Test Airport - HELP

Is there anyway to test your Airport in a PowerBook G4?
I had a Belkin Wireless G Modem/Router and was getting no signal through one wall and very low through some others... So I upgraded to Belkin G+ Mimo Wireless Modem/Router and the same this has happened with the signal.
Below is a link to a layout of my house and the problem area(s).
http://i83.photobucket.com/albums/j315/mccrae28/wireless.jpg
There are no cordless phones or microwave ovens in the house - so they can't be causing the problem, and the walls aren't that thick.
So...
Is it the make/model of the router that's just not working with my PowerBook?
OR
Is there something wrong with the Airport inside my laptop? And is there a way to test it?
THANKS
PowerBook G4   Mac OS X (10.4.8)  

It may be the construction of the walls.
Possibly
Are there (competing) neighbouring wireless networks
in the area?
No one in the neighborhood has wireless networks.
How does the PowerBook connect to other wireless
networks (say a wifi hotspot)?
No town is so ** that there is no wifi hotspots - someone suggested Starbucks - but my "nearest" Starbucks is 3hours drive away (6 hours return).
Can you use another wireless computer to test your
wireless signal?
I don't have another Apple computer and don't know anyone who has one that i could contact. I've got the two desktops (winXP) and as you can see from the map - one is vv.low and the second is ok.
THANKS for all your help.

Similar Messages

  • Is there a way to test airport extreme for optimal function

    Is there a way to test airport extreme for optimal function?

    In your Mavericks OS X.
    Go to the WiFi icon on the top right.
    Hold the option key and click.
    At the bottom of the list you will see "Open Wireless Diagnostics"
    Open this and you can diagnose your wireless network.
    While it'sopen hit the Command + 2 and it will open the Utilities window.
    This will give you and overview of interference and what channel is best.
    You can alos run a speedtes over WiFi then run a speedtest directly connected with ethernet.

  • Installed OATS for web functnlty testing,but unable to test - Plz Help me

    Hi,
    I have installed OATS and I want to automate my testing for functionality testing, I opened Open Script and when I tried to record the session,It is unable to open the browser and stopped testing.It is neither showing any error nor recording the screen. I just gone through the 'OATSGettingStartedGuide' pdf document but unable to resolve the issue.Please suggest me how to resolve this issue...
    Regards,
    Aruna.

    Aruna,
    The OATS release notes gives system requirements and says you can check C:\Program Files\Oracle\inventory\logs\installActions-xxxx.log to view if the installation was successful. If the logs show a successful installation, then open a browser and go to Tools>Internet Options>Programs>Manage Add-ons. Verify that the two following add-ons exist and are enabled: Openscript BHO and Oracle.OATS.OpenScript.IEToolBar.OpenScriptToolBar. If they don't exist, then Openscript didn't successfully install. If they didn't install, someone with admin privileges can try to uninstall and reinstall the add-ons only using the instructions from Openscript Users Guide C-1. If the add-ons are enabled, you can go to the Openscript help menu and run the Diagnosis Tool to view error messages. Finally, verify the Oracle Application Testing Suite Agent Service and Oracle Application Testing Suite Helper Service are enabled and have a started status.
    Good luck.
    Charlene

  • My iPod is stuck in ACCESSORIZE TEST Mode help pleaseeeeeeee

    I went to reun diagnostics, unclicked the first 2 and this was the result
    Re: iTunes wont sync my iPod Classic 80 GB
    Posted: Mar 27, 2010 10:02 AM in response to: b noir Reply Email
    could you please respond to [email protected] also in that i read that Email daily? PLEASE?
    Thank you so much
    this is what tghe test results were. can you please help? it is frozen on
    ACCESSORIZE TEST
    please plug fw
    LCD ID : 2
    FWPWR : 0
    i did the run diag. nest next next next this is what it said
    also redid run diag again did next and next only twice. in brackets it is what it said
    red dot only on {iTunes helper is not working }
    and the 2nd bunch was green except for the red dot on...no iPod or iPhone found}
    Microsoft Windows Vista Home Premium Edition Service Pack 2 (Build 6002)
    Gateway T5062
    iTunes 8.2.1.6
    QuickTime 7.6.4
    FairPlay 1.4.10
    iPod Updater Library 8.1d19
    CD Driver 2.1.0.1
    CD Driver DLL 2.1.1.1
    Apple Mobile Device 2.6.0.32
    Apple Mobile Device Driver 1.45.0.0
    Bonjour 1.0.6.2 (118.5)
    iTunes Serial Number 77A954A4AC937069
    Current user is not an administrator.
    The current local date and time is 2010-03-27 12:55:08.
    iTunes is not running in safe mode.
    Video Display Information
    NVIDIA, NVIDIA GeForce 6150SE nForce 430
    External Plug-ins Information **
    No external plug-ins installed.
    iPod/iPhone Connectivity Tests **
    iPodService 8.2.1.6 is currently running.
    iTunesHelper is currently not running.
    Apple Mobile Device service 2.50.39.0 is currently running.
    Universal Serial Bus Controllers:
    Standard OpenHCD USB Host Controller. Device is working properly.
    Standard Enhanced PCI to USB Host Controller. Device is working properly.
    No FireWire (IEEE 1394) Host Controller found.
    Most Recent Device Not Currently Connected:
    Fifth Generation iPod (iPod with video) running firmware version 1.3
    Serial Number: 8K6182HZSZA
    iPhone/iPod Touch Sync Tests **
    No iPhone or iPod found.
    pc win vista

    have you tried restarting the iPod? hit menu and the center button together until the screen turns off.

  • Upgraded to 10.5.3 and then no more Airport - HELP !

