background image

D T - 6 X X X   BiSync  to  Async  ASCII  Printer  Application  U s e r ' s   M a n u a l    

B u i l d   9 . 0  

 

 

 

04/18/06 

 

 

Datatek Applications Inc. 

17

 

The IP-B2APRT application may also be used with the IP-SPOOL application which enables the 
sharing of one physical RFC 1179 compatible printer among many devices. Instead of to physical 
printer, the 

PRT

 command points to a “virtual” printer of the IP-SPOOL application. The IP-

SPOOL application defines the actual physical, but now shared printer. For the 

PRT

 command, 

dest

 is the IP address of the DT-6XXX on which the IP-SPOOL application is installed and 

dport

 

is the TCP port which is equal to 30000+ (

instance#

 - 1)*200. where instance# is the number of 

the instance, i.e. of the virtual printer on the IP-SPOOL application on the target DT-6XXX. 

3.13 R

EMOVE 

C

ONNECTIONS FROM 

S

ERVICE 

RM

 

Syntax: rm <host | prt> 

Should a situation occur where the TCP connections to either the Host or the ASCII printer needs 
to be taken down or altered, the connection should first be removed from service. That is the 
function of the 

remove

 command. 

The 

rm (remove

)

 command requires one argument. This argument is either 

host

 or 

prt

. When 

the argument is 

host

, the TCP connection to the BHI is taken down. When the argument is 

prt

the TCP connection to the ASCII printer interface is taken down. 

3.14 R

ESTORE 

C

ONNECTIONS TO 

S

ERVICE 

RS

 

Syntax: rs <host | prt> 

In order for any connectivity between the BHI Host, and the ASCII printer to occur, two TCP 
connections are required. These are configured using the 

bsc

 and 

asc

 for the host and printer 

respectively. After the addressing is configured, each connection needs to be brought into 
service. That is the function of the 

restore

 command. 

The 

rs (restore

)

 command requires one argument. This argument is either 

host

 or 

prt

. When the 

argument is 

host

, the TCP connection to the BHI is established. When the argument is 

prt

, the 

TCP connection to the ASCII printer interface is established. 

3.15 V

ERIFY 

C

ONFIGURATION 

VFY

 

Syntax: vfy 

The 

vfy

 command is only visible when the application is logged in. The command is used to 

display the configured options on the IP-B2APRT application. An example of the output of the 

vfy

 

command is shown previously on page 11. 

3.16 D

ISPLAY 

C

URRENT 

C

ONNECTIONS 

DCONN

 

Syntax: dconn 

The 

dconn

 command is used to display all of the current TCP connections on the IP-B2APRT 

application. The command will issue a report that shows the connection peer for each active 
connection.  

 

Summary of Contents for DT-6XXX

Page 1: ...CII PRINTER APPLICATION USER S MANUAL FOR DT 6XXX EMBEDDED NETWORK PROCESSORS RELEASE VERSION 9 0 ISSUE 2 379 Campus Drive Suite 100 Somerset NJ 08873 fax 732 667 1091 phone 732 667 1080 email sales datatekcorp com http www datatekcorp com ...

Page 2: ...2 SYNC8 Configuration 11 2 3 3 DT 6XXX Platform and IP B2APRT Application Configuration 11 2 3 4 DT 4000 Configuration 12 2 3 5 IP B2APRT Application Configuration 13 3 APPLICATION COMMANDS 14 3 1 INPUT CONVENTIONS 14 3 2 LOGIN 14 3 3 LOGOUT 15 3 4 CHANGE PASSWORD CHGPASS 15 3 5 APPLICATION CONSOLE USER HELP HELP 15 3 6 VERSION VER 15 3 7 LABEL 15 3 8 BANNER MESSAGE BANNER 15 3 9 APPLICATION COMME...

Page 3: ...LAY MEASUREMENTS DMEAS 18 3 20 CLEAR MEASUREMENTS CLR 18 4 APPLICATION SOFTWARE INSTALLATION UPGRADE 18 5 HARDWARE WARRANTY 19 6 END USER LICENSE AGREEMENT FOR SOFTWARE 19 6 1 SOFTWARE LICENSE 19 6 2 INTELLECTUAL PROPERTY RIGHTS 19 6 3 SOFTWARE SUPPORT 20 6 4 EXPORT RESTRICTIONS 20 6 5 LIMITED WARRANTY 20 6 6 NO OTHER WARRANTIES 20 6 7 SPECIAL PROVISIONS 21 7 LIMITATION OF LIABILITY 21 ...

Page 4: ...to the unit Installation must include an independent frame ground drop to building ground Refer to User s Manual This symbol is marked on the DT 6XXX adjacent to the ground earth area for the connection of the ground earth conductor This Equipment is to be Installed Only in Restricted Access Areas on Business and Customer Premises Applications in Accordance with Articles 110 16 110 17 and 110 18 o...

Page 5: ...ync Host ASCII Printers BiSync DT 6XXX DT 4XXX 135 19 22 6 135 19 22 4 135 19 22 8 IP Network IP B2APRT Application Installed In the above diagram the IP B2APRT application addresses both the ASCII printer and the BNS circuit group for each particular printer The operation is similar to the BNS A2B DKAP with regard to the printer functionality The Universal Mediation Interface 1 UMI module provide...

Page 6: ... 3 1 The first is the IP B2APRT application the same application as in the integrated network case and the subject of this manual 2 The second application is the BiSync Host Interface BHI application The BHI application interfaces with a BiSync host and performs Cluster Controller emulation for a multi point host line 2 An application instance can be described as a unit of configuration parameters...

Page 7: ... the DT 6XXX Now the IP B2APRT application itself has connections to virtual printers instead of individual dedicated ASCII printers Each virtual printer is an instance of the IP SPOOL application Other users in the network in this case network elements which normally send ASCII ROP output to dedicated printers now instead have connections to other virtual printers i e other instances of the same ...

Page 8: ...s of the DT 6XXX that includes the TCP port number of the IP B2APRT application instance The TCP port number of the IP B2APRT application instance is calculated using the following equation 10000 the application instance in the DT 6XXX Note The Application Console is different from the DT 6XXX Platform Console Next each instance of the IP B2APRT application supports a single ASCII printer Therefor...

Page 9: ... TN 3270 application 7 ASCII Printer 8 BiSync Host The following sections describe sample configurations for a subset of the items listed above and are based on the diagram below Configuration of BiSync Host and ASCII Printer is beyond the scope of this document Configuration of the TN 3270 application is described in detail in the TN 3270 User s Manual However knowledge of the BiSync Host s confi...

Page 10: ...l Listen Service State In Service Protocol Synchronous 2 3 1 2 OPERATIONAL CONFIGURATION The following console output reflects the output of the UMI verify command part of UMI Node command set The results displayed below describe a UMI Operational Configuration consistent with the configuration needs of the previous network diagram For a more detailed description of how to configure the UMI refer ...

Page 11: ...ebcdic full 9600 in PORT COMMENT 2 to bsc printer PORT CU SRVC 2 2 in TERM SCRN RECV LOGOFF LOGOFF FWD PORT CU TERM TYPE SIZE GRP METHOD SEQ ID ACK SRVC 2 2 4 basic ro N A bscprt none N A N A in BKPL PORT CU TERM CHNL 2 2 4 16 2 3 3 DT 6XXX PLATFORM AND IP B2APRT APPLICATION CONFIGURATION The DT 6XXX software is composed of two components One component called the Platform exists to support all app...

Page 12: ...eeds of the previous network diagram For a more detailed description of how to configure the DT 4000 refer to the DT 4000 User s Manual DT 4000 vfy mod Current Module Level Configuration Serial Number 0 0 5 138 152 38 Service State In Service Local MAC Address 0 96 29 2 55 8 Local IP Address 135 19 22 4 Subnet Mask 255 255 255 0 Gateway IP Address 135 19 22 1 DT 4000 vfy p 1 Current Configuration ...

Page 13: ...ects the commands necessary to configure the B2APRT application so that it is consistent with the configuration needs of the previous network diagram B2APRT prt dest 135 19 22 4 dport 50001 B2APRT host dest 135 19 22 8 dport 12000 B2APRT vfy M Verify BiSync to ASCII Printer Instance Configuration Local IP Address 192 168 8 250 Instance Number 1 ASCII Printer Interface 135 19 22 4 Port 50001 in ser...

Page 14: ...e Parameters of the form name value may use upper or lower case for name Default values if any are shown in parenthesis as part of the prompt Case is preserved for values When a password is being requested by a prompt input is not echoed Backspace erases one character and deletes the current line of input Most commands are killed by del key 3 2 LOGIN Syntax login passwd password or Prompted Mode S...

Page 15: ...help command displays the currently allowed commands for the mode that the unit is currently entered 3 6 VERSION VER Syntax ver The version command is only visible when the application is logged in The command has no arguments It displays the current software and database revisions of the application 3 7 LABEL Syntax label label string none If the command is issued without arguments the current co...

Page 16: ...imeout is OFF Timeout disabled and the range of seconds is 15 255 3 11 CONFIGURING BISYNC HOST INTERFACE PARAMETERS HOST Syntax HOST dest BHI IP Address dport BHI TCP Port The HOST command is only visible when the application is logged in The command is used to configure the parameters needed for connections to a BiSync Host interface application There is exactly one such connection When the IP B2...

Page 17: ...er host or prt When the argument is host the TCP connection to the BHI is taken down When the argument is prt the TCP connection to the ASCII printer interface is taken down 3 14 RESTORE CONNECTIONS TO SERVICE RS Syntax rs host prt In order for any connectivity between the BHI Host and the ASCII printer to occur two TCP connections are required These are configured using the bsc and asc for the ho...

Page 18: ...on sessions between clients and the host Only counters which are non zero shall be displayed The per session measurements available are as follows Measurement Description Number of Messages from the Printer to the Host Number of Bytes from the Printer to the Host Number of Messages from the Host to the Printer Number of Bytes from the Host to the Printer 3 20 CLEAR MEASUREMENTS CLR Syntax clr The ...

Page 19: ... provided below any number of Devices may access or otherwise utilize the services of the SOFTWARE You may not reverse engineer decompile or disassemble the SOFTWARE except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation The SOFTWARE is licensed as a single product Its component parts may not be separated for use on more than one H...

Page 20: ...chemical or biological weapons or iii to any person or entity who has been prohibited from participating in U S export transactions by any federal agency of the U S government 6 5 LIMITED WARRANTY Manufacturer warrants that a the SOFTWARE will perform substantially in accordance with the accompanying written materials for a period of ninety 90 days from the date of shipment from Datatek Applicatio...

Page 21: ...r or other communications statements documents agreements or other information between the parties with respect to the subject matter hereof 7 L I M I T A T I O N O F L I A B I L I T Y To the maximum extent permitted by applicable law in no event shall Manufacturer or its suppliers be liable for any damages whatsoever including without limitation special incidental consequential or indirect damage...

Reviews: