Home
Documents
Troubleshooting

TROUBLESHOOTING

SYNOPSIS - This section discusses problems which may occur during operation of the OSI/CACD System 2. It also defines possible solutions to these problems.
  • SECTION 1 - DISC PROBLEMS
    • 1.1 FILE NOT FOUN
    • 1.2 DISC WRITE PROTECTED
    • 1.3 DISC FULL
    • 1.4 DISC MALFUNCTION
  • SECTION 2 - SECURITY ERRORS
    • 2.1 ID DISC PASSWORD SECURITY
    • 2.2 CYBERTANK DESIGN PASSWORD SECURITY
  • SECTION 3 - SIMULATION ERRORS
    • 3.1 SIMULATION OUT OF MEMORY
    • 3.2 CYBERTANK/BATTLEFIELD NOT FOUND
    • 3.3 CYBERTANK NOT AUTHORIZED
  • SECTION 4 - OTHER ERRORS
    • 4.1 AUTHORIZATION ERRORS
    • 4.2 ILLEGAL BATTLEFIELD

SECTION 1 - DISC PROBLEMS

SECTION BRIEF - During operation of the OSI/CACD System 2, problems can occur during disc access. Some of these are easily rectified.

1.1 FILE NOT FOUND

The File Retrieval Panel (FRP) lets you select files to be loaded from a specified disc. The File Not Found error is often encountered when you are retrieving a data file from a disc and, for some reason, the disc was removed from the access slot.
To avoid this error, simply keep the disc containing the data file in the access riot. The disc may be removed after the OSI/CACD system has retrieved the specified data file.
The File Termination Panel (FTP) may produce this same error if, under the similar circumstances, it is unable to delete a specified data file.

1.2 DISC WRITE PROTECTED

This error occurs when the OSI/CACD tries to save a data file to a write protected disc via the File Storage Panel (FSP). Most discs have write protect features to prevent information being written to them. If a disc is indeed write Protected, the OSI/CACD is unable to save any data to the disc and this error message is displayed.
All 5 t/4 inch discs have a small notch in the right side. If the notch is covered, the disc is write protected. If the notch is uncovered, the disc is not write protected and information can be written to it. To avoid the Disc Write protected error , simply remove the material that is covering the notch.
All 3 1/2 inch discs have a write protect tab built in the upper right-hand corner of the reverse side. If the tab is moved and unblocks the hole, the disc is write protected. If the tab is moved to block the hole, the disc is not write protected and information can be written to it. To avoid the Disc Write Protected error, simply move the tab so that it blocks the hole.

1.3 DISC FULL

All discs are limited in the amount of data they can store. If your disc is at its maximum capacity and you instruct the OSI/CACD to save another data file via the File Storage Panel (FSP), this error message will appear. Once your disc is full, you can delete some information to provide space. Use the File Termination Panel (FTP) to delete specific data files from the disc.
The disc Full error can become a recurring problem since most discs have a rather small capacity. The solution below may help.
The FSP can save a file to any disc (not only to Your Employee ID Disc). Saving data files onto several discs can alleviate later problems. For instance, you may want to save cybertank designs on one disc, battlefield designs on another, etc. Remember, the Combat Simulation Module requires that the battle field and all cybertanks in a simulation design reside on the same disc, resulting in the development of the Data Duplication Module (DDM).
The DDM lets you copy data files from one disc to another. Using the DDM, you can copy those data files you are currently using onto your ID Disc, leaving unused data files on other discs, commonly referred to as backup discs.

1.4 DISC MALFUNCTION

The Disc Malfunction error message is displayed when an unknown problem prevents the OSI/CACD System 2 from accessing a disc. Due to the many circumstances that can create this error, only the most likely causes are listed.
If the disc is removed from the access slot during a load, save, or delete the OSI/CACD is unable to complete the procedure and only a portion of the data is processed. The OSI/CACD cannot perform correctly with a partially processed data file.
If this error message occurs when retrieving a data file, that data file is usually lost. This is the main reason that backup copies of data files are necessary. Backing up data files is easy using the Data Duplication Module (DDM). While losing a data file in the above manner is unlikely , it happens on occasion.

SECTION 2 - SECURITY ERRORS

SECTION BRIEF - OSI is a high-security complex. Procedures have been implemented to prevent unauthorized entrance into the OSI Complex and unauthorized access to cybertank designs.

2.1 ID DISC PASSWORD SECURITY

In order to verify employment, you must enter the correct password for the Employee ID Disc being used. Failure to enter the correct password prompts a Security Breach alarm and informs the guards at the OSI Security Gate. This prevents the use of stolen ID discs to gain entrance to the OSI complex. If you forget your password when using your own ID Disc, you will be denied entrance into the OSI Complex. The Orientation Guide details password security.
Being denied access to the OSI Complex is an unfortunate circumstance, but it cannot be corrected unless you identify the correct password. Although the information on your ID Disc can be copied onto another using the Data Duplication Module (DDM), your clearance level is lost.

2.2 CYBERTANK DESIGN PASSWORD SECURITY

Cybertank design protection is a high priority at OSI. Security leaks must be avoided. When an employee creates a new cybertank design, the password used for the Employee ID Disc is incorporated into the cybertank design. Only employees with knowledge of the correct password can access that design.

NOTE: If an employee does not identify a password for the ID Disc, then designs created by that employee are not password protected. Those designs are accessible without a password.

In the Design Control Module (DCM), any cybertank design can be loaded from any disc. The design selected is inspected to ensure it has been properly authorized by OSI. If the passwords On the ID Disc and cybertank design do not match, the Security Breach alarm is then sounded.
Note that cybertanks created by other employees can also be used in simulations.
To obtain authorization when the passwords do not match, the designer can duplicate the design using the Data Duplication Module (DDM). The DDM removes the password from the cybertank design and it is now accessible by all employees. If an employee other than the designer trys to duplicate a protected design, the Security Breach alarm will sound. Only the designer can duplicate a protected cybertank design.

SECTION 3 - SIMULATION ERRORS

SECTION BRIEF- The Combat Simulation Module (CSM) and the Cybertank Test Module (CTM) have a limited amount of memory available f o r processing simulations. Also, each cybertank in the simulation must be authorized for use.

3.1 SIMULATION OUT OF MEMORY

When loading a simulation, the CSM and CTM are limited by the amount of memory available. In rare cases, there is not enough memory available to load all of the cybertanks In the simulation design. You will be notified when these modules are unable to load all tanks in a design. The only recourse is to redesign the simulation using fewer tanks. When a memory problem occurs, the active module will abort and you will be transferred to the External Control Module (ECM).

3.2 CYBERTANK/BATTLEFIELD NOT FOUND

The battlefield design and all cybertanks included in a simulation design must reside on the same disc when using the CSM or CTM. If either the battlefield, or any one of the cybertanks are not found on the disc, you will be notified via the terminal. In a situation such as this, the CSM and CTM will abort and transfer you to the External Control Module (ECM).
To rectify this problem, you can either redesign the simulation using the Simulation Design Module (SDM), or copy the cybertanks and battlefield onto the same disc with the Data Duplication Module (DDM).

3.3 CYBERTANK NOT AUTHORIZED

The CTM requires that the cybertank to be tested to have been authorized by the current employee. lf you attempt to test a cybertank using an unauthorized cybertank design, the Cybertank Not Authorized message is displayed. The Cybertank Not Authorized error message also appears during Clearance Evaluation if the cybertank Selected is not authorized by the current employee. To resolve this problem, authorize the cybertank using the Design Control Module (DCM).

SECTION 4 - OTHER ERRORS

SECTION BRIEF - There are other System error messages which can appear at certain points.

4.1 AUTHORIZATION ERRORS

Many problems can and will occur while authorizing cybertanks. The various errors are discussed in detail in Appendix 5 of the Engineering Handbook.

4.2 ILLEGAL BATTLEFIELD

Bt the start of a simulation, the Combat Simulation Module (CSM) randomly picks the initial location of all cybertanks. Cybertanks can only be placed on grass, roads, dirt patches, etc. That is, they can only be placed in non-obstructed areas of the battlefield.
The Battlefield Design Module (BDM) lets employees create their own battlefields for combat simulations. There are few limitations in battlefield design, but there MUST be at least 30 non-obstructed areas (to allow placement of cybertanks) included in a design. If there are less than 30 the Illegal Battlefield error is displayed when YOU attempt to save the terrain.

 

Toadstool's Home | Contact © 2003 Toadstool's Game Shrines. All Rights Reserved.