SYNOPSIS - This section discusses problems which may occur during operation
of the OSI/CACD System 2. It also defines possible solutions to these problems.
- SECTION 1 - DISC PROBLEMS
- 1.1 FILE NOT FOUN
- 1.2 DISC WRITE PROTECTED
- 1.3 DISC FULL
- 1.4 DISC MALFUNCTION
- SECTION 2 - SECURITY ERRORS
- 2.1 ID DISC PASSWORD SECURITY
- 2.2 CYBERTANK DESIGN PASSWORD SECURITY
- SECTION 3 - SIMULATION ERRORS
- 3.1 SIMULATION OUT OF MEMORY
- 3.2 CYBERTANK/BATTLEFIELD NOT FOUND
- 3.3 CYBERTANK NOT AUTHORIZED
- SECTION 4 - OTHER ERRORS
- 4.1 AUTHORIZATION ERRORS
- 4.2 ILLEGAL BATTLEFIELD
SECTION 1 - DISC PROBLEMS
SECTION BRIEF - During operation of the OSI/CACD System 2, problems can
occur during disc access. Some of these are easily rectified.
1.1 FILE NOT FOUND
The File Retrieval Panel (FRP) lets you select files to be loaded from a specified
disc. The File Not Found error is often encountered when you are retrieving a data
file from a disc and, for some reason, the disc was removed from the access slot.
To avoid this error, simply keep the disc containing the data file in the access
riot. The disc may be removed after the OSI/CACD system has retrieved the specified
The File Termination Panel (FTP) may produce this same error if, under the similar
circumstances, it is unable to delete a specified data file.
1.2 DISC WRITE PROTECTED
This error occurs when the OSI/CACD tries to save a data file to a write protected
disc via the File Storage Panel (FSP). Most discs have write protect features to
prevent information being written to them. If a disc is indeed write Protected,
the OSI/CACD is unable to save any data to the disc and this error message is displayed.
All 5 t/4 inch discs have a small notch in the right side. If the notch is covered,
the disc is write protected. If the notch is uncovered, the disc is not write protected
and information can be written to it. To avoid the Disc Write protected error ,
simply remove the material that is covering the notch.
All 3 1/2 inch discs have a write protect tab built in the upper right-hand corner
of the reverse side. If the tab is moved and unblocks the hole, the disc is write
protected. If the tab is moved to block the hole, the disc is not write protected
and information can be written to it. To avoid the Disc Write Protected error, simply
move the tab so that it blocks the hole.
1.3 DISC FULL
All discs are limited in the amount of data they can store. If your disc is at
its maximum capacity and you instruct the OSI/CACD to save another data file via
the File Storage Panel (FSP), this error message will appear. Once your disc is
full, you can delete some information to provide space. Use the File Termination
Panel (FTP) to delete specific data files from the disc.
The disc Full error can become a recurring problem since most discs have a rather
small capacity. The solution below may help.
The FSP can save a file to any disc (not only to Your Employee ID Disc). Saving
data files onto several discs can alleviate later problems. For instance, you may
want to save cybertank designs on one disc, battlefield designs on another, etc.
Remember, the Combat Simulation Module requires that the battle field and all cybertanks
in a simulation design reside on the same disc, resulting in the development of
the Data Duplication Module (DDM).
The DDM lets you copy data files from one disc to another. Using the DDM, you
can copy those data files you are currently using onto your ID Disc, leaving unused
data files on other discs, commonly referred to as backup discs.
1.4 DISC MALFUNCTION
The Disc Malfunction error message is displayed when an unknown problem prevents
the OSI/CACD System 2 from accessing a disc. Due to the many circumstances that
can create this error, only the most likely causes are listed.
If the disc is removed from the access slot during a load, save, or delete the
OSI/CACD is unable to complete the procedure and only a portion of the data is processed.
The OSI/CACD cannot perform correctly with a partially processed data file.
If this error message occurs when retrieving a data file, that data file is usually
lost. This is the main reason that backup copies of data files are necessary. Backing
up data files is easy using the Data Duplication Module (DDM). While losing a data
file in the above manner is unlikely , it happens on occasion.
SECTION 2 - SECURITY ERRORS
SECTION BRIEF - OSI is a high-security complex. Procedures have been implemented
to prevent unauthorized entrance into the OSI Complex and unauthorized access to
2.1 ID DISC PASSWORD SECURITY
In order to verify employment, you must enter the correct password for the Employee
ID Disc being used. Failure to enter the correct password prompts a Security Breach
alarm and informs the guards at the OSI Security Gate. This prevents the use of
stolen ID discs to gain entrance to the OSI complex. If you forget your password
when using your own ID Disc, you will be denied entrance into the OSI Complex. The
Orientation Guide details password security.
Being denied access to the OSI Complex is an unfortunate circumstance, but it
cannot be corrected unless you identify the correct password. Although the information
on your ID Disc can be copied onto another using the Data Duplication Module (DDM),
your clearance level is lost.
2.2 CYBERTANK DESIGN PASSWORD SECURITY
Cybertank design protection is a high priority at OSI. Security leaks must be
avoided. When an employee creates a new cybertank design, the password used for
the Employee ID Disc is incorporated into the cybertank design. Only employees with
knowledge of the correct password can access that design.
NOTE: If an employee does not identify a password for the ID Disc, then designs
created by that employee are not password protected. Those designs are accessible
without a password.
In the Design Control Module (DCM), any cybertank design can be loaded from any
disc. The design selected is inspected to ensure it has been properly authorized
by OSI. If the passwords On the ID Disc and cybertank design do not match, the Security
Breach alarm is then sounded.
Note that cybertanks created by other employees can also be used in simulations.
To obtain authorization when the passwords do not match, the designer can duplicate
the design using the Data Duplication Module (DDM). The DDM removes the password
from the cybertank design and it is now accessible by all employees. If an employee
other than the designer trys to duplicate a protected design, the Security Breach
alarm will sound. Only the designer can duplicate a protected cybertank design.
SECTION 3 - SIMULATION ERRORS
SECTION BRIEF- The Combat Simulation Module (CSM) and the Cybertank Test Module
(CTM) have a limited amount of memory available f o r processing simulations. Also,
each cybertank in the simulation must be authorized for use.
3.1 SIMULATION OUT OF MEMORY
When loading a simulation, the CSM and CTM are limited by the amount of memory
available. In rare cases, there is not enough memory available to load all of the
cybertanks In the simulation design. You will be notified when these modules are
unable to load all tanks in a design. The only recourse is to redesign the simulation
using fewer tanks. When a memory problem occurs, the active module will abort and
you will be transferred to the External Control Module (ECM).
3.2 CYBERTANK/BATTLEFIELD NOT FOUND
The battlefield design and all cybertanks included in a simulation design must
reside on the same disc when using the CSM or CTM. If either the battlefield, or
any one of the cybertanks are not found on the disc, you will be notified via the
terminal. In a situation such as this, the CSM and CTM will abort and transfer you
to the External Control Module (ECM).
To rectify this problem, you can either redesign the simulation using the Simulation
Design Module (SDM), or copy the cybertanks and battlefield onto the same disc with
the Data Duplication Module (DDM).
3.3 CYBERTANK NOT AUTHORIZED
The CTM requires that the cybertank to be tested to have been authorized by the
current employee. lf you attempt to test a cybertank using an unauthorized cybertank
design, the Cybertank Not Authorized message is displayed. The Cybertank Not Authorized
error message also appears during Clearance Evaluation if the cybertank Selected
is not authorized by the current employee. To resolve this problem, authorize the
cybertank using the Design Control Module (DCM).
SECTION 4 - OTHER ERRORS
SECTION BRIEF - There are other System error messages which can appear at certain
4.1 AUTHORIZATION ERRORS
Many problems can and will occur while authorizing cybertanks. The various errors
are discussed in detail in Appendix 5 of the Engineering Handbook.
4.2 ILLEGAL BATTLEFIELD
Bt the start of a simulation, the Combat Simulation Module (CSM) randomly picks
the initial location of all cybertanks. Cybertanks can only be placed on grass,
roads, dirt patches, etc. That is, they can only be placed in non-obstructed areas
of the battlefield.
The Battlefield Design Module (BDM) lets employees create their own battlefields
for combat simulations. There are few limitations in battlefield design, but there
MUST be at least 30 non-obstructed areas (to allow placement of cybertanks) included
in a design. If there are less than 30 the Illegal Battlefield error is displayed
when YOU attempt to save the terrain.