Product specifications

TFTP
33
the workgroup. The time source can be the local PC clock, an NTP server, or a timecode card installed in a server,
such as the CaptureManager server. In Slave mode, the Time Synchronization Service listens for time notifications
from the workgroup and (optionally) sets the local PC clock to match.
It is important to use only one time synchronism mechanism to set the local PC clocks in the Interplay
environment. If a Time Synchronization Slave service is configured to set the local PC clock and it detects that
some other mechanism (such as Windows 32 Time Services) changes the local clock, then the Time Sync Slave
service will disable itself to avoid the local clock from jumping back and forth. The Time Sync slave will also post
a Warning in the Health Monitor.
TFTP
Copy firmware and configuration files from the Host to the switch using a TFTP application. You can find several
on the Internet. The most common application used at Avid is called TFTPD32.exe. You can download a copy of
this program at the following Web link:
http://tftpd32.jounin.net/.
When configuring the TFTP application make sure that the IP address of the Server Interface is on the same
subnet as the switch with which you are attempting to communicate. Also, make sure that the files you are trying
to transfer are in the directory designated as the root for the TFTP application. This is sometimes referred to as the
Base Directory.
n
Make sure the firewall settings of the device permit incoming unsolicited use of the UDP port 69 used by the
TFTP.
Network and Switch Troubleshooting
The following sections include some suggestions that might help you troubleshoot the switch or clients’
connections to the switch.
Ping and Tracert Commands
Ethernet networking is the backbone for the Avid ISIS workgroup. If your Ethernet network is not performing
properly, it will affect your workgroup. The following sections describe how to use two commands, ping and
tracert, to troubleshoot your network.
Ping
You can use the ping command to confirm that the physical and logical aspects of your network are configured
correctly. Physical aspects include network interface cards, cables, and Ethernet switches. Logical aspects include
IP addresses, subnet masks, and routing.
Ping works by sending a packet over the network from an originating host to a destination host. The destination
host receives the packet and sends a response packet over the network to the originating host. If the originating
host receives the response packet, it is a good indication that the network is configured correctly.
In the ISIS environment you can use the PathDiag tool to do multiple pings using Network Connectivity Test
located in the Custom Test Setting area of the window.
You can use many options with ping. This section discusses two types of ping syntax:
ping
[System Name]