⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1759.txt

📁 中、英文RFC文档大全打包下载完全版 .
💻 TXT
📖 第 1 页 / 共 5 页
字号:
                       noPaper           1        down(5)                       lowToner          2        warning(3)                       noToner           3        down(5)                       doorOpen          4        down(5)                       jammed            5        down(5)                       offline           6        down(5)                       serviceRequested  7        warning(3)                  If multiple conditions are currently detected and                  the hrDeviceStatus would not otherwise be                  unknown(1) or testing(4), the hrDeviceStatus shall                  correspond to the worst state of those indicated,                  where down(5) is worse than warning(3) which is                  worse than running(2).                  Bits are numbered starting with the most                  significant bit of the first byte being bit 0, the                  least significant bit of the first byte being bit                  7, the most significant bit of the second byte                  being bit 8, and so on.  A one bit encodes that                  the condition was detected, while a zero bit                  encodes that the condition was not detected.                  This object is useful for alerting an operator to                  specific warning or error conditions that may                  occur, especially those requiring human                  intervention."          ::= { hrPrinterEntry 2 }2.2.13.2.2.  Sub-unit Status   Sub-unit status is reported in the entries of the principle table in   the Group that represents the sub-unit. For sub-units that report a   status, there is a status column in the table and the value of this   column is always an integer formed in the following way.   The SubUnitStatus is an integer that is the sum of 5 distinct values,   Availability, Non-Critical, Critical, On-line, and Transitioning.   These values are:     Availability                           value            Available and Idle              0       000'b            Available and Standby           2       010'b            Available and Active            4       100'b            Available and Busy              6       110'b            Unavailable and OnRequest       1       001'bSmith, Wright, Hastings, Zilles & Gyllenskog                   [Page 17]RFC 1759                      Printer MIB                     March 1995            Unavailable because Broken      3       011'b            Unknown                         5       101'b    Non-Critical            No Non-Critical Alerts          0            Non-Critical Alerts             8    Critical            No Critical Alerts              0            Critical Alerts                 16    On-Line            Intended state is On-Line       0            Intended state is Off-Line      32    Transitioning            At intended state               0            Transitioning to intended state 64   For example, an input (tray) that jammed on the next to the last page   may show a status of 27 (unavailable because broken (3) + a critical   state (16), jammed, and a noncritical state (8), low paper).2.2.13.3.  Alert Tables   The Alert Group consists of a single table in which all active alerts   are represented.  This section provides and overview of the table and   a description of how it is managed.  The basic content of the alert   table is the severity (critical or non-critical) of the alert, the   Group and entry where a state change caused the alert, additional   information about the alert (a more detailed location, an alert code,   and a description), and an indication of the level of training needed   to service the alert.   The Alert Table contains some information that is redundant, for   example that an event has occurred, and some information that is only   represented in the Alert Table, for example the additional   information.  A single table was used because a single entry in a   Group could cause more than one alert, for example paper jams in more   than one place in a media path. Associating the additional   information with the entry in the affected group would only allow one   report where associating the additional information with the alert   makes multiple reports possible.Smith, Wright, Hastings, Zilles & Gyllenskog                   [Page 18]RFC 1759                      Printer MIB                     March 1995   Every time an alert occurs in the printer, the printer makes one or   more entries into the Alert Table. The printer determines if an event   is to be classified as critical or non-critical. If the severity of   the Alert is "critical", the printer sends a trap or event   notification to the host indicating that the table has changed.   Whether or not a trap is sent, the management application is expected   to poll the printer on a regular basis and to read and parse the   table to determine what conditions have changed, in order to provide   reliable information to the management application user.2.2.13.4.  Alert Table Management   The alert tables are sparsely populated tables. This means the tables   will only contain entries of the alerts that are currently active and   the number of rows, or entries in the table will be dynamic. More   than one event can be added or removed from the event tables at a   time depending on the implementation of the printer.   There are basically two kinds of events that produce alerts: binary   change events and simple change events. Binary change events come in   pairs: the leading edge event and the trailing edge event. The   leading edge event enters a state from which there is only one exit;   for example, going from running to stopped with a paper jam. The only   exit from this state is fixing the paper jam and it is clear when   that is accomplished.  The trailing edge event is the event which   exits the state the was entered by the leading edge event; in the   example above fixing the paper jam is the trailing edge event.   It is relatively straightforward to manage binary change events in   the Alert Table. Only the leading edge event makes an entry in the   alert table.  This entry persists in the Alert Table until the   trailing edge event occurs at which point this event is signal by the   removal of the leading edge event entry in the Alert Table.  That is,   a trailing edge event does not create an entry; it removes the   corresponding leading edge event. With binary events it is possible   to compute the maximum number that can occur at the same time and   construct an Alert Table that would hold that many events. There   would be no possibility of table overflow and no information about   outstanding events would be lost.   Unfortunately, there are some events that are not binary changes.   