    Hello,
    I have WIFI LAN access issue after upgrading an IMac G5 to from Tiger to Leopard, and would appreciate your help.
    ISSUE :
    Prior to Leopard, this IMac worked on 10.4.11 with access to my WiFi AN via an Airport Extreme Card.
    After I installed Leopard 10.5 straight out of the DVD :
    the Airport icon on the menu bar is grayed out as if it did not pick any signal, although I did not change location nor LAN settings
    when I want to access to the LAN, it requests the 24 characters WPA password, but although I know the password is correct, I get a “connection failure” or “connection timeout” error message.
    I get the same messages when I try to configure access from the Network preference pane.
    A a result, I cannot get nor on my LAN, nor on Internet from the G5 iMac.
    UPGRADE HISTORY AND SOLUTION ATTEMPTS
    I performed a simple upgrade from the DVD (ticked off the X11 option and languages translations though).
    Then I also reinstalled the Airport Extreme Software form the CD, in case Leopard “erased” an Airport Extreme driver...
    I also reinstalled Leopard with an “Erase” of the Hard drive,
    to have a full clean start...
    Last, I upgraded the system to 10.5.3 with the combo update that I downloaded from another computer, hoping that I would resolve this possible issue.
    I tried to find firmware updates, but no success...
    SYSTEM DESCRIPTION
    This is a LAN for home use for 3 Macs :
    my Mac a Dual G5 1.8 MhZ under 10.4.11, works OK. I did not upgrade.
    my wife iMac Intel Core 2 Duo 1.83 MhZ, upgraded to OSX 10.5.3, works OK
    my kids iMac G5, bought second hand with Tiger, does not connect after 10.5 upgrade. I bought back then also an Airport Extreme card and updated the Airport Extreme Software (CD version 4.2, 2Z691-5417-A), since then it worked fine.
    The LAN is managed by a wireless router from Italia Telecom (I live in Turin), here are some specs of the router :
    Alice Gate 2+ (http://aiuto.alice.it/informazioni/m.../alice_w2.html),
    - standard ADSL (these refer to the Italian telecom compliance)
    - ITU G.992.1/2/3/5 Annex A
    - ANSI T1.413
    - Protocols :
    - RFC 2516 PPP over ethernet
    - RFC 2684 - formerly RFC 1483 and RFC 2364
    - Support for ATM UNI3.1, UNI 4.0
    - IPTV functionality via Port mapping
    - OAM F4/F5 Loop Back
    - Interfaces :
    - ADSL Interface, connection RJ11
    - USB interface full speed (12 MBPS), connection B type, compatible USB rev 1.1
    - Ethernet Interface, RJ45 connection, compatible with IEEE 802.3 10/100 Base T auto sensing
    - WIFI IEEE 802,11/g Interface :
    - max speed transmission 11/54 MBPS
    - encrypting with key :
    - WPA with pass word of 24 ASCII characters (WPA PSK 256 bits key)
    - WEP of 128 bits (13 ASCII characters)
    - supports WiSeConf (TM)
    THANK YOU for any help, I would hate to have to switch back to Tiger...

    I have the same self-assigned IP address problem on an old ibook which is connected to a Netgear modem via a Time Capsule. The problem occurs on waking from sleep and less often on startup. It's transient, but has been becoming a lot more frequent. Since it's limited to one of the four machines that connect to the network, I've been assuming it's about that computer and not the time capsule or the modem.
    I've tried the fixes listed above (assigning a manual address, deleting preference files etc) as well as a few others (deleting the relevant passwords from the keychain and re-entering them in the hope that it was at that point the problem was occurring) and none of them have solved the problem.
    I then came across a suggestion in another thread about this problem suggesting it might be the firewall. So I tried turning off the firewall (which is set to allow access for specific services and applications) and voila, the ibook received its IP address as it should the next time it woke from sleep. I tried putting it to sleep a few more times and waking it, as well as restarting it and repeating the procedure, and each time it worked, which was interesting.
    Obviously having a computer with no firewall is not a great solution though, so I turned the firewall back on, and this is where it gets interesting. Because since turning it back on the problem seems to have stayed fixed.
    I'm not enough of a techie to know what this might mean, but it might also be worth mentioning that the ibook throws up a pile of annoying incoming connection requests every time you start up - do you want to allow kp-something-something access etc etc, and a little while back I tried to stop this by creating an allow incoming settings for the kp-something-something request (since I've now deleted it I don't remember exactly what it was, but it's something other people have complained about). This didn't work, and I actually deleted the line in the list of File sharing (AP) settings while I was in the firewall settings trying to fix this problem. Even more interestingly, since I turned the firewall off and on again these requests on start up seem to have stopped.
    I also have a suggestion for anyone who can't get the firewall trick to work, which is disable the password access for your machine and add use MAC address filtering on your router to try and get in that way. I don't know if this will work, but it might . . .

  • Airport to Airport Help

    I have a new Mac Mini 2.26 which I was told had Airport Extreme onboard with 10.6.2. I also have a Dual 867 MMD with 10.5.8 OSX. I have one Kodak ESP-3 connected to the Mini and have wanted to be able to print from the MMD to the Mini via Airport with no luck whatsoever.
    Each sees the others Airport yet when I try to set up the printer in the MMD and have it scan it sees nothing at all. Any ideas would be a great help. When I specify Mac to Mac Airport on internet searches all I get is help to connect Windows to Mac Extreme but I have found nothing on Mac to Mac troubleshooting.
    Thanks in advance for your input.
    BR

    TraveledTooFar wrote:
    I have a new Mac Mini 2.26 which I was told had Airport Extreme onboard with 10.6.2. I also have a Dual 867 MMD with 10.5.8 OSX.
    Can you confirm that your "MMD" ("Mirrored Disk Drive"?) Mac has an AirPort card. I believe that not all of them did.
    I have one Kodak ESP-3 connected to the Mini and have wanted to be able to print from the MMD to the Mini via Airport with no luck whatsoever.
    Do you have an AirPort base station or other Wi-Fi router?
    Each sees the others Airport
    Could you explain what you mean by that?
    when I try to set up the printer in the MMD and have it scan it sees nothing at all.
    Please confirm that you've enabled printer sharing on your Mac mini. Can you print from your MDD Mac over the network via the mini?
    It's my impression that not all all-in-one printers support scanning over a network. Have you tried to confirm that your ESP-3 can do that?

  • AirPort Help: Configuring "Network"

    In attempting to install NetWare for the iPhone 3G (another story!), I must have inadvertently deleted all of the Network and Airport settings that had allowed me to use Airport alone to pick up an open signal/network in my neighborhood. I had no record of the numbers, which boxes to check in the TCP/IP, Proxies, port number, IP address,etc., prompts.
    Could someone please provide this information. Thanks.

    Some pictures & info...
    Sometimes having an all OFF Location can help, thanks to Gnarlodious...
    http://gnarlodious.com/Computer/MacOsx/WiFi
    Using network locations in Mac OS X ...
    http://docs.info.apple.com/article.html?artnum=106653
    The Interface that connects to the Internet, needs to be drug to the top of Network>Show:>Network Port Configurations and checked ON.
    IPv4 should be set to DHCP, no need to fill in IP & such. No Proxies set.

  • Time Machine and Airport HELP!!

    Please help me...
    I am trying to setup my Airport Extreme and USB connected external 1TB hard drive to be my Time Machine backup drive.
    Its not working.
    I tried setting it up, got it to mount just fine over the network, and it starts to backup just fine, and then it stops with an error message.
    So, I tried to connect the hard drive directly to my computer and back it up directly, and that didn't work either.
    What am I doing wrong?

    Jolly Giant wrote:
    in your initial post you said
    adammabry wrote:
    I tried setting it up, got it to mount just fine over the network, and it starts to backup just fine, and then it stops with an error message.
    what's that error message ?
    download and install the Time Machine Buddy. switch to dashboard and copy & paste the report in your next post.
    Jolly Giant wrote:
    in your initial post you said
    adammabry wrote:
    I tried setting it up, got it to mount just fine over the network, and it starts to backup just fine, and then it stops with an error message.
    what's that error message ?
    download and install the Time Machine Buddy. switch to dashboard and copy & paste the report in your next post.
    Jolly Giant wrote:
    in your initial post you said
    adammabry wrote:
    I tried setting it up, got it to mount just fine over the network, and it starts to backup just fine, and then it stops with an error message.
    what's that error message ?
    download and install the Time Machine Buddy. switch to dashboard and copy & paste the report in your next post.
    Just tried to back up using a USB connection. Here was the message...
    Starting standard backup
    Backing up to: /Volumes/Family/Backups.backupdb
    Event store UUIDs don't match for volume: Adam Mabrys Disk
    No pre-backup thinning needed: 105.01 GB requested (including padding), 915.00 GB available
    Error: (-36) SrcErr:YES Copying /Library/Application Support/LiveType/LiveFonts/Pro Series/Bar.ltlf/data to (null)
    Error: (-36) SrcErr:NO Copying /Library/Application Support/LiveType/LiveFonts/Pro Series/Bar.ltlf/data to /Volumes/Family/Backups.backupdb/Adam Mabry’s MacBook Pro 15" (2)/2009-12-11-002355.inProgress/A2D60FFD-B551-4B1C-B28B-50883FE1B69F/Adam Mabrys Disk/Library/Application Support/LiveType/LiveFonts/Pro Series/Bar.ltlf
    Stopping backup.
    Error: (-8062) SrcErr:NO Copying /Library/Application Support/LiveType/LiveFonts/Pro Series/Bar.ltlf/data to /Volumes/Family/Backups.backupdb/Adam Mabry’s MacBook Pro 15" (2)/2009-12-11-002355.inProgress/A2D60FFD-B551-4B1C-B28B-50883FE1B69F/Adam Mabrys Disk/Library/Application Support/LiveType/LiveFonts/Pro Series/Bar.ltlf
    Copied 90 files (382.1 MB) from volume Adam Mabrys Disk.
    Copy stage failed with error:11
    Backup failed with error: 11

  • Blast speed is currently 2 Mbps/9 Mbps on the Comcast Speed Test. Help please!

    I've had the Blast service for quite some time, and have noticed painfully slow internet browsing for the last couple of months. I mean...pull-my-hair-out-slow.  I just did a Comcast speed test and the results were 2.31 Mpbs and 9.01 Mpbs. Um....that would explain things. But not really... as I'd love to see the speeds I'm supposed to have. Even double digits would be nice! I'm trying to run ShaperProbe but I get the error "Servers are busy. Try again later." I've tried a few times. I'll post the results if I can get the scan to work. Power level is 45-46 dBmV and SNR 35-37 Modem: ARRIS Motorola SurfBoard SB6141 DOCSIS 3.0Logs of June 2015 (the most recent, and the logs before that are January): Jun 22 2015 07:07:243-CriticalT05.0SYNC Timing Synchronization failure - Loss of Sync;CM-MAC=b8:16:19:fa:b8:0c;CMTS-MAC=00:1d:70:af:fd:a0;CM-QOS=1.1;CM-VER=3.0;Jun 18 2015 08:04:503-CriticalR02.0No Ranging Response received - T3 time-out;CM-MAC=b8:16:19:fa:b8:0c;CMTS-MAC=00:1d:70:af:fd:a0;CM-QOS=1.1;CM-VER=3.0;Jun 18 2015 07:08:273-CriticalT05.0SYNC Timing Synchronization failure - Loss of Sync;CM-MAC=b8:16:19:fa:b8:0c;CMTS-MAC=00:1d:70:af:fd:a0;CM-QOS=1.1;CM-VER=3.0;Jun 17 2015 23:08:553-CriticalR02.0No Ranging Response received - T3 time-out;CM-MAC=b8:16:19:fa:b8:0c;CMTS-MAC=00:1d:70:af:fd:a0;CM-QOS=1.1;CM-VER=3.0;Jun 16 2015 02:43:065-WarningZ00.0MIMO Event MIMO: Stored MIMO=-1 post cfg file MIMO=-1;CM-MAC=b8:16:19:fa:b8:0c;CMTS-MAC=00:1d:70:af:fd:a0;CM-QOS=1.1;CM-VER=3.0; I would sure appreciate any ideas. I have not contacted tech support yet, although that may be faster??  We'll see.  Thanks in advance for any help!  

    ShaperProbe has not been usable for some time, unfortunately. Check to see if Comcast is reporting an outage for your area by logging in to https://customer.xfinity.com/Secure/MyServices/ or by checking the voice response system at 1-800-Comcast.
    If no outage is reported, see Connection Troubleshooting Tips. If you want to troubleshoot this yourself and still need help, please provide Information Requested for Connection-Related Posts.
    If you are using Wifi it's best to switch to an Ethernet connection if possible while measuring speed and checking the reliability of your connection to Comcast.
    If you'd rather have them do the troubleshooting call them at the phone number on your bill or 1-800-Comcast and have them send a tech out to identify the cause and correct it.
    If the tech finds bad coax, splitters, amplifiers, or connections in your home (even if Comcast originally supplied them) you'll probably have to pay for the visit unless you have their Service Protection Plan (http://www.xfinity.com/spp/, about $5/mo). If the trouble is due to a faulty Comcast modem, eMTA, gateway device, or anything outside your home, you shouldn't be charged.

  • I can't remember my mac mini password and can only log in under test, please help

    I can't remeber my Mac mini password and can only log in under Test.  Please help me as I would like to access my photos and personal information.  Thanks

    Forgot Your Account Password
    For Snow Leopard and earlier
         Mac OS X 10.6- If you forget your administrator password
    For Lion/Mountain Lion
        Boot to the Recovery HD:
    Restart the computer and after the chime press and hold down the COMMAND and R keys until the menu screen appears. Alternatively, restart the computer and after the chime press and hold down the OPTION key until the boot manager screen appears. Select the Recovery HD and click on the downward pointing arrow button.
         When the menubar appears select Terminal from the Utilities menu.
         Enter resetpassword at the prompt and press RETURN. Follow
         instructions in the dialog window that will appear.
         Or see Reset a Mac OS X 10.7 Lion Password and
         OS X Lion- Apple ID can be used to reset your user account password.
    If you cannot do the above then try this:
      1. Boot to Safe Mode by restarting and after the chime press and hold down the COMMAND-S keys until a black screen with white type appears.
      2. At the prompt, type the following commands pressing return after each command line:
         /sbin/fsck -yf
         If you do not receive a "Filesystem OK" message then repeat this command until
         you do.  If after seven tries you still do not receive a "Filesystem OK" message,
         then the system is corrupted and needs to be reinstalled.
         mount -uw /
         cd /private/var/db/netinfo
         mv local.nidb local.old
         rm ../.AppleSetupDone
         shutdown -r now
    The second-to-last command above will cause OS X to think that the operating system is newly installed, and when the new owner starts up the computer it will send him/her to the startup wizard where he/she can start a new user without reinstalling.
    This last method does not actually change a password. It simply removes the user accounts and lets you create an initial admin account as if the computer were new out of the box.
    How to reset the OS X password without a startup CD:
    Reboot into Single-user Mode. Enter the following and press RETURN after each command line
       1. Type fsck -fy
       2. Type mount -uw /
       3. Type passwd <username>
    I have never tried this method myself.

  • Testing Airport reception

    Can a test be run at the Apple Store or by me to examine the condition of my airport card? I have been having an issue were the bars on my Airport menulet drop and drop. An identical computer has no issues.

    http://www.speedtest.net/index.php
    I use this to check my internet connections, not sure if this is exactly what your looking for.
    Ken

  • Novice Java Test- please help!

    hi I'm new to java and am required to know how to program a certain problem.
    please any help is much appreciated. If you can solve the problem that would be nice or if you could tell me how to go about solving it that would be fine too.
    here's the problem:
    "1. Write a class UniDBug that models a bug moving along a horizontal line, the x number line. The bug moves either to the right or left. Initially, the bug moves in the direction it is facing, but it can turn to change its direction. In each move, its position changes by one unit in the current direction. Provide a constructor and default constructor. (Default constructor not shown)
    Public Bug(int intialPosition, int facingDirection)
    // facingDirection 1 means to the left, and 2 means to the right
    and the following methods:
    public void turn()
    public void move()
    public int getPosition()
    2. Write the test program for this class with two bugs, *redBug*, and *blueBug* facing each other, one starting at position 15 and the other at position 3. They should take enough steps to both bugs meet at location 23. Include a print statement whenever a change happens and make sure you identify the bug and the location."
    again any help is much appreciated
    thank you for your time

    thx im gonna do that right now:
    "public class UniDBug
         Public Bug(int initialPosition, int faceingDirection);
         UniDBug myBug = new UniDBug();
         public void myBug.drive(100);
         public void move();
              public int getPosition(x);
                   position=3;
                        public void turn(1,2);"
    obviously, it needs a lot of work

  • CRM TEST SERVER HELP

    any time i use the following command on the crm test server it gives me this error:
    Crsctl Start crs
    Unknown: parameter
    please advice me on what to do
    Thank You.

    Please help out, i know we have intelligent people on this forum
    Anytime i input the following command on the server i get this error.
    kindly help me out with answers that will help me resolve this issue.
    crmdbts2:<TESTRAC:>/#crs_stat -t
    crs_stat -t
    CRS-0184: Cannot communicate with the CRS daemon.
    then when i view the log it gives this.
    "crmdbts2.log" 57 lines, 3829 characters
    Oracle Database 10g CRS Release 10.1.0.2.0 Production Copyright 1996, 2004, Oracle. All rights reserved.
    2008-06-23 21:01:06 : Oracle CRSD will start boot services
    2008-06-23 21:01:06 : Changing directory to /e01/crs/10.1.0/crs/init/
    2008-06-23 21:01:06 : Wrote pid 15258 to /e01/crs/10.1.0/crs/init/.lock-crmdbts2
    2008-06-23 21:01:06.118: CRS Daemon Starting
    2008-06-23 21:01:06.118: Checking the OCR device
    2008-06-23 21:01:06.122: Connecting to the CSS Daemon
    CRSD-1: Oracle CRSD command waiting for Oracle CRSD to start
    2008-06-23 21:01:11.121: CRSD-1: Sending Restart Application Request
    2008-06-23 21:01:16.302: Initializing OCR
    2008-06-23 21:04:25.224: Writing Software Version to OCR
    2008-06-23 21:04:25.261: Using Authorizer location: /e01/crs/10.1.0/crs/auth/
    2008-06-23 21:04:25.277: Initializing RTI
    2008-06-23 21:04:25.280: Parameter SECURITY = 1, running in USER Mode
    2008-06-23 21:04:25.280: Initializing EVMMgr
    2008-06-23 21:04:26.528: CRSD locked during state recovery, please wait.
    2008-06-23 21:04:26.533: CRSD recovered, unlocked.
    2008-06-23 21:04:26.536: QS socket on: (ADDRESS=(PROTOCOL=ipc)(KEY=ora_crsqs))
    2008-06-23 21:04:26.538: UI socket on: (ADDRESS=(PROTOCOL=ipc)(KEY=crmdbts2_crmdbts_cluster_caa))
    2008-06-23 21:04:26.554: E2E socket on: (ADDRESS=(PROTOCOL=tcp)(HOST=crmdbts2-hb)(PORT=49896))
    2008-06-23 21:04:26.554: Starting Threads
    2008-06-23 21:04:26.555: CRS Daemon Started.
    2008-06-23 21:04:26.623: CRSD-1: Complete Restart Application Request
    2008-06-23 21:17:43.921: CRSD-2: Sending Shutdown Application Request
    2008-06-23 21:17:43.945: CRSD-2: Complete Shutdown Application Request
    2008-06-23 21:17:54 : Oracle CRSD got SIGTERM, exiting
    Oracle Database 10g CRS Release 10.1.0.2.0 Production Copyright 1996, 2004, Oracle. All rights reserved.
    2008-06-24 12:23:57 : Oracle CRSD (re)start aborted by pending shutdown
    Oracle Database 10g CRS Release 10.1.0.2.0 Production Copyright 1996, 2004, Oracle. All rights reserved.
    2008-06-24 12:24:57 : Oracle CRSD (re)start aborted by pending shutdown
    Oracle Database 10g CRS Release 10.1.0.2.0 Production Copyright 1996, 2004, Oracle. All rights reserved.
    2008-06-27 08:53:14 : Oracle CRSD will start boot services
    2008-06-27 08:53:14 : Changing directory to /e01/crs/10.1.0/crs/init/
    2008-06-27 08:53:14 : Wrote pid 10269 to /e01/crs/10.1.0/crs/init/.lock-crmdbts2
    2008-06-27 08:53:14.459: CRS Daemon Starting
    2008-06-27 08:53:14.460: Checking the OCR device
    2008-06-27 08:53:14.464: Connecting to the CSS Daemon
    CRSD-1: Oracle CRSD command waiting for Oracle CRSD to start
    2008-06-27 08:53:19.459: CRSD-1: Sending Restart Application Request
    2008-06-27 08:53:21.030: Initializing OCR
    2008-06-27 08:53:21.092: Writing Software Version to OCR
    2008-06-27 08:53:21.138: Using Authorizer location: /e01/crs/10.1.0/crs/auth/
    2008-06-27 08:53:21.160: Initializing RTI
    2008-06-27 08:53:21.164: Parameter SECURITY = 1, running in USER Mode
    2008-06-27 08:53:21.164: Initializing EVMMgr
    2008-06-27 08:53:22.960: CRSD locked during state recovery, please wait.
    2008-06-27 08:53:22.967: CRSD recovered, unlocked.
    2008-06-27 08:53:22.970: QS socket on: (ADDRESS=(PROTOCOL=ipc)(KEY=ora_crsqs))
    2008-06-27 08:53:22.972: UI socket on: (ADDRESS=(PROTOCOL=ipc)(KEY=crmdbts2_crmdbts_cluster_caa))
    2008-06-27 08:53:22.980: E2E socket on: (ADDRESS=(PROTOCOL=tcp)(HOST=crmdbts2-hb)(PORT=49896))
    2008-06-27 08:53:22.980: Starting Threads
    2008-06-27 08:53:22.980: CRS Daemon Started.
    2008-06-27 08:53:22.998: CRSD-1: Complete Restart Application Request
    2008-07-07 14:43:12.014: Processing MemberLeave
    2008-07-07 14:43:12.015: [MEMBERLEAVE:55] Processing member leave for crmdbts1, incarnation: 3
    2008-07-07 14:43:13.087: [MEMBERLEAVE:55] Do failover for: crmdbts1
    2008-07-07 14:43:13.114: [MEMBERLEAVE:55] Post recovery done evmd event for: crmdbts1
    I await your response
    thank you all .

  • Testing general help

    Hi Gurus,
    I am soon going to start testing on an SAP upgrade project. Whats the best way to get myself prepared for the same? I am currently studying the client's Buiness processes, however there are just too many docs and these are getting me confused. Also I am concerned that all this time studying the docs is not wasted. If you have been in a similar situation before, please let me know how do you go about it. testing will be Functional + integration.

    hi dave,
    pls see the below matter i think it gives you a solution.
    SAP R/3
    Security Upgrades
                                                                                    1.             overview
    The purpose of this document is to provide additional information that could be helpful with SAP Security upgrades, especially pertaining to 4.6C.
    This document is not aimed at replacing the SAP Authorizations Made Easy guidebook’s procedures, but rather to complement these based on lessons learnt from previous upgrade projects. 
    It is focused mainly on upgrades from 3.1x to 4.6x and covers the following:
    ·        Evaluation of the Security Upgrade approaches;
    ·        “Gotchas” to watch out for with SAP’s SU25 utility;
    ·        Transactions and authorizations that require special attention; and
    ·        Helpful reports, transactions, hints and tables to know.
    It is highly recommended that you review the chapter on upgrades in the Authorizations Made Easy guide before attempting the security upgrade.
    See OSS note 39267 for information on obtaining the Guide, or visit SAPLabs’ website at: http://wwwtech.saplabs.com/guidebooks/
    2.             Security upgrade objectives, Process and approaches
    2.1.               Objectives
    There are a couple of objectives for having to upgrade the SAP Security infrastructure:
    ·   Converting manual profiles created via SU02 to activity groups, as SAP recommends the use of Profile Generator (PFCG) for the maintenance of profiles;
    ·   Adding new transactions representing additional functionality to the applicable activity groups;
    ·   Adding the replacement transactions that aim at substituting obsolete or old-version transactions, including the new Enjoy transactions;
    ·   Adjusting the new authorization objects that SAP added for the new release; and
    ·   Ensuring that all existing reports, transactions and authorizations still function as expected in the new release of SAP.
    2.2.               Overview of the Security upgrade process
    Once the Development system has been upgraded to 4.6, the security team will need to perform the following steps as part of the Security Upgrade:
    ·        Convert Report Trees to Area Menus;
    ·        Review users (via SU01) to check for any new or changed fields on the user masters;
    ·        Convert manual profiles created via SU02 to Activity Groups (See Approaches below);
    ·        Compare SU24 customer settings  to new SAP default settings (SU25 steps 2A-2C);
    ·        Determine which new / replacement transactions have to be added to which activity groups (SU25 step 2D);
    ·        Transport the newly-filled tables USOBT_C and USOBX_C that contain the SU24 settings you’ve made (SU25 step 3); and
    ·        Remove user assignments to the manual profiles.
    2.3.               Approaches to convert manual profiles to Activity Groups:
    2.3.1.      Approach #1: SAP’s standard utility SU25
    SAP provides an utility for converting Manual Profiles to Activity Groups and to identify the new and replacement transactions that need to be added to each activity group.
    You can access this utility by typing “SU25” in the command box.
    If you do decide to use SU25 Step 6 to convert the Manual profiles to activity groups, you will need to watch out for the following “gotchas”:
    Naming convention (T_500yyyyy_previous name)
    All activity groups created before SU25 is run, are renamed to T_500yyyyy_previous name. 
    See OSS note 156196 for additional information and procedures to rename the activity groups back to their original names using program ZPRGN_COPY_T_RY_ARGS.  Carefully review information regarding the loss of links between profiles and user master records.
    Transaction Ranges
    Ranges of transactions are not always added correctly to the newly-created activity groups. Some of the transactions in the middle of the range are occasionally left off.  E.g. you have a transaction range of VA01 – VA04 for a specific manual profile.  After SU25 conversion, the new Activity Group only contains VA01 and VA04.  Transactions VA02 and VA03 were not added.
    It is important that a complete download of table UST12 is done prior to running SU25.  Once SU25 has been run, a new download of UST12 can be done to identify which transactions have been dropped off.
    The missing transaction codes will need to be added manually to the relevant activity group via PFCG.
    Missed “new” transactions
    The output of one of the steps in SU25 is a list of the new replacement transactions (e.g. Enjoy transactions) that need to be added per activity group.  E.g. transaction ME21N replaces ME21.  The list will identify each activity group that has ME21 where ME21N needs to be added to.
    In some cases SU25 does not identify all new transactions to be added.
    2.3.2.      Approach #2: Manual reconstruction of Profiles as Roles (Activity Groups)
    An alternative approach to SU25 is to manually create an activity group for each manual profile that was created via SU02.
    The advantage of this approach is that you won’t have any missing transactions that were “dropped off” with the SU25 conversion.  
    3.      Items requiring special attention
    3.1.   Authorizations
    Several new authorization objects have been added with release 4.6. Care should be taken when adjusting authorizations – carefully review all new defaults that were brought in. These are indicated by a Yellow or Red traffic light in PFCG.
    It is highly recommended that you first check the previous settings where new defaults were brought in, before just accepting the new defaults.  You can either use the existing 3.1x Production system or the UST12 and/or USOBT_C tables as reference.
    3.2.   ‘*’ in S_TCODE
    It’s recommended that all activity groups containing an ‘*’ in authorization object s_tcode are recreated via PFCG by selecting only those transactions required for that role.  Also, if you did previously add transactions to an activity group by manipulating the s_tcode authorization entries, it is recommended that the transactions are pertinently selected/added on the Menu tab. The object s_tcode should be returned to its ‘Standard’ status.
    3.3.   Report Trees
    Report Trees need to be converted to Area Menus using transaction RTTREE_MIGRATION..
    3.4.   ABAP Query reports
    Reports created by ABAP Query need to be added either to the activity group (Menu tab) or to an Area menu to ensure an authorization check on s_tcode level.
    3.5.   S_RFC
    The use of an authorization object for Remote Function Calls (RFC) was introduced to provide authorization checks for BAPI calls, etc. Authorization object s_rfc provides access based on the Function Group (each RFC belongs to a Function Group). Due to the potential prevalent use of RFC’s within the R/3 system, SAP has provided the ability to change the checks for this object via parameter auth/rfc_authority_check. It is possible to deactivate the checking of this object completely. However it is recommended to rather set the values as required, which makes testing even more important! 
    3.6.   Custom tables and views
    Custom views and tables that are customarily maintained via SM30, SM31,etc. will need to be added to an authorization group.  This can be done via transaction SE54 or SUCU or by maintaining table TDDAT via SM31.
    3.7.   User menus versus SAP menu
    A decision needs to be made once the first system has been upgrade to 4.6x as to whether the user menus or the SAP menu, or both are to be used.
    Most users find the new user menus confusing and unfamiliar due to duplication of transactions, etc. (if a user has more than one activity group and the same transaction appears in several, the transaction will appear multiple times). The majority of upgrades from my experience have opted to use a modified copy of the SAP menu by adding their own area menus (converted report trees).
    3.8.   Re-linking of user master records to profiles
    If you do not maintain the user masters in the same client as the activity groups, you will need to establish a strategy for re-linking the users in the QA and Productive environments when transporting the activity groups as part of the upgrade cutover. This might also be necessary depending on whether you decided to rename the Activity groups per OSS note 156196.
    Remember to thoroughly test and document all procedures and CATT scripts prior to the Production cutover.
    3.9.   Dual-maintenance
    With most current upgrades, the upgrade process will be tested on a separate environment set aside from the existing landscape. In a lot of cases a dual-landscape will be implemented where the existing landscape is complemented with an additional 4.6x test client(s).   The new 4.6x clients usually become part of the permanent landscape once the Production system has been cut over and all changes are then sourced from these ‘new’ Development and/or QA systems.
    It is imperative that all interim security-related changes are applied to both sets of systems to ensure that the ‘new’ 4.6x development source system is current with all changes that were made as part of Production support in the ‘old’ version landscape.  If not, you will have changes that were taken to Production when it was still on the older release, but are now missing after the switch is made to the 4.6x systems.
    It is thus advisable to keep changes during the upgrade project to a minimum.
    3.10. Transport of activity groups
    Changes to activity groups are not automatically recorded in 4.6x. When an activity group needs to be transported, it needs to be explicitly assigned to a change request via PFCG.
    SAP recommends that you first complete all the changes to an activity group, before you assign it to a transport request.   Once you’ve assigned the activity group to a request, do not make any further changes to it.
    You can also do a mass transport of activity groups via PFCG > Environment > Mass Transport.
    If you want to transport the deletion of an activity group, you first have to assign the activity group to a transport request before performing the deletion via PFCG.
    3.11. Client copies
    The profiles used for creating client copies have been changed, especially profile SAP_USER from 4.5 onwards. Activity groups are seen as customizing and the SAP_USER profile copies both user masters and activity groups.
    It’s recommended that the client copy profiles are carefully reviewed before the copy is performed.
    See OSS note 24853 for additional information on client copies.
    3.12. SU24
    Changes to check indicators that were made via SU24 might have to be redone as part of the upgrade.  Ensure that any resulting transport requests are noted and included in the detailed cutover plan.
    Check indicator changes done via SU24 will need to be applied for any new and replacement transactions.
    3.13. Composite Activity Groups
    Composite activity groups can be built in release 4.6x using individual activity groups.  A composite activity group does not contain any authorizations, but is merely a collection of individual activity groups.
    3.14. Central User Administration
    Central User Administration (CUA) simplifies user administration, allowing security administrators to maintain users in a single central client only.  The user masters are then distributed to other clients using ALE.  It is recommended that CUA is implemented post-upgrade and once the systems have been stabilized.  Carefully review OSS notes and the impact on the existing landscape, client copy procedures, etc. prior to implementing CUA.  It is recommended that the upgrade is kept as simple as possible – there are going to be plenty of opportunities to test your problem-solving skills without complicating the setup with new utilities!
    See Authorizations Made Easy guide for information on setting up CUA.
    See OSS notes 333441 and 159885 for additional information.
    4.      additional tips
    4.1.               OSS and Release Notes
    Review all security-related OSS and Release notes related to upgrades and to the release you’ll be upgrading to, prior to the upgrade.  It’s useful to review these before you define your workplan, in case you have to cater for any unforeseen issues or changes.
    4.2.               Workplan
    Given the amount of work and number of steps involved in the security upgrade, it is recommended that a detailed Workplan is defined at the startup of the upgrade project.  Key milestones from the security workplan should be integrated and tracked as part of the overall Upgrade Plan.
    Clear ownership of activities, including conversion of Report Trees, needs to be established.  This function is often perform by the Development team.
    4.3.               Standards and Procedures
    Naming conventions and standard procedures should be established before the manual profiles are reconstructed as activity groups.  Each team member should know how the new activity groups should be named to ensure consistency. Other standard practices for the construction of the activity groups should include:
    ·        Transactions are added via the Menu tab and not by manipulating s_tcode.
    ·        Ideally, no end users should have access to SE38, SA38, SE16 nor SE17. 
    Remember to keep Internal Audit involved where decisions need to be made regarding the segregation of job functions or changes to current authorizations are requested or brought in with new authorization objects / defaults.
    4.4.               Testing
    4.4.1.      Resources for testing
    Enough resources should be allocated to the security upgrade process as each activity group and profile will require work to some degree or the other.  It is important that key users and functional resources are involved in testing the activity groups and that this effort is catered for in the Upgrade Project plan.  Clear ownership of each activity group should be established not only for testing purposes, but also for ongoing support and approval of changes.  Ideally, the ownership and approval of changes should reside with different resources (i.e. the person requesting the addition of a transaction or authorization should not be the same person responsible for approving the request).
    4.4.2.      Test Plan
    The security team should also establish testing objectives (whether each transaction being used in Production should be tested, whether each activity group should be tested with a representative ID, etc.). 
    A detailed test plan should then be established based on the approach, to ensure each person responsible for testing knows what s/he should be testing, what the objective(s) of the test is and how to report the status of each test.  Both positive (user can do his/her job functions) and negative (user can’t perform any unauthorized functions) testing should be performed.
    The Reverse Business Engineering (RBE) tool is very useful in identifying which transactions are actually being using in Production.  This can assist with focusing on which transactions to test.
    The importance of testing all used transactions individually and as part of role-testing cannot be stressed enough.  TEST,TEST,TEST!
    Every menu option, button, icon and available functions for all critical transactions need to be checked and tested.  There are some instances where icons are grayed out or don’t even appear for certain users, due to limited authorizations.  The only way these type of issues can be identified, is through thorough testing.
    4.5.               Issue Management (tracking and resolution)
    Due to the number of users potentially impacted by issues / changes to a single activity group, a perception can quickly be created that the security upgrade was unsuccessful or the cause of many post GoLive issues.
    It is therefore recommended that an issues log is established to track and ensure resolution of issues.  The log should ideally also contain a description of the resolution, to aid with similar problems on other activity groups. 
    This log will be helpful during the entire upgrade process, especially where more than one resource is working the same set of activity groups, so set it up at the beginning of upgrade project!  You can also use this for a ‘lessons learnt’ document for the next upgrade.
    4.6.               Status reporting
    The security upgrade forms an integral part of the overall upgrade given the sensitivity and frustration security issues could cause.  It is important that key milestones for the security upgrade are tracked and reported on to ensure a smooth and on-time cutover.
    4.7.               Detailed cutover plan
    The detailed cutover plan differs from the overall security workplan, in that the detailed plan outlines the exact steps to be taken during each system’s upgrade itself.  This should include:
    ·        Transport request numbers,
    ·        Download of security tables prior to the upgrade, especially UST12, USOBT_C and USOBX_C,
    ·        A backup and restore plan, (e.g. temporary group of activity groups for critical functions),
    ·        The relinking of user master records, with details on any CATT scripts, etc. that might be used,
    ·        User comparison, etc. 
    The security team needs to ensure that enough time is allocated for each action item and that this time is built into the overall cutover plan.   The project manager is usually expected to give an indication to end users and key stakeholders as to when the Productive system will be unavailable during its cutover to the new release.  This downtime should thus incorporate time required to perform user master comparisons, unlocking of ID’s and all other action items.
    4.8.               Project team access
    The SAP_NEW profile can temporarily be assigned to project team members to provide interim access to the new authorization objects. This provides the security team the opportunity to convert and adjust the IS team’s activity groups.  It also eliminates frustration on the functional team’s side when configuring and testing new transactions, etc.
    4.9.               Training and new functionality
    Some support team members (e.g. Help Desk members responsible for reset of user passwords, etc.) might require training and/or documentation on the changed screens of SU01, etc.
    It is recommended that a basic Navigation & Settings training module is created for all SAP users and should cover the use of Favorites, etc.
    The security team should also review Profile Generator in detail, as several new functions have been added (e.g. download/upload of activity groups, etc.).  Remember to review all the different icons, menu options and settings on the authorizations tab, etc.
    Lastly, if your company / project does use HR as related to security (activity groups and users assigned to positions / jobs), ensure that you become acquainted with the new enjoy transactions, e.g. PPOMW.
    4.10.           SU53
    A new function with SU53 is the ability to display another user’s SU53 results.   (Click on the ‘other user’ button and enter the person’s SAP ID).
    4.11.           Post Go-live
    Remember to establish a support roster, including after hours for critical batch processes, to ensure security-related issues are resolved in a timely fashion.
    Dumps should be checked regularly (Objects s_rfc and s_c_funct like making appearances in dumps) for any authorizations-related issues.  Transaction ST22 can be used to review dumps for that day and the previous day.
    Avoid transporting activity groups at peak times, as the generation of activity groups can cause momentarily loss of authorizations.  It’s recommended that a roster for activity group transport and mass user comparison be reviewed with the project manager prior to the upgrade.  Exceptions should be handled on an individual basis and the potential impact identified, based on number and type of users, batch jobs in progress, etc. 
    And, don’t forget to keep on tracking all issues and documenting the resolutions for future reference.
    5.      helpful reports, transactions and tables
    5.1.               Reports and Programs
    ·           RTTREE_MIGRATION: Conversion of Report Trees to Area Menus
    ·           PFCG_TIME_DEPENDENCY: user master comparison (background)
    ·           RSUSR* reports (use SE38 and do a possible-values list for RSUSR* to see all available security reports), including:
    v     RSUSR002 – display users according to complex search criteria
    v     RSUSR010 – Transactions that can be executed by users, with Profile or Authorization
    v     RSUSR070 – Activity groups by complex search criteria
    v     RSUSR100 – Changes made to user masters
    v     RSUSR101 – Changes made to Profiles
    v     RSUSR102 – Changes made to Authorizations
    v     RSUSR200 – Users according to logon date and password change, locked users.
    5.2.               Transactions
    ·           SUIM : various handy reports
    ·           SU10 : Mass user changes
    ·           PFCG: Profile Generator
    ·           PFUD: User master comparison
    ·           SU01: User master maintenance
    ·           ST01: System trace
    ·           ST22: ABAP dumps
    ·           SUCU / SE54: Maintain authorization groups for tables / views
    ·           PPOMW: Enjoy transaction to maintain the HR organizational plan
    ·           PO10: Expert maintenance of Organizational Units and related relationships
    ·           PO13: Expert maintenance of Positions and related relationships
    ·           STAT: System statistics, including which tcodes are being used by which users
    5.3.               Tables
    Table
    Use
    UST12
    Authorizations and Tcodes per Profile
    UST04
    Assignment of users to Profiles
    AGR_USERS
    Assignment of roles to users
    USOBT_C
    Authorizations associated with a transaction
    USR02
    Last logon date, locked ID’s
    AGR_TCODES
    Assignment of roles to Tcodes (4.6 tcodes)
    USH02
    Change history for users (e.g. who last changed users via SU01)
    USH04
    Display history of who made changes to which User Ids
    USR40
    Non-permitted passwords
    i am also providing the url of sap  upgrade guide. pls check it out ok.
    www.thespot4sap.com/upgrade_guide_v2.pdf
    reward me points if it helps you
    thanks
    karthik

  • DELL Latitude + Apple Extreme Airport= help please

    ok i recently received a DELL Latitude, good condition, given to me with Wireless-G notebook Linksys program+card to find wifi.
    I have three computers total, two of which work fine, my Windows XP and my iBook G4, then my Airport Extreme.
    Heres the problem;
    The wifi connects, i enter my wifi password, and im in, now, i dont have internet.
    "You are connected to the access point, but the internet cannot be found"
    ^ exact quote...
    any advice?

    Here's something I discovered and I need to test it more because towards the end of use for the connection it started acting weird.
    I had three (3) dollar sign ($) characters in my SSID. I removed these and the problem vanished. I was able use my wireless and Nortel VPN software to connect to the corp. offices yesterday for a rather substantial length of time - a lot more than before. However towards the end of the day the old problem reappeared, but might have been due to an outage.
    I also wonder if Com-not-so-tasic Comcast might have been to blame. I plan on testing this more over the weekend.
    Are you using dollar signs ($) or other odd characters in your SSID?

Maybe you are looking for