Sidebar

Unique iSeries Printers in a Wireless/SNMP World

Document Management
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

If you trace back the family tree of the modern iSeries 400 server, you will eventually encounter the IBM S/3 computer. One of the key focuses of the S/3 was to take input from punch cards and then internally process the input to produce a printed report. The modern printer of that time was an impact printer, making marks on the input media (green-gray bar paper) with a series of mechanical components that typically struck an inked ribbon.

The definition of an IBM midrange printer has typically stayed very close to this original S/3 concept in that the printer has been seen as a physical device that took some form of printable media from an input source (frequently continuous form green or gray bar paper) and produced marks on that media according to the instructions the printer received from an IBM midrange server. After completing the making of the marks on the page, the output was moved to some sort of output destination.

In this article, I will cover some of the possible benefits that could be obtained by defining some nontraditional devices (cell phones, personal digital assistants [PDAs], vending machines, etc.) as printers on an iSeries server. Most of the information contained in this article describes possible applications that could be implemented with existing technology, rather than summarizing or explaining applications that already exist. Thus, the examples contained in the article are illustrative and are meant to stimulate your imagination for what could be done in the future.

 

Targeting Wireless Devices as iSeries Printers

 

The benefit of thinking of a wireless device as a printer on an iSeries is that it makes the device capable of receiving information that is usually only available in a printed format. Thus, the target audience (users with wireless devices) can receive more valuable information from the server without significantly increasing the overhead cost to the owner of the server.

As an example, imagine an iSeries software application for dispensing prescriptions at a doctor’s office. If you visit the doctor’s office and need a prescription, the healthcare professional is able to enter the prescription information into the system, and a prescription is then printed for you on some type of traditional printing device.

It’s possible that at some point in the future, healthcare providers will want to be able to send prescriptions to patients directly, rather than have patients come into the office.


How do you accomplish this? One solution could be to consider wireless devices, such as cell phones and PDAs, as iSeries printers.

In this scenario, the software vendor could link the powerful database capabilities of the iSeries server with the convenience of a personal wireless device. The prescription application could be enhanced to print remote refill prescriptions in the following manner. The prescription would consist of three text components:

• Header—Doctors’ office information and authorization signature
• Body—Text describing what should be dispensed by the pharmacy
• Footer—A security signature used to prevent unauthorized dispensing of prescriptions

The text could then be sent to the patient by printing the information from the iSeries server on what the iSeries thinks is a LAN-attached printer but in reality is an input queue at an ISP. You use an ISP to send text messages to cell phones or text pages to PDAs. The ISP would receive the information and then dial the appropriate phone number to send the text message or page. It could also be possible to print the information to an iSeries output queue that feeds a paging or voice-calling response unit that was part of the iSeries server itself.

Patients would receive messages and temporarily store them on their cell phones or PDAs. When they later visit the pharmacy, they would transfer the text message into the pharmacy server for printing and to be filled. The header text would trigger the pharmacy server to pull from the software vendor’s database the proper overlay for the prescription, the prescription data in the body of the message would be entered into the overlay, and the security information would be pulled from the software vendor’s database—all on the local server.

 

A Role for AFP Printing in the Wireless World?

 

Frequently, iSeries users decide to create applications that take advantage of the AFP report-generation capabilities that are an integral part of OS/400. The image shown in Figure 1 (page 82) shows a standard page format, frequently used in North America, for printing statements that include an electronic form overlay. Here’s a scenario where you might use a wireless device to display an AFP document.

Imagine that a bank wants to offer its customers the capability to query the customers’ current account balance from a wireless device. When the bank investigates its iSeries environment, it finds that the data it wants to offer its wireless customers is already included in an AFP-generated report formatted as shown in Figure 1. What could the bank do to get this information out to its customers without a significant amount of programming effort?

One possibility is to use a wireless device as an AFP report viewer. On a standard PC, it is possible to run a Client Access-based application that allows you to view AFP files on your screen. It is also possible to create a scaled-down version of this concept that could run on a wireless device. One of the nice benefits of the IPDS data stream, which is generated to support AFP-based applications, is that it is a page description language. A cell phone or PDA acting as an IPDS-capable printer can report back to the host the paper size currently loaded into its input drawer. This feature allows a viewing program to create a type of zoom feature that can ensure most of the received page is ignored, and only a small area of the report page to be displayed will be visible on the screen.

The benefit of this solution is that the iSeries server would always know whether the data actually reached the wireless customer or not, because verification of delivery is a requirement of the IPDS data stream. One potential downside of this idea could be that the typical wireless network bandwidth available would not be able to support sending the complete page of the report, with its overlay, just to show a single data field on the screen of the wireless device.


Another option would be to use some IPDS data stream conversion software to change the data stream from its native format into a bitmap. The software looks like an IPDS-capable printer to the generating application and would receive the page to be printed in IPDS format. The application would then convert the IPDS data describing the page into a bitmap of the page. A bitmap parsing program could then extract the required information from the bitmapped page and include this much smaller bitmap in a Web page or other low, overhead transmission scheme to get the information out to the wireless device for viewing.

Thus, the answer to whether delivery of AFP content can be achieved to wireless devices is yes, but the delivery method must be carefully analyzed so as not to overwhelm the bandwidth available in today’s wireless networks.

 

SNMP: Can Anything to Do with Printing Be Simple?

 

SNMP is the acronym for Simple Network Management Protocol. SNMP describes a network management concept, typically used in TCP/IP-based networks, that relies on processes known as agents. The agent processes, which are running within the network, are able to learn about many different types of network conditions in order to allow SNMP manager applications to manage the network events effectively on a recurring basis. The management of print devices is described in Internet request for comments (RFC) document 1759. The RFC document explains the requirements for installing a management information base (MIB) in a device operating as a printer that will be compatible with printer monitoring agents in an SNMP-managed network. By following the guidelines outlined in the RFC, it is possible to turn many different types of devices into SNMP- compatible printers. For the purpose of explanation, I will outline how a vending machine could be added to a TCP/IP network and managed as a printer from an iSeries server using SNMP.

 

Why a Vending Machine?

 

In many companies, it is possible for employees to select from a series of optional deductions to their paychecks. Some optional choices can frequently be monthly parking passes or monthly commuter passes on public transit. I always thought it would be a great idea to have a vending machine deduction. The purpose would be to allow employees to determine how much money per month they wanted to put aside for purchasing snack food from vending machines that are installed in their workplace. In order for this idea to work, you would probably need a software application that would be able to keep track of the amount of money currently available in an employee’s snack account. You would also need a method for the application to transfer requests for snacks to a network-attached vending machine. Since printers are usually the recipients of host-based data, printers are probably one of the best choices for an application of this kind.

 

The SNMP-enabled Vending Machine as a Printer

 

Following the outline of RFC 1759, I will assume the Sparkling Vending Machine Company has decided to offer a new 10/100 Ethernet network-attachable vending machine for the workplace. The machine offers the ability to support eight different flavor selections of soda. The machine that I will be analyzing is configured as shown in Figure 2.

One of the requirements of the RFC is that the MIB printer characteristics must include the number of input trays available in the device and the media type (typically paper size) that is installed into each of these trays. What you can see from the chart in Figure 2 is that the MIB, for the vending machine acting as a printer, has defined the eight bays where soda will be stored as input trays. The current flavor selections available are listed as the media types. If a different flavor is loaded into any of the bays in the vending machine, an LED panel in the machine allows the person filling the machine to select the new flavor that is now in the bay. The LED panel updates the SNMP MIB stored in the network interface of the machine.


 

Managing the Vending Machine

 

The Sparkling Vending Machine Company has partnered with an iSeries back-office accounting vendor to ensure that their new 10/100 Ethernet-attachable vending machines can be used by companies that own an iSeries server. The software vendor provides a set of display screens, which allow employees to locate the vending machines closest to them. The process might work as follows:

1. Employees log into the iSeries application and choose the appropriate vending machine from the list of choices.

2. The application queries the appropriate SNMP agent to get an updated status as to the current flavors available in the machine.

3. A second screen is then displayed that lists the flavor choices and costs of the soda available in the target machine.

4. The employees then make their selections.

5. The application verifies that the employees’ accounts have enough credit to cover the transactions. If not, the application returns an error message and requests that a new selection be made.

6. Assuming the transaction is found to be valid, the application prints a header page for the iSeries spool file to be created with an order number. The application then prints a report page to the input tray (in iSeries printer file terminology, this is called a source drawer), which includes the requested flavor. On this report, the application prints a special vending code followed by a capital S for each soda requested by the employees. The S is the only character supported by the vending machine printer because it means “prepare to vend a can or bottle of soda.”

7. The application then waits a predetermined amount of time to see whether the vending machine printer reports via SNMP an “out of forms” condition—meaning that there is not enough soda left to fulfill the request. If this event occurs, an error message is generated for the employees, and a request to make a new selection or end the transaction is displayed.

8. If no error message is received, the application continues with other flavor requests by sending report pages to other input trays until the whole order is completed. If no “end of form” messages are received, the application moves toward the payment phase of the transaction.

9. The application now sends a payment authorization value to the vending machine to close the transaction. The application prints the final page in the spool file using a special payment code. The page format is the payment code followed by the capital letter P, the order number from the header page, and a randomly generated code that the employees will have to enter through the keypad on the vending machine to prompt the vending machine to vend their orders. Employees have the option to set the amount of time the authorization code will be active in the vending machine printer. They can then copy down their activation code from the screen or have it emailed to them.

Keep in mind that this application doesn’t actually exist yet. This application is, however, a definite possibility, and it illustrates just one way you might support a new


application requirement on your iSeries server by using a nontraditional printing device. If you would like to see how to define a nontraditional printing device (e.g., a vending machine) via SNMP to an iSeries server, please read the sidebar called “Defining an SNMP Vending Machine Printer” on the Web at www.midrangecomputing.com/mc.

Figure 1: A typical AFP printer file used with portrait documents printing on letter-sized paper might use an overlay.

SNMP Described Input Tray Soda Flavor Available from This Tray

Tray 1 Cola Tray 2 Cola Tray 3 Iced Tea Tray 4 Root Beer Tray 5 Lemon-lime Tray 6 Orange Tray 7 Grape Tray 8 Diet Cola

Figure 2: This table shows what the vending machine configuration might look like.


 

Unique_iSeries_Printers_in_a_Wireless-_SNMP_World05-00.png 444x290

 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

RESOURCE CENTER

  • WHITE PAPERS

  • WEBCAST

  • TRIAL SOFTWARE

  • White Paper: Node.js for Enterprise IBM i Modernization

    SB Profound WP 5539

    If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

    Download this paper and learn how Node.js can ensure that you:
    - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
    - Retain your IBM i systems of record
    - Find and hire new development talent
    - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
    - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things


    Read Node.js for Enterprise IBM i Modernization Now!

     

  • Profound Logic Solution Guide

    SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation.
    Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
    The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.

    Get your copy of this important guide today!

     

  • 2022 IBM i Marketplace Survey Results

    Fortra2022 marks the eighth edition of the IBM i Marketplace Survey Results. Each year, Fortra captures data on how businesses use the IBM i platform and the IT and cybersecurity initiatives it supports.

    Over the years, this survey has become a true industry benchmark, revealing to readers the trends that are shaping and driving the market and providing insight into what the future may bring for this technology.

  • Brunswick bowls a perfect 300 with LANSA!

    FortraBrunswick is the leader in bowling products, services, and industry expertise for the development and renovation of new and existing bowling centers and mixed-use recreation facilities across the entertainment industry. However, the lifeblood of Brunswick’s capital equipment business was running on a 15-year-old software application written in Visual Basic 6 (VB6) with a SQL Server back-end. The application was at the end of its life and needed to be replaced.
    With the help of Visual LANSA, they found an easy-to-use, long-term platform that enabled their team to collaborate, innovate, and integrate with existing systems and databases within a single platform.
    Read the case study to learn how they achieved success and increased the speed of development by 30% with Visual LANSA.

     

  • Progressive Web Apps: Create a Universal Experience Across All Devices

    LANSAProgressive Web Apps allow you to reach anyone, anywhere, and on any device with a single unified codebase. This means that your applications—regardless of browser, device, or platform—instantly become more reliable and consistent. They are the present and future of application development, and more and more businesses are catching on.
    Download this whitepaper and learn:

    • How PWAs support fast application development and streamline DevOps
    • How to give your business a competitive edge using PWAs
    • What makes progressive web apps so versatile, both online and offline

     

     

  • The Power of Coding in a Low-Code Solution

    LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Why Migrate When You Can Modernize?

    LANSABusiness users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.
    In this white paper, you’ll learn how to think of these issues as opportunities rather than problems. We’ll explore motivations to migrate or modernize, their risks and considerations you should be aware of before embarking on a (migration or modernization) project.
    Lastly, we’ll discuss how modernizing IBM i applications with optimized business workflows, integration with other technologies and new mobile and web user interfaces will enable IT – and the business – to experience time-added value and much more.

     

  • UPDATED: Developer Kit: Making a Business Case for Modernization and Beyond

    Profound Logic Software, Inc.Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them.

    This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved!

  • What to Do When Your AS/400 Talent Retires

    FortraIT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small.

    This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:

    • Why IBM i skills depletion is a top concern
    • How leading organizations are coping
    • Where automation will make the biggest impact

     

  • Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using NodeRun.com as a pre-built development environment

     

     

  • Expert Tips for IBM i Security: Beyond the Basics

    SB PowerTech WC GenericIn this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    Don't miss this chance to take your knowledge of IBM i security beyond the basics.

     

     

  • 5 IBM i Security Quick Wins

    SB PowerTech WC GenericIn today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.

  • Security Bulletin: Malware Infection Discovered on IBM i Server!

    SB PowerTech WC GenericMalicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning

    There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.

     

     

  • Encryption on IBM i Simplified

    SB PowerTech WC GenericDB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.
    Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

    • Use Field Procedures to automate encryption and decryption
    • Restrict and mask field level access by user or group
    • Meet compliance requirements with effective key management and audit trails

     

  • Lessons Learned from IBM i Cyber Attacks

    SB PowerTech WC GenericDespite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
    In this webinar, you'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

    • Learn which security gaps cyber criminals love most
    • Find out how other IBM i organizations have fallen victim
    • Get the details on policies and processes you can implement to protect your organization, even when staff works from home

    You will learn the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.

     

     

  • The Power of Coding in a Low-Code Solution

    SB PowerTech WC GenericWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Node Webinar Series Pt. 1: The World of Node.js on IBM i

    SB Profound WC GenericHave you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
    Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
    In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
    Watch Now.

  • The Biggest Mistakes in IBM i Security

    SB Profound WC Generic The Biggest Mistakes in IBM i Security
    Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
    Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim. IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
    Join this webinar to learn about the biggest errors made when securing a Power Systems server.
    This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA
    Watch Now.

  • Comply in 5! Well, actually UNDER 5 minutes!!

    SB CYBRA PPL 5382

    TRY the one package that solves all your document design and printing challenges on all your platforms.

    Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

    Request your trial now!

  • Backup and Recovery on IBM i: Your Strategy for the Unexpected

    FortraRobot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:
    - Simplified backup procedures
    - Easy data encryption
    - Save media management
    - Guided restoration
    - Seamless product integration
    Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days.

  • Manage IBM i Messages by Exception with Robot

    SB HelpSystems SC 5413Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events?
    Automate your message center with the Robot Message Management Solution. Key features include:
    - Automated message management
    - Tailored notifications and automatic escalation
    - System-wide control of your IBM i partitions
    - Two-way system notifications from your mobile device
    - Seamless product integration
    Try the Robot Message Management Solution FREE for 30 days.

  • Easiest Way to Save Money? Stop Printing IBM i Reports

    FortraRobot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
    Manage your reports with the Robot Report Management Solution. Key features include:

    - Automated report distribution
    - View online without delay
    - Browser interface to make notes
    - Custom retention capabilities
    - Seamless product integration
    Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

  • Hassle-Free IBM i Operations around the Clock

    SB HelpSystems SC 5413For over 30 years, Robot has been a leader in systems management for IBM i.
    Manage your job schedule with the Robot Job Scheduling Solution. Key features include:
    - Automated batch, interactive, and cross-platform scheduling
    - Event-driven dependency processing
    - Centralized monitoring and reporting
    - Audit log and ready-to-use reports
    - Seamless product integration
    Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days.