Sponsored Content
Operating Systems Solaris Help with Reviving a NETRA240 Pls? Post 303026694 by ozsavran on Saturday 1st of December 2018 02:44:37 PM
Old 12-01-2018
Earthing question is crossed off.

Correct, Hicks. Thanks. I will do that whenever I have a chance to sit down on it again. Meanwhile I had crossed off the grounding question. Problem is not that.
Help with Reviving a NETRA240 Pls?-wp_20181129_009jpg
Help with Reviving a NETRA240 Pls?-wp_20181129_011jpg



And I tried both "bootmode diag" command, which does nothing in terms of additonal info, and taking out the cracked front switch bezel and turning the knob shaft with small pliers to Diagnostic position. The flat part of the shaft aligns with the arrow on the cracked blue bezel. I am not sure was really done, as it did not do anything different during SC boot. Maybe the plastic knob shaft is also loose working intermitently. However, it did worked fine and recognized position of the front switch when I turned it leftmost, to "permanent standby" and SC did not even allow me use the "poweron" command. So we can assume the front system switch does indeed function as long as I can put it in required position. Didn't want to jam pliers in any more for fear of breaking that knob shaft too.
Help with Reviving a NETRA240 Pls?-wp_20181130_005jpg
Help with Reviving a NETRA240 Pls?-wp_20181130_001jpg



Having some diagnostics would sure be useful. Will work more on restoring that too.

Last edited by ozsavran; 12-01-2018 at 03:50 PM..
 

10 More Discussions You Might Find Interesting

1. Linux

pls help me

we hv a big enviroment networked. we use squid proxy. access allowed by src address previously. we have win2000 network with ads. my requirement is the proxy should allow domain users only for access. how can i map my windows userdatabase with squid is there any thing specific which has 2 b... (1 Reply)
Discussion started by: sriram.s
1 Replies

2. UNIX for Dummies Questions & Answers

Need help pls

Hi, I'm a newbie. I need help on my first assignment in UNIX. 1. How do I determine the number of non-empty directories? I was told to create a variable ARCHIVE, which points to the directory that contains the archive of the messages. But I'm so dumb and I don't even know how to do this. 2. In... (1 Reply)
Discussion started by: hygsg
1 Replies

3. UNIX for Dummies Questions & Answers

Pls Help

Hi every one I have got very very bad Email, My question is: How can I get all information about that f*** Email, I do mean IP,reall name, Adress, user name, password etc... I wonder if there is any program or website that I can see that email, help me please When I used windows Xp(old... (2 Replies)
Discussion started by: Cano
2 Replies

4. UNIX for Dummies Questions & Answers

Help pls!

Hi... Why should I press F1 to start windows?! I have Xp in my computer... thx 4 help Cano (1 Reply)
Discussion started by: Cano
1 Replies

5. Shell Programming and Scripting

pls help

I have a list of variables: ss1, ss5, ss6, ss8, st2 etc. (these values are not fixed, configurable). Now, I have assigned ss5=”test”. And I want to search in the list for the string “test” to know which variable is having the value “test”. Can u pls tell me how to do this? (10 Replies)
Discussion started by: kanchan_cp
10 Replies

6. Shell Programming and Scripting

pls help

Hi, I need your help guys. I have two data files, namely 101.amberized.pdb & 101.pdb . Now I want to replace the whole 3rd column of 101.amberized.pdb with the 3rd column of 101.pdb file. How do I do it in shell? Thanks in advance Parimal (11 Replies)
Discussion started by: chuchu
11 Replies

7. Shell Programming and Scripting

Pls Pls do help me

When i run this command, everything is ok. The file can be email and attached but soon after i download the file, the file cant be read. It's seem corrupted. Totally cant be read although i'm using context or wordfile. Original file generated at ek_bkup/alert/tbspace_datafile.log is OK..... ... (7 Replies)
Discussion started by: adzuanamir
7 Replies

8. UNIX for Dummies Questions & Answers

HELP PLs

I have this code: #!/bin/sh awk 'BEGIN NR == 2 repl = "PHI" $4 = repl print $0 'dryloop.txt and this code: #!/bin/sh sed -e '1s/\|$/\|COMID\|/g' -e 's/^087.*$/&PHI\|g' hl.dsldryloop > textdry.txt My code won't work. I want to change the COMID of lines starting with 087 . this is my... (15 Replies)
Discussion started by: arkhei
15 Replies

9. Homework & Coursework Questions

Help pls

How to find the ten most common words in a file (1 Reply)
Discussion started by: jass
1 Replies

10. Solaris

NETRA240 in HLR CDMA Wireless Exchange... help is apreciated

Greetings, I hope my post finds you all OK, I have a Netra240 server in an HLR inside a wireless CDMA Exchange, it works as a Hard Disk Unit (HDU) as shown in Local Management Terminal (LMT) as show in the picture 1 attached. The power went down because of a power failure in main UPS, when... (2 Replies)
Discussion started by: Sharista
2 Replies
ATTACH(5)							File Formats Manual							 ATTACH(5)

NAME
attach, session, nop - messages to initiate activity SYNOPSIS
Tnop tag[2] Rnop tag[2] Tsession tag[2] chal[8] Rsession tag[2] chal[8] authid[28] authdom[48] Tattach tag[2] fid[2] uid[28] aname[28] ticket[72] auth[13] Rattach tag[2] fid[2] qid[8] rauth[13] DESCRIPTION
The nop request does nothing overt but may be used to synchronize the channel between two service hosts initially. The session request is used to initialize a connection between a client and a server. All outstanding I/O on the connection is aborted. The set of messages between session requests is called a session. The host's user name (authid) and its authentication domain (authdom) identify the key to be used when authenticating to this host. The exchanged challenges (chal) are used in the authentication algorithm. If authid is a null string no authentication is performed in this session. The tag should be NOTAG (value 0xFFFF) for a nop or session message. The attach message serves as a fresh introduction from a user on the client machine to a server. The message identifies the user (uid) and may select the file tree to access (aname). The ticket and auth arguments contains authorization data derived from the exchanged chal- lenges of the session message; see auth(6). As a result of the attach transaction, the client will have a connection to the root directory of the desired file tree, represented by fid. An error is returned if fid is already in use. The server's idea of the root of the file tree is represented by the returned qid. ENTRY POINTS
An attach transaction will be generated for kernel devices (see intro(3)) when a system call evaluates a file name beginning with Pipe(2) generates an attach on the kernel device pipe(3). The mount system call (see bind(2)) generates an attach messages to the remote file server. When the kernel boots, an attach is made to the root device, root(3), and then an attach is made to the requested file server machine. SEE ALSO
auth(6) ATTACH(5)
All times are GMT -4. The time now is 05:30 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy