User's Manual Part 1
Table Of Contents
- Regulatory Information
- Title
- Contents
- Before You Begin
- Chapter 1: Introduction
- Chapter 2: Pocket PC 2002
- Introduction
- Premium versus Professional Editions
- Where to Find Information
- Basic Skills
- Microsoft ActiveSync
- Microsoft Pocket Outlook
- Companion Programs
- Pocket Internet Explorer
- Getting Connected
- Chapter 3: Installing Applications
- Chapter 4: Network Support
- CORE
- Network Adapters
- Ethernet Communications
- 802.11b Communications
- Profiles
- Basic
- Security
- Advanced
- Certificates
- Import/Export
- Scan List
- Network Selection APIs
- Function Summary
- RadioConnect()
- RadioDisconnect()
- GetMac()
- GetBSSID()
- GetSSID()
- GetLinkSpeed()
- GetNetworkType()
- GetTXPower()
- GetNetworkMode()
- SetNetworkMode()
- AddWep()
- GetRSSI()
- GetAssociationStatus()
- GetWepStatus()
- GetAuthenticationMode()
- SetAuthenticationMode()
- SetChannel()
- EnableWep()
- GetPowerMode()
- SetSSID()
- isOrinoco()
- EncryptWepKeyForRegistry()
- SetRTSThreshold()
- GetRTSThreshold()
- ConfigureProfile()
- StartScanList()
- 802.11b Radio CORE Module
- WWAN Radio Options
- WAN Radio CORE Module
- Wireless Printing
- AutoIP/DHCP
- SNMP Configuration
- Chapter 5: Printer Support
- Chapter 6: Scanner Support
- Scanner Control and Data Transfer
- Automatic Data Collection COM Interfaces
- Multiple ADC COM Object Support
- How to Create and Use the ADC COM Interfaces
- 2D Imager Overview
- Create and Delete ADC COM Object Functions
- IADC Functions
- IBarCodeReaderControl Functions
- IS9CConfig Functions
- IS9CConfig::GetCodabar
- IS9CConfig::SetCodabar
- Codabar Default Settings
- Codabar Enumerations
- IS9CConfig::GetCode39
- IS9CConfig::SetCode39
- Code 39 Default Settings
- Code 39 Enumerations
- IS9CConfig::GetCode93
- IS9CConfig::SetCode93
- Code 93 Default Settings
- Code 93 Enumerations
- IS9CConfig::GetCode128
- IS9CConfig::SetCode128
- Code 128/EAN 128 Default Settings
- Code 128 Enumerations
- IS9CConfig::GetI2of5
- IS9CConfig::SetI2of5
- Interleaved 2 of 5 Default Settings
- Interleaved 2 of 5 Enumerations
- IS9CConfig::GetMatrix2of5
- IS9CConfig::SetMatrix2of5
- Matrix 2 of 5 Default Settings
- Matrix 2 of 5 Enumerations
- IS9CConfig::GetMSI
- IS9CConfig::SetMSI
- MSI Default Settings
- MSI Enumerations
- IS9CConfig::GetPDF417
- IS9CConfig::SetPDF417
- PDF 417 Default Settings
- PDF 417 Enumerations
- IS9CConfig::GetPlessey
- IS9CConfig::SetPlessey
- Plessey Default Settings
- Plessey Enumerations
- IS9CConfig::GetStandard2of5
- IS9CConfig::SetStandard2of5
- Standard 2 of 5 Default Settings
- Standard 2 of 5 Enumerations
- IS9CConfig::GetTelepen
- IS9CConfig::SetTelepen
- Telepen Default Settings
- Telepen Enumerations
- IS9CConfig::GetUpcEan
- IS9CConfig::SetUpcEan
- UPC/EAN Default Settings
- UPC/EAN Enumerations
- IS9CConfig2 Functions
- IS9CConfig2::GetCode11
- IS9CConfig2::SetCode11
- Code 11 Default Settings
- Code 11 Enumerations
- IS9CConfig2::GetCustomSymIds
- IS9CConfig2::SetCustomSymIds
- Custom Identifier Assignments
- Custom Identifier Default Settings
- Custom Identifier Example
- IS9CConfig2::GetGlobalAmble
- IS9CConfig2::SetGlobalAmble
- Postamble and Preamble Defaults
- IS9CConfig2::GetPDF417Ext
- IS9CConfig2::SetPDF417Ext
- PDF 417 Extended: Micro PDF 417 Default Settings
- IS9CConfig2::GetSymIdXmit
- IS9CConfig2::SetSymIdXmit
- Symbology ID Transmission Option
- IS9CConfig3 Functions
- AIM Symbology ID Defaults
- IImage Interface
- Data Collection Configuration
- Tethered Scanner
- Chapter 7: Programming
- Creating CAB Files
- FTP Server
- Full Screen
- Kernel I/O Controls
- Reboot Functions
- Remapping the Keypad
- Appendix A: Control Panel Applets
- Appendix B: Unit Manager
- Appendix C: Bar Codes
- Index
Network Support—Chapter 4
123700 Series Color Mobile Computer User’s Manual
SNMP Configuration
Simple Network Management Protocol (SNMP) was developed in the late
1980s to provide a general-purpose internetworking management protocol.
Its primary goal was to be simple so nothing would stand in the way of its
ubiquitous deployment. To this end, it has been very successful as it is cur-
rently deployed in almost every major internetworking product on the
market. However, like many achieved goals, the primary strength can also
become a weakness.
The Focus was “Simple”
An extreme example of simplicity versus power can be realized by compar-
ing SNMP against the Common Management Information Protocol
(CMIP), the ISO entry to the standard management protocol world.
CMIP has a very rich set of primitives and a core set of data elements.
However, to implement CMIP, a subset of the protocol must be selected.
Then, to achieve interoperability, this subset must be agreed upon with
other implementors. As SNMP was specified completely and with no op-
tions, one implemented what was there and interoperability was assured.
Returning to simplicity, SNMP was built simply for a number of reasons
other than time to market: robustness in the face of network failure, low
overhead in the devices running the protocol; and ease of debugging the
protocol itself (the last thing you want to debug is the management protocol
that is supposed to be helping you debug your network). Thus, the SNMP
limited itself to the User Datagram Protocol (UDP). This gave the
implementor the ability and responsibility to manage lost packets and
perform any necessary retransmissions. As network debugging in the face
of changing routes will certainly mean losing packets, retaining this control
from the transport service (layer 4) was considered essential. Since a
network management protocol will run continuously, it is mandatory that
it consume as minimal a network resource as possible. UDP allows the
necessary control over packet transmissions, packet size and content
(packetization). It is a natural choice.
Using SNMP
SNMP has three control primitives that initiate data flow from the
requester (get, get- next, and set). There are two control primitives the
responder uses to reply. One is used in response to the requester’ s direct
query (get-response) and the other is an asynchronous response to obtain
the requester’ s attention (trap) . All five of these primitives are carried by
UDP and are thus limited in size by the amount of data that can fit into a
single UDP packet. The relatively small message size was a goal of the
design but for some reasonable set of network management functions, it
imposes a limitation.
Often in network management, it is necessary to obtain bulk information
without knowing at first what is in that bulk. In one case, there is a set of
problems having to do with packets not going where they are supposed to,
due to device misconfiguration that prevents proper protocol operation
where one needs to view the entire set of data.