This other category of event, the simple change event,  is   illustrated by the configuration change event. With this kind of   event the state of the machine has changed, but to a state which is   (often) just as valid as the state that was left and from which no   return is necessary.  For example, an operator may change the paper   that is in the primary input source from letter to legal. At some   time in the future the paper may be changed back to letter, but itSmith, Wright, Hastings, Zilles & Gyllenskog                   [Page 19]RFC 1759                      Printer MIB                     March 1995   might be changed to executive instead.  This is where the problem   occurs. It is not obvious how long to keep simple change event   entries in the Alert Table. It they were never removed, the Alert   Table would continue to grow indefinitely.   The agent needs to have an algorithm implemented for the management   of the alert table, especially in the face of combinations of binary   and simple alerts that would overflow the storage capaciity of the   table.  When the table is full and a new alert needs to be added, an   old alert needs to be deleted.  The alert to be deleted should be   chosen using the following rules:    1. Find a non-critical simple alert and delete it.  If there are       multiple non-critical simple alerts, it is suggested that the       oldest one be chosen.  If there are no non-critical simple       alerts, then,    2. Find a non-critical binary alert and delete it.  If there are       multiple non-critical binary alerts, it is suggested that the       oldest one be chosen.  If there are no non-critical binary       alerts, then,    3. Find a critical (binary) alert and delete it.  If there are       multiple critical alerts, it is suggested that the       oldest one be chosen.  Agent implementors are encouraged to       provide at least enough storage space for the maximum number       of critical alerts that could occur simultaneously.  Note that       all critical alerts are binary.   Note that because the Alert Index is a monotonically increasing   integer there will be gaps in the values in the table when an alert   is deleted.  Such gaps can be detected by the management application   to indicate that the management application may want to re-acquire   the Printer state and check for state changes it did not observe in   the Alert Table.2.3.  Read-Write Objects   Some of the objects in the printer MIB report on the existence of or   amount of a given resource used with the printer.  Some examples of   such resources are the size and number of sheets of paper in a paper   tray or the existence of certain output options.  On some printers   there are sensors that allow these resources to be sensed.  Other   printers, however, lack sensors that can detect (all of) the   properties of the resource.  Because the printer needs to know of the   existence or properties of these resources for the printer to   function properly some other way of providing this information is   needed.  The chosen way to solve this problem is to allow aSmith, Wright, Hastings, Zilles & Gyllenskog                   [Page 20]RFC 1759                      Printer MIB                     March 1995   management application to write into objects which hold the   descriptive or existence values for printers that cannot sense the   values.  Thus many of the objects in the MIB are given read-write   access, but a printer implementation might only permit a management   operation to change the value if the printer could not sense the   value itself.  Therefore, the ability to change the value of a read-   write object may depend on the implementation of the agent.  Note   that even though some objects explicitely state the behaviour of   conditional ability to change values, any read-write object may act   that way.   Generally, an object is given read-write access in the Printer MIB   specification if:  1.The object involves installation of a resource that some    printers cannot themselves detect.  Therefore, external means are    needed to inform the printer of the installation.  (Here external    means include using the operator console, or remote management    application) and  2.The printer will behave differently if the installation of the    resource is reported than the printer would if the installation    were not reported; that is, the object is not to be used    as a place to put information not used by the printer, i.e., not a    "PostIt".  Another way of saying this is that the printer believes    that information given it and acts as if the information were    true.  For example, on a printer that cannot sense the size, if    one paper size is loaded, but another size is set into the paper    size object, then the printer will use the size that was    set as its current paper size in its imaging and paper handling.   The printer may get hints that it may not know about the existence or   properties of certain resources.  For example, a paper tray may be   removed and re-inserted.  When this removal and insertion happens,   the printer may either assume that a property, such as the size of   paper in the tray, has not changed or the printer may change the   value of the associated object to "unknown", as might be done for the   amount of paper in the tray.  As long as the printer acts according   to the value in  the object either strategy is acceptable.   It is an implementation-specific matter as to whether or not MIB   object values are persistent across power cycles or cold starts.  It   is particularly important that the values of the prtMarkerLifeCount   object persist throughout the lifetime of the printer.  Therefore, if   the value of any MIB object persists across power cycles, then the   prtMarkerLifeCount object must also persist.Smith, Wright, Hastings, Zilles & Gyllenskog                   [Page 21]RFC 1759                      Printer MIB                     March 19952.4.  Enumerations   Enumerations (enums) are sets of symbolic values defined for use with   one or more objects.  Some common enumeration sets are assigned a   symbolic data type name (textual convention).  These enumerations are   listed at the beginning of this specification.2.4.1.  Registering Additional Enumerated Values   This working group has defined several type of enumerations.  These   enumerations differ in the method employed to control the addition of   new enumerations.  Throughout this document, references to   "enumeration (n)", where n can be 1, 2 or 3 can be found in the   various tables.  The definitions of these types of enumerations are:  enumeration (1)  All the values are defined in the Printer MIB     specification (RFC for the Printer MIB).  Additional enumerated     values require a new RFC.  enumeration (2)  An initial set of values are defined in the Printer     MIB specification.  Additional enumerated values are     registered after review by this working group. The initial

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -