SlideShare ist ein Scribd-Unternehmen logo
1 von 9
1




                          INTRODUCTION
Post-accident investigations have revealed that the majority of accidents are caused by
unsafe practices. Most of these practices are known beforehand to be unsafe and in
violation of safety regulations. Other factors include fatigue, monotony, preoccupation at a
critical moment (inattentiveness), mental and/or physical problems, improper supervision,
and lack of motivation.
Humans make mistakes. By their action or inaction they cause, or fail to prevent,
accidents. In order to prevent accidents personnel must always be mentally and physically
alert to potential hazards. Training, reminders, and good personal examples will create a
climate of safety awareness.
Telecom safety deals with the hazards and safety precautions pertaining telecom,
equipment, their installation and maintenance. It is very important that all personnel know
and comply with all safety precautions and procedures.



                 SAFETY PRECAUTIONS
                        GENERAL SAFETY REQUIREMENTS
        Required warning signs (e.g., Danger Stack Gas, Danger High Voltage) must
           be properly posted.

        Trained and qualified personnel should be allowed to install or replace
           equipment.

        Obey all warning signs; read equipment warning labels before use.

        Use authorized equipment to perform maintenance work.

        Do not perform any action that creates a potential hazard to people or makes
           equipment unsafe.

        Do not work alone if potentially hazardous conditions exist.

        Never assume, always double check.

        Use disposable dust masks for protection from inhalation of dust in dusty
           environment.
                                                      Be Safety Smart Right From The Start
2
           PERSONAL ELECTRICAL/ELECTRONIC
           EQUIPMENT
 All personal electrical and electronic equipment brought must be inspected by
   designated personnel.

 Designated electronics technicians perform safety checks on electronic
   equipment.

 Electronic equipment that is not double-insulated or that does not have a case
   and handle made of non-conducting material and does not pass a inspection for
   rugged, safe construction.

 Wear rubber gloves when using metal cased portable electric equipment or
   hand held portable tools in hazardous conditions (e.g., wet floor). Wear leather
   gloves.

 Only use tools and utilities that are in flawless condition. It is not permitted to
   use visibly damaged tools.


         WORKING ON ENERGIZED EQUIPMENT
 Personnel must never work on energized equipment alone. A safety observer
   must be present.

 Never operate a switch with the other hand on a metal surface.

 If you are handling circuits with dangerous voltages always work with a
   partner who knows the location of power supply switches.

 Always ensure adequate insulation when touching powered circuits.



           ENSURING DE-ENERGIZATION
                    Disconnect power supplies before working with the
   equipment.

 Do not touch a conductor, until it has been verified that it is de-energized.

 Use a voltmeter or voltage tester to ensure that equipment or circuits are de-
   energized.

 Ensure that the installation is not powered by an additional power supply or
   protected via an additional fuse.

                        Your Safety Doesn’t Depend On Luck, It Depends On You
3

         WORKING AREA REQUIREMENTS
 The standing surface must be insulated from ground with insulating material
   (rubber mat or insulated tiles or, when these are not available, dry wood, dry
   canvas, dry phenolic material.

 Floor covering must be nonskid.

 Keep chassis area clean and dust free.

 The working area must be properly ventilated.

 Keep tools away from walk area where you and others could fall over them.

 Ensure good lighting at workplace.

 Untidiness at the work place involved the risk of injuries.




            CLOTHING AND ARTICLES
                   Do not wear loose clothing that could get caught in the
   chassis. Fasten your tie or scarf and roll up your sleeves.

 When working on the installations always tieback long hair.

 Workers shall not wear watches, rings, watch chains, metal articles that might
   accidentally contact energized circuits.

 Never wear jewelry or items such as metal fittings or metal rivets on items of
   clothing.

 Clothing and articles shall be as dry as possible.



            ELECTRONIC WORKBENCHES
 Bond and ground the workbench.

 Install a grounding bus for maintenance purposes.

 Install a disconnect switch to secure power to the workbench in case of electric
   shock.

 Always put on the Electro-statically Sensitive Devices (ESD) wristband
   before touching any of the boards or modules.
                                                       Safest Device Is The Safe Worker
4
        Always place PC boards on a grounded conductive base and do not work on
         the PC boards anywhere else.

        Only use grounded soldering irons.



HANDLING FIBER OPTIC CABLE
        Fiber optic cable must be handled, spliced and terminated by highly
           experienced personnel because this is a very sensitive solution.

        These personnel must wear safety gloves while splicing any fiber optic cable.

        Improper handling of fiber optic termination equipment can lead to serious
           injuries to human health because fiber optic glass is so thin that it cannot be
           detected by any medical techniques, if penetrated in the body.




            IN CASE OF AN ACCIDENT

WHAT TO DO IN EMERGENCY?
        In the events of accidents, remain calm and controlled.

        Always switch off the power supply before you touch an accident vicinity.

        If you are not able to switch off the power supply immediately only touch the
           victim with non-conductive material e.g. wooden broom handle and first of all
           try to isolate the victim from the power supply.


            FIRST AID
You must be familiar with first practices in the events of injuries. A fundamental
knowledge of various resuscitation methods if the victim have heart is no longer beating.
Immediately call an ambulance or the emergency doctor. Give details of the accident in
the following order:

          Where did the accident happened?
          What happened?
          How many people were injured?
          Wait for questions.
                                                       Don’t Learn Safety By Accident


           SAFETY IMPLEMENTATIONS
5


                      Implement a comprehensive training program for all hands on
                      hazards and safety precautions pertaining to electronic systems,
                      equipment, and personal electronic equipment. As a first step
                      designate an electronic safety officer.



SAFETY OFFICER’S RESPONSIBILITIES
     Ensure that personnel engaged in operation and repair of electronic equipment
       follow safety precautions.

     Ensure that required safety devices and warning signs are installed.

     Train electronics personnel in safety precautions and mishap prevention.

     Monitor mishap prevention by investigating all mishaps and near mishaps.

     Evaluate the effectiveness of the safety program by analyzing internal and
       external reports.

     Ensure submission of occupational injury and illness reports.

     Recommend improvements to the safety program.



INDIVIDUAL RESPONSIBILITIES
               Supervisors must set good personal examples and ensure that safety
               precautions are strictly followed. All personnel must strictly observe
               safety precautions. Accident prevention is everyone's business. All
               personnel must:

     Observe posted operating instructions and safety precautions.

     Report any unsafe condition, equipment, or material.

     Warn others of hazards and failure to observe safety precautions.

     Wear approved protective clothing or use protective equipment as required.

     Report any injury or evidence of impaired health.

                              Don’t Leave Safety Habits At Work , Take Them Home
6

                                    HiPATH

INTRODUCTION
                        HiPath is a modular portfolio of multifunctional communication
                        and security solutions. It makes it possible to set up a modern real-
                        time communications landscape and, among other things, ensures
                        that employees are always accessible and that corporate resources
                        can be accessed from any location. It also allows innovative
                        business communication applications to be used to boost
productivity. Whatever their structure or size, enterprises operating in any sector will be
more efficient and secure once they install HiPath.

SYSTEMS
HiPath Real Time IP Systems transmits voice, data and video
worldwide and over any type of network. This means service is
never interrupted and productivity is enhanced. This goes for
very small business networks, as well as huge global networks
with 100,000 or more users:

   •   HiPath 1100 and HiPath 1220 for small enterprises
   •   HiPath 3000 for small to medium enterprises
   •   HiPath 3000 and HiPath 5000 for medium to large
       enterprises
   •   HiPath 4000 for medium to very large enterprises
   •   HiPath 8000 for very large global enterprises

APPLICATIONS
HiPATH can handle efficient applications – including unified messaging, CTI, and mobile
communications – for companies of all sizes and disciplines.
HiPath MobileOffice and HiPath Xpressions facilitate real-time unified
communications, independent of medium, device or location. Applications for unified
messaging, teleworking, desk-sharing, communication filtering, and telephone access to
webbased content do away with communication chaos and render employee truly mobile.
HiPath OpenScape makes all the communication media of a company and presence
information     on      all    users      available      within    one      application.

HiPath ProCenter is the basis for effective Customer Relationship Management (CRM),
which can be used to regulate and manage all of the company’s customer related
processes.



DEVICES
7
The optiPoint Portfolio has the right device for any
network environment and every workplace. The
optiPoint 410 and optiPoint 420 lines of IP telephones
are especially flexible and offer extremely high voice
quality due to standard G.722 broadband codec
technology. The optiPoint 600 office is the industry’s
first universal telephone that supports a choice of IP
or circuitswitched configurations; its the choice when
needed a converged phone for mixed networks.

The optiClient 130 phone turns the PC into a “Lazy-Suzan” of communications choices.
The optiClient software is also available for use on standard PDA. The combination of
Gigaset portable handsets and optiPoint WLAN phones makes employees more
accessible anywhere on the company premises.




    CISCO SWITCHES AND ROUTERS

INTRODUCTION
Cisco Systems redefines best-in-class
routing with a new portfolio of integrated
services routers that are engineered for
secure, wire-speed delivery of concurrent
data, voice, video, and wireless services.
An integrated systems approach to
embedded services speeds application
deployment to help reduce operating costs
and complexities. Cisco is the first in the
industry to embed security and voice services into a single routing system for fast, scalable
delivery of mission-critical business applications to organizations of all sizes.

As Cisco's LAN switching platform, the Cisco Catalyst Switch offers the highest levels of
availability and integrated security, strongest support for converged applications, superior
operational efficiency and unmatched, long-term investment protection among Cisco
switching products designed for medium-sized business, enterprise, and service provider
networks. The flexible range of Catalyst option makes this platform ideal for network-
wide deployments, from the data center to the wiring closet.

The Catalyst Switch continues to set the standard for high-end LAN switching with
industry-leading innovations, such as:




Highest Availability:
The Catalyst with Cisco IOS Software Modularity enables subsystem In-Service Software
Upgrades (ISSU) and stateful process restarts; Generic Online Diagnostics (GOLD)
8
proactively detect hardware and software faults; Non-Stop Forwarding and Stateful
SwitchOver (NSF/SSO) delivers application and service continuity; and redundant system
components provide hardware-level resiliency.



Highest Level of Integrated Security:
These switches include multiple Denial-of-service (DoS) attack mitigation mechanisms,
integrated security service modules for high-performance threat protection and secure
connectivity, Man-in-the-middle attack mitigation innovations to protect against IP phone
call eavesdropping, and Identity-Based Networking Services (IBNS) to control network
access.

Strongest Support for Converged Applications:
Advanced features include embedded real-time monitoring of VoIP call quality; the Cisco
Communication Media Module, which allows you to connect TDM and analog devices to
the IP network; a wireless LAN services module to simplify deployment and management
of WLAN infrastructure; and an Application-Oriented Networking (AON) Module to
provide message-level routing, visibility, and security. Additional converged applications
support includes high-density 802.3af Power over Ethernet with intelligent power
management, advanced IP multicast, and Quality of Service features.

Superior Operational Efficiency:
The Catalyst with Cisco IOS Software Modularity simplifies software changes and
enables process-level policy control; Embedded Event Manager (EEM) allows you to
create automated policies to ease management; Encapsulated Remote SPAN (ERSPAN)
enables centralized analysis of remote traffic across L3 boundaries; and network
virtualization features such as MPLS, VRF-lite, and firewall virtualization provide
efficient network segmentation.

Unmatched, Long-Term Investment Protection:
The Catalyst is a long-term platform with a deep pipeline of future innovations. It offers
several daughter-card options for incremental upgrades and backward compatibility to
support multiple generations of interface modules.




            CORNING CABLE SYSTEMS
9
Corning Cable Systems is a global, diverse company. They offer the broadest range of tip-
to-tip fiber optic and copper product solutions for your cabling networks including: optical
fiber cables for aerial, duct, buried, road, rail, power, sewer and submarine applications;
private networks solutions that include fiber optic and copper data cables, connectors and
related hardware; cable hardware and equipment including network interface devices, test
equipment, splice equipment, cable assemblies and fiber optic connectors; and, network
services that include network design, project management, installation and maintenance,
and fiber optic training programs.



Patch Panel



Patch Cords




I/O



Fiber Optic Cable Connector

Weitere ähnliche Inhalte

Mehr von Ashar Ahmed

Quality Plan Overhauling Of Refinery
Quality Plan Overhauling Of RefineryQuality Plan Overhauling Of Refinery
Quality Plan Overhauling Of RefineryAshar Ahmed
 
Scope Statement Overhauling Of Refinery
Scope Statement Overhauling Of RefineryScope Statement Overhauling Of Refinery
Scope Statement Overhauling Of RefineryAshar Ahmed
 
WBS Refinery Overhauling
WBS Refinery OverhaulingWBS Refinery Overhauling
WBS Refinery OverhaulingAshar Ahmed
 
Tables Presentation Refinery Overhauling
Tables Presentation Refinery OverhaulingTables Presentation Refinery Overhauling
Tables Presentation Refinery OverhaulingAshar Ahmed
 
Refinery Overhauling Introduction
Refinery Overhauling IntroductionRefinery Overhauling Introduction
Refinery Overhauling IntroductionAshar Ahmed
 
Critical Tasks Refinery Overhauling
Critical Tasks Refinery OverhaulingCritical Tasks Refinery Overhauling
Critical Tasks Refinery OverhaulingAshar Ahmed
 
North Carolina Su
North Carolina SuNorth Carolina Su
North Carolina SuAshar Ahmed
 
Sir Siva Nce VISION
Sir Siva Nce VISIONSir Siva Nce VISION
Sir Siva Nce VISIONAshar Ahmed
 

Mehr von Ashar Ahmed (11)

Aivis
AivisAivis
Aivis
 
Quality Plan Overhauling Of Refinery
Quality Plan Overhauling Of RefineryQuality Plan Overhauling Of Refinery
Quality Plan Overhauling Of Refinery
 
Scope Statement Overhauling Of Refinery
Scope Statement Overhauling Of RefineryScope Statement Overhauling Of Refinery
Scope Statement Overhauling Of Refinery
 
WBS Refinery Overhauling
WBS Refinery OverhaulingWBS Refinery Overhauling
WBS Refinery Overhauling
 
Tables Presentation Refinery Overhauling
Tables Presentation Refinery OverhaulingTables Presentation Refinery Overhauling
Tables Presentation Refinery Overhauling
 
Refinery Overhauling Introduction
Refinery Overhauling IntroductionRefinery Overhauling Introduction
Refinery Overhauling Introduction
 
Critical Tasks Refinery Overhauling
Critical Tasks Refinery OverhaulingCritical Tasks Refinery Overhauling
Critical Tasks Refinery Overhauling
 
ISO 10006
ISO 10006ISO 10006
ISO 10006
 
North Carolina Su
North Carolina SuNorth Carolina Su
North Carolina Su
 
Sir Siva Nce VISION
Sir Siva Nce VISIONSir Siva Nce VISION
Sir Siva Nce VISION
 
Boltay Haath
Boltay HaathBoltay Haath
Boltay Haath
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Operational Safety in Telecom

  • 1. 1 INTRODUCTION Post-accident investigations have revealed that the majority of accidents are caused by unsafe practices. Most of these practices are known beforehand to be unsafe and in violation of safety regulations. Other factors include fatigue, monotony, preoccupation at a critical moment (inattentiveness), mental and/or physical problems, improper supervision, and lack of motivation. Humans make mistakes. By their action or inaction they cause, or fail to prevent, accidents. In order to prevent accidents personnel must always be mentally and physically alert to potential hazards. Training, reminders, and good personal examples will create a climate of safety awareness. Telecom safety deals with the hazards and safety precautions pertaining telecom, equipment, their installation and maintenance. It is very important that all personnel know and comply with all safety precautions and procedures. SAFETY PRECAUTIONS GENERAL SAFETY REQUIREMENTS  Required warning signs (e.g., Danger Stack Gas, Danger High Voltage) must be properly posted.  Trained and qualified personnel should be allowed to install or replace equipment.  Obey all warning signs; read equipment warning labels before use.  Use authorized equipment to perform maintenance work.  Do not perform any action that creates a potential hazard to people or makes equipment unsafe.  Do not work alone if potentially hazardous conditions exist.  Never assume, always double check.  Use disposable dust masks for protection from inhalation of dust in dusty environment. Be Safety Smart Right From The Start
  • 2. 2 PERSONAL ELECTRICAL/ELECTRONIC EQUIPMENT  All personal electrical and electronic equipment brought must be inspected by designated personnel.  Designated electronics technicians perform safety checks on electronic equipment.  Electronic equipment that is not double-insulated or that does not have a case and handle made of non-conducting material and does not pass a inspection for rugged, safe construction.  Wear rubber gloves when using metal cased portable electric equipment or hand held portable tools in hazardous conditions (e.g., wet floor). Wear leather gloves.  Only use tools and utilities that are in flawless condition. It is not permitted to use visibly damaged tools. WORKING ON ENERGIZED EQUIPMENT  Personnel must never work on energized equipment alone. A safety observer must be present.  Never operate a switch with the other hand on a metal surface.  If you are handling circuits with dangerous voltages always work with a partner who knows the location of power supply switches.  Always ensure adequate insulation when touching powered circuits. ENSURING DE-ENERGIZATION  Disconnect power supplies before working with the equipment.  Do not touch a conductor, until it has been verified that it is de-energized.  Use a voltmeter or voltage tester to ensure that equipment or circuits are de- energized.  Ensure that the installation is not powered by an additional power supply or protected via an additional fuse. Your Safety Doesn’t Depend On Luck, It Depends On You
  • 3. 3 WORKING AREA REQUIREMENTS  The standing surface must be insulated from ground with insulating material (rubber mat or insulated tiles or, when these are not available, dry wood, dry canvas, dry phenolic material.  Floor covering must be nonskid.  Keep chassis area clean and dust free.  The working area must be properly ventilated.  Keep tools away from walk area where you and others could fall over them.  Ensure good lighting at workplace.  Untidiness at the work place involved the risk of injuries. CLOTHING AND ARTICLES  Do not wear loose clothing that could get caught in the chassis. Fasten your tie or scarf and roll up your sleeves.  When working on the installations always tieback long hair.  Workers shall not wear watches, rings, watch chains, metal articles that might accidentally contact energized circuits.  Never wear jewelry or items such as metal fittings or metal rivets on items of clothing.  Clothing and articles shall be as dry as possible. ELECTRONIC WORKBENCHES  Bond and ground the workbench.  Install a grounding bus for maintenance purposes.  Install a disconnect switch to secure power to the workbench in case of electric shock.  Always put on the Electro-statically Sensitive Devices (ESD) wristband before touching any of the boards or modules. Safest Device Is The Safe Worker
  • 4. 4  Always place PC boards on a grounded conductive base and do not work on the PC boards anywhere else.  Only use grounded soldering irons. HANDLING FIBER OPTIC CABLE  Fiber optic cable must be handled, spliced and terminated by highly experienced personnel because this is a very sensitive solution.  These personnel must wear safety gloves while splicing any fiber optic cable.  Improper handling of fiber optic termination equipment can lead to serious injuries to human health because fiber optic glass is so thin that it cannot be detected by any medical techniques, if penetrated in the body. IN CASE OF AN ACCIDENT WHAT TO DO IN EMERGENCY?  In the events of accidents, remain calm and controlled.  Always switch off the power supply before you touch an accident vicinity.  If you are not able to switch off the power supply immediately only touch the victim with non-conductive material e.g. wooden broom handle and first of all try to isolate the victim from the power supply. FIRST AID You must be familiar with first practices in the events of injuries. A fundamental knowledge of various resuscitation methods if the victim have heart is no longer beating. Immediately call an ambulance or the emergency doctor. Give details of the accident in the following order:  Where did the accident happened?  What happened?  How many people were injured?  Wait for questions. Don’t Learn Safety By Accident SAFETY IMPLEMENTATIONS
  • 5. 5 Implement a comprehensive training program for all hands on hazards and safety precautions pertaining to electronic systems, equipment, and personal electronic equipment. As a first step designate an electronic safety officer. SAFETY OFFICER’S RESPONSIBILITIES  Ensure that personnel engaged in operation and repair of electronic equipment follow safety precautions.  Ensure that required safety devices and warning signs are installed.  Train electronics personnel in safety precautions and mishap prevention.  Monitor mishap prevention by investigating all mishaps and near mishaps.  Evaluate the effectiveness of the safety program by analyzing internal and external reports.  Ensure submission of occupational injury and illness reports.  Recommend improvements to the safety program. INDIVIDUAL RESPONSIBILITIES Supervisors must set good personal examples and ensure that safety precautions are strictly followed. All personnel must strictly observe safety precautions. Accident prevention is everyone's business. All personnel must:  Observe posted operating instructions and safety precautions.  Report any unsafe condition, equipment, or material.  Warn others of hazards and failure to observe safety precautions.  Wear approved protective clothing or use protective equipment as required.  Report any injury or evidence of impaired health. Don’t Leave Safety Habits At Work , Take Them Home
  • 6. 6 HiPATH INTRODUCTION HiPath is a modular portfolio of multifunctional communication and security solutions. It makes it possible to set up a modern real- time communications landscape and, among other things, ensures that employees are always accessible and that corporate resources can be accessed from any location. It also allows innovative business communication applications to be used to boost productivity. Whatever their structure or size, enterprises operating in any sector will be more efficient and secure once they install HiPath. SYSTEMS HiPath Real Time IP Systems transmits voice, data and video worldwide and over any type of network. This means service is never interrupted and productivity is enhanced. This goes for very small business networks, as well as huge global networks with 100,000 or more users: • HiPath 1100 and HiPath 1220 for small enterprises • HiPath 3000 for small to medium enterprises • HiPath 3000 and HiPath 5000 for medium to large enterprises • HiPath 4000 for medium to very large enterprises • HiPath 8000 for very large global enterprises APPLICATIONS HiPATH can handle efficient applications – including unified messaging, CTI, and mobile communications – for companies of all sizes and disciplines. HiPath MobileOffice and HiPath Xpressions facilitate real-time unified communications, independent of medium, device or location. Applications for unified messaging, teleworking, desk-sharing, communication filtering, and telephone access to webbased content do away with communication chaos and render employee truly mobile. HiPath OpenScape makes all the communication media of a company and presence information on all users available within one application. HiPath ProCenter is the basis for effective Customer Relationship Management (CRM), which can be used to regulate and manage all of the company’s customer related processes. DEVICES
  • 7. 7 The optiPoint Portfolio has the right device for any network environment and every workplace. The optiPoint 410 and optiPoint 420 lines of IP telephones are especially flexible and offer extremely high voice quality due to standard G.722 broadband codec technology. The optiPoint 600 office is the industry’s first universal telephone that supports a choice of IP or circuitswitched configurations; its the choice when needed a converged phone for mixed networks. The optiClient 130 phone turns the PC into a “Lazy-Suzan” of communications choices. The optiClient software is also available for use on standard PDA. The combination of Gigaset portable handsets and optiPoint WLAN phones makes employees more accessible anywhere on the company premises. CISCO SWITCHES AND ROUTERS INTRODUCTION Cisco Systems redefines best-in-class routing with a new portfolio of integrated services routers that are engineered for secure, wire-speed delivery of concurrent data, voice, video, and wireless services. An integrated systems approach to embedded services speeds application deployment to help reduce operating costs and complexities. Cisco is the first in the industry to embed security and voice services into a single routing system for fast, scalable delivery of mission-critical business applications to organizations of all sizes. As Cisco's LAN switching platform, the Cisco Catalyst Switch offers the highest levels of availability and integrated security, strongest support for converged applications, superior operational efficiency and unmatched, long-term investment protection among Cisco switching products designed for medium-sized business, enterprise, and service provider networks. The flexible range of Catalyst option makes this platform ideal for network- wide deployments, from the data center to the wiring closet. The Catalyst Switch continues to set the standard for high-end LAN switching with industry-leading innovations, such as: Highest Availability: The Catalyst with Cisco IOS Software Modularity enables subsystem In-Service Software Upgrades (ISSU) and stateful process restarts; Generic Online Diagnostics (GOLD)
  • 8. 8 proactively detect hardware and software faults; Non-Stop Forwarding and Stateful SwitchOver (NSF/SSO) delivers application and service continuity; and redundant system components provide hardware-level resiliency. Highest Level of Integrated Security: These switches include multiple Denial-of-service (DoS) attack mitigation mechanisms, integrated security service modules for high-performance threat protection and secure connectivity, Man-in-the-middle attack mitigation innovations to protect against IP phone call eavesdropping, and Identity-Based Networking Services (IBNS) to control network access. Strongest Support for Converged Applications: Advanced features include embedded real-time monitoring of VoIP call quality; the Cisco Communication Media Module, which allows you to connect TDM and analog devices to the IP network; a wireless LAN services module to simplify deployment and management of WLAN infrastructure; and an Application-Oriented Networking (AON) Module to provide message-level routing, visibility, and security. Additional converged applications support includes high-density 802.3af Power over Ethernet with intelligent power management, advanced IP multicast, and Quality of Service features. Superior Operational Efficiency: The Catalyst with Cisco IOS Software Modularity simplifies software changes and enables process-level policy control; Embedded Event Manager (EEM) allows you to create automated policies to ease management; Encapsulated Remote SPAN (ERSPAN) enables centralized analysis of remote traffic across L3 boundaries; and network virtualization features such as MPLS, VRF-lite, and firewall virtualization provide efficient network segmentation. Unmatched, Long-Term Investment Protection: The Catalyst is a long-term platform with a deep pipeline of future innovations. It offers several daughter-card options for incremental upgrades and backward compatibility to support multiple generations of interface modules. CORNING CABLE SYSTEMS
  • 9. 9 Corning Cable Systems is a global, diverse company. They offer the broadest range of tip- to-tip fiber optic and copper product solutions for your cabling networks including: optical fiber cables for aerial, duct, buried, road, rail, power, sewer and submarine applications; private networks solutions that include fiber optic and copper data cables, connectors and related hardware; cable hardware and equipment including network interface devices, test equipment, splice equipment, cable assemblies and fiber optic connectors; and, network services that include network design, project management, installation and maintenance, and fiber optic training programs. Patch Panel Patch Cords I/O Fiber Optic Cable Connector