4 Metasys System Extended
More informationN30 Device. Introduction
Object Dictionary 1 Introduction Note: The Johnson Controls object functions differently than the BACnet Device object. For information on the BACnet Device object, refer to the BACnet Device chapter (LIT-694150)
More informationChapter 9: Virtual-Memory
Chapter 9: Virtual-Memory Management Chapter 9: Virtual-Memory Management Background Demand Paging Page Replacement Allocation of Frames Thrashing Other Considerations Silberschatz, Galvin and Gagne 2013
More informationSNMP Monitoring. Hardware Monitoring OIDs DefensePro Version 8.x
SNMP Monitoring Hardware Monitoring OIDs DefensePro Version 8.x Rev. 2-11/11/2018 SNMP Monitoring: Hardware Monitoring OIDs Rev 2 Page 2 TABLE OF CONTENTS 1 HEALTH RELATED OIDS...5 1.1 RDWRDUALPSUSTATUS...
More informationOutput Drops Due to QoS on Access Layer Switches Troubleshooting TechNote
Output Drops Due to QoS on Access Layer Switches Troubleshooting TechNote Document ID: 116089 Contributed by Shashank Singh, Cisco TAC Engineer. May 18, 2013 Contents Introduction Prerequisites Requirements
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationMetasys Integrator Caterpillar Application
Application Note Issue Date May, 00 APPLICATION NOTE Metasys Integrator Caterpillar Application Introduction Application Details Component Requirements Vendor Contact Information Design Considerations
More informationCisco IOS Firewall Intrusion Detection System Commands
Cisco IOS Firewall Intrusion Detection System Commands This chapter describes the commands used to configure the integrated Intrusion Detection System (IDS) features in Cisco IOS Firewall. Intrusion detection
More informationLinksys Stackable Switches
TECHNICAL BULLETIN Linksys Stackable Switches How to Build Stacks and Understand Their Operation This document describes how to stack Linksys switches and covers advanced stacking information, as well
More informationS300-DIN-RDR2SA Address Mode Configuration
Technical Bulletin Issue Date August 17, 2010 S300-DIN-RDR2SA Address Mode Configuration The S300-DIN-RDR2SA (also referred to as ) can be addressed in two ways: legacy mode and physical address mode.
More informationConfiguring IP SLAs LSP Health Monitor Operations
Configuring IP SLAs LSP Health Monitor Operations This module describes how to configure an IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor. LSP health monitors enable you to
More informationPretest Programmable Logic Controllers. Unit 1, Task 1
Pretest Programmable Logic Controllers Unit 1, Task 1 1. What is a PLC? 2. What are the four main components of a PLC? 3. What is a discrete device? 4. What is a pulse-generating device? 5. What term is
More informationOperating Systems. Overview Virtual memory part 2. Page replacement algorithms. Lecture 7 Memory management 3: Virtual memory
Operating Systems Lecture 7 Memory management : Virtual memory Overview Virtual memory part Page replacement algorithms Frame allocation Thrashing Other considerations Memory over-allocation Efficient
More informationChapter 9: Virtual Memory. Operating System Concepts 9 th Edition
Chapter 9: Virtual Memory Silberschatz, Galvin and Gagne 2013 Chapter 9: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating
More informationConfiguring QoS. Understanding QoS CHAPTER
29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide
More informationMetasys System Configuration Tool (SCT)
Product Bulletin Issue Date March 31, 2003 Metasys System Configuration Tool (SCT) As an integral part of the Metasys system extended architecture, the System Configuration Tool (SCT) supports the engineering,
More informationConfigure Failure Handling and Server Unreachable Mechanisms for OCS Failure Resolution on the ASR5K
Configure Failure Handling and Server Unreachable Mechanisms for OCS Failure Resolution on the ASR5K Document ID: 118993 Contributed by Shashank Varshney, Cisco TAC Engineer. Jun 02, 2015 Contents Introduction
More informationRADIUS Server Load Balancing
The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across RADIUS servers in a server group These servers can share the AAA transaction
More informationEnhanced Congestion Control and Overload Control
Enhanced Congestion Control and Overload Control Feature Description, page 1 Configuring Enhanced Congestion Control, page 2 Monitoring and Troubleshooting, page 7 Feature Description The MME provides
More informationPage Replacement. 3/9/07 CSE 30341: Operating Systems Principles
Page Replacement page 1 Page Replacement Algorithms Want lowest page-fault rate Evaluate algorithm by running it on a particular string of memory references (reference string) and computing the number
More informationOperating System Concepts
Chapter 9: Virtual-Memory Management 9.1 Silberschatz, Galvin and Gagne 2005 Chapter 9: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped
More informationIssued August 2017 MS-EXPORT-0, MS-EREPORT-0
MS-ADSxxx-xxx, MS-ADXxxx-x, MS-MVExxx-x, MS-NxE85xx-xxx, Code No. LIT-1201654 MS-NxE85SW-x, MS-LCS85SW-0, MS-NIE89SW-x, MS-ODSxx-x, Software Release 9.0 MS-MULTENG-SCS, MS-MULTENGSW-6, MS-ADVGRF-0, Issued
More informationConfiguring Dial-on-Demand Routing
C H A P T E R 7 Configuring Dial-on-Demand Routing This chapter describes how to configure your communication server for dial-on-demand routing (DDR) and dial backup. For a complete description of the
More information10 MONITORING AND OPTIMIZING
MONITORING AND OPTIMIZING.1 Introduction Objectives.2 Windows XP Task Manager.2.1 Monitor Running Programs.2.2 Monitor Processes.2.3 Monitor System Performance.2.4 Monitor Networking.2.5 Monitor Users.3
More informationMetasys Integrator Northern Application
Metasys Connectivity Technical Manual 629.5 Metasys Integrator Section Application Note Issue Date 0900 APPLICATION NOTE Metasys Integrator Northern Application lntroduction Page *3 Application Details
More informationSUPERVISOR S USER GUIDE
Automatic Call Distribution (ACD) SUPERVISOR S USER GUIDE 76-110-0440/G Issue 2 Printed in Israel 76-110-0440/G, Issue 2 76-110-0440/G, Issue 2 Automatic Call Distribution (ACD) SUPERVISOR S USER GUIDE
More informationSiemens S7-200 Driver PTC Inc. All Rights Reserved.
2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 3 Overview 3 Setup 4 Channel Properties 4 Channel Properties - General 5 Channel Properties - Serial Communications 6 Channel
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Spring 2018 L20 Virtual Memory Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 Questions from last time Page
More informationQuality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationBACnet Integration User s Manual
BACnet Integration User s Manual Target Audience for this Document This document is aimed at system operators and provides a description of how to install and configure the Milestone BACnet Integration.
More informationYokogawa DX Serial Driver PTC Inc. All Rights Reserved.
2018 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 Setup 5 Channel Properties General 6 Channel Properties Serial Communications 6 Channel Properties Write Optimizations
More information