Application Note #2437

Size: px
Start display at page:

Download "Application Note #2437"

Transcription

1 Application Note #2437 The CW Command This application note describes the CW Galil command. The CW command has three uses: it (1) prints the controller s copyright message, (2) sets or clears the most significant ASCII bit of unsolicited characters sent by the controller, and (3) controls whether the program pauses when the output communication buffer is full. This note describes each of these uses in detail. CONTENTS 1 COPYRIGHT MESSAGE (CW; CW0; CW?) MARKING UNSOICITED CHARACTERS (CW1; CW2) UNSOICITED CHARACTERS Commands in an Application Program TR Error Messages ASCII AND HOW UNSOICITED CHARACTERS ARE MARKED WHEN TO MARK (CW1) WHEN NOT TO MARK (CW2) SECOND ETHERNET HANDE GETTING UNSOICITED CHARACTERS IN AN APPICATION PROGRAM ROUTING UNSOICITED MESSAGES WITH CF (ETHERNET CONTROERS ONY) PAUSING PROGRAM WHEN FIFO IS FU (CW,0; CW,1) EXAMPE CONTROERS WITH A SINGE-BYTE UART ETHERNET WHEN TO PAUSE (CW,0) WHEN NOT TO PAUSE (CW,1) USAGE NOTE: ONE FIED AT A TIME

2 1 Copyright Message (CW; CW0; CW?) The original use for the CW command was to print a message containing copyright information for the controller (figure 1). :CW Copyright (c) Galil Motion Control, Inc All rights reserved Figure 1. Copyright message output from the CW command Note that CW0 and CW? do the same thing as just CW. 2 Marking Unsolicited Characters (CW1; CW2) This section explains in detail the difference between solicited and unsolicited characters, how the characters are marked, and when to mark and not to mark. 2.1 Unsolicited Characters Two kinds of characters are generated by a Galil controller: solicited and unsolicited (figure 2). PC C program TPX 0: Controller # MG"" WT100 JP# Figure 2. Unsolicited ( ) and solicited (0:) characters. Solicited characters are output by the controller in response to a command sent in on the communication port (e.g. PCI bus, Ethernet, or RS-232). For example, if a host PC sends the command TPX to the controller, the controller might respond with the string 0: indicating the position of the X-axis. All solicited responses end with a colon (:) preceded by a carriage return and line feed. Unsolicited characters are those output by the controller that are not in response to a command sent in on the communication port. These fall into three categories: (1) Commands that produce communication output in a Galil application program, (2) TR1 debugging trace output, and (3) error messages. Unsolicited responses do not end with a colon, but do end in carriage return and line feed (unless {N} is used with the MG command)

3 2.1.1 Commands in an Application Program Certain Galil commands produce communication output (namely MG). When these commands are called from a host PC, their responses are solicited; however, when they are placed in a controller application program, they produce unsolicited characters. Figure 2 above shows a simple application program that repeatedly calls the MG command. Terminal output follows: : Figure 3. Output from the program in figure 2 After the controller responds to the XQ command with a colon (:), it begins running the application program and repeatedly prints the unsolicited character. Commands that produce communication output follow: AW, BS, IN, A,, S, V, MG, QA, QH, QR, QU, QZ, RP, R, SC, TB, TC, TD, TE, TH, TI, T, TP, TS, TT, TV, TZ, U, WH TR1 Turning the debug trace output on also produces unsolicited characters (figure 4): :TR1 :0 # 1 MG"" 2 WT100 3 JP# 0 # 1 MG"" Figure 4. TR1 output for the program in figure Error Messages The last way the controller produces unsolicited characters is when an error occurs. If we add an invalid line to the program in figure 2 and run it, the controller generates an unsolicited message containing a question mark, the line number, and the source code on that line (figure 5). Subsequently issuing TC1 will display a string indicating the reason for the error. :S 0 # 1 MG"" 2 WT100 3 invalid line INVAID INE INSERTED 4 JP# 5 :?3 invalid line :TC1 1 Unrecognized command Figure 5. Example of an error message (unsolicited) - 3 -

4 2.2 ASCII and how Unsolicited Characters are Marked Both solicited and unsolicited messages are composed of ASCII (American Standard Code for Information Interchange) characters. ASCII is a 7-bit protocol that specifies 128 character symbols, which correspond to the numbers 0 to 127 (0 to 7F hexadecimal). Most of the ASCII characters correspond to those on a computer keyboard (figure 6) A B C D E F 0 NU SOH STX ETX EOT ENQ ACK BE BS TAB F VT FF CR SO SI 10 DE DC1 DC2 DC3 DC4 NAK SYN ETB CAN EM SUB ESC FS GS RS US 20 space! " # $ % & ' ( ) * +, -. / : ; < = >? A B C D E F G H I J K M N O 50 P Q R S T U V W X Y Z [ \ ] ^ _ 60 ` a b c d e f g h i j k l m n o 70 p q r s t u v w x y z { } ~ DE Figure 6. ASCII table by hexadecimal code. Nonprintable characters are in grey. Although ASCII is only seven bits, the minimum unit of computer data is the 8-bit byte (figure 7), which allows 256 values. This means that when a character is transmitted, there is an extra bit that is unused: the most significant bit. Several extended ASCII tables have been created that assign non-english characters to the remaining 128 codes, but no true standard has emerged (different computer programs print different characters for a given extended ASCII code). Galil makes clever use of this extra bit by setting it to mark unsolicited characters (if CW1 is set). most significant bit CW hex C hex CW Figure 7. 8-bit byte from the controller s communication output for the ASCII character with CW2 set (top) and CW1 set (bottom) - 4 -

5 2.3 When to Mark (CW1) Unsolicited characters should be differentiated from solicited characters when the controller communicates with a host PC program (and in fact Galil s SmartTerminal sends CW1 upon connection to a controller). The following example shows what happens when unsolicited characters aren t marked. The below C program (figure 8) asks the controller repeatedly for the position of the X-axis and prints the raw string result. By issuing CW2 (the factory default), the program leaves unsolicited characters unmarked and this leaves the potential for the problem described below. Figure 8. C program that repeatedly queries the controller X-axis position without marking unsolicited characters Figure 9 shows the output from the C program while the controller runs the program in figure 2. A normal response to TPX is a number followed by a colon (the C program could easily parse this string and convert it to a number). The second response in figure 9 shows how a response to TPX also contains the character! Since unsolicited characters aren t being marked, the PC has no way of differentiating solicited characters from unsolicited characters. Even worse, if the unsolicited character were a number, there would be no way to tell it apart from the number the C program is trying to get. 0 : 0 : 1 st response (normal) 2 nd response with interleaved unsolicited character Figure 9. Output of the C program in figure 8 when the controller runs the program in figure 2 If the C program had set CW1 instead, the Galil driver would know that the was not an intended response to TPX and the program output would be correct

6 2.4 When not to Mark (CW2) Marked unsolicited characters will show up as non-english characters (figure 10) when you connect to the controller with a terminal that was not developed by Galil (for example telnet or Windows HyperTerminal). As described in section 2.2, this is because the terminal will display its extended ASCII characters since the most significant bit of incoming characters is set. This will be the case unless the terminal knows to force the incoming data to 7-bit ASCII (which is possible with HyperTerminal and is the case for Galil s SmartTerminal). Issue CW2 to read the unsolicited characters in a third-party terminal. Since no third-party terminals are available for Galil bus controllers (such as the DMC-1800 PCI or DMC-1700 ISA controllers), CW should always be set to 1 on these controllers. :S 0 # 1 MG"" 2 WT JP# :CW1 :ÌŠÌŠCW2 NON-ENGISH CHARACTERS : Figure 10. Unsolicited characters viewed in Windows HyperTerminal with both CW1 and CW2 2.5 Second Ethernet Handle For the case of Ethernet, it is possible to mark the unsolicited characters in another way: via a TCP/IP port number (Figure 11). When registering an Ethernet controller, it is possible to choose whether to have the controller send unsolicited characters on the primary handle (port) or a second handle. If using a single handle for both solicited and unsolicited characters (Use primary handle) CW1 is still necessary to mark unsolicited characters. When you choose open second handle, the unsolicited characters come in marked with a different port number, so marking the most significant bit is no longer necessary. Figure 11. Galil controller registration dialog showing how to configure the controller to send unsolicited characters on a second handle - 6 -

7 2.6 Getting Unsolicited Characters in an Application Program There are two ways to retrieve unsolicited characters in a custom application program (for example written in C or Visual Basic): (1) If you are using DMCWin32 (the free Galil Windows API), use the Galil API function DMCGetUnsolicitedResponse. (2) If you are using the Galil ActiveX Toolkit, use the DMCShell event DMCResponse (not to be confused with the DMCShell.DMCResponse property, which gives only solicited responses to DMCShell.DMCCommand). Either of these returns only characters whose most significant bit is set with CW1 (or characters which came in on a separate Ethernet handle, if this was set up as described in section 2.5). 2.7 Routing Unsolicited Messages with CF (Ethernet Controllers Only) When trying to retrieve unsolicited messages on an Ethernet controller, both the CW and CF commands must be configured properly. For a bus (e.g. PCI) controller, there is only one place communication output can go: the bus. For an Ethernet controller, which also has a serial port, there are nine places: the serial port and eight Ethernet handles (A-H). Each Ethernet handle corresponds to a different IP address and/or TCP/IP port. By factory default, an Ethernet controller routes unsolicited messages to the serial port (CFS). If you connect to a new Ethernet controller through SmartTerminal and run the program in figure 2 you will not see any output (figure 12). To see the output, issue the WH command, which tells you which controller handle you are currently connected to, and then issue CF to route the messages to that handle: :S 0 # 1 MG"" 2 WT100 3 JP# 4 :WH IHA :CFA : Figure 12. Demonstration of the CF command Use the TH command to show which handles are in use

8 3 Pausing Program when FIFO is Full (CW,0; CW,1) The third use for the CW command has to do with notifying the machine operator that the communication link has been severed. The second argument to CW controls whether the controller will pause its application program if the output communication buffer (bus or serial) is full. This will happen, for example, if the serial link is severed or if the terminal is closed while the controller is sending characters. 3.1 Example This example works on all controllers except for DMC-14x5/6, 21x2/3, and 3xxx. To see the controller pause program execution: (1) connect to the controller through a terminal (2) issue CW,0 (3) download the program in figure 13 # ER 0 MG 1 WT 50 ;'turn red light on ;'print ;'wait 50 milliseconds ER 1000 ;'turn red light off MG 0 ;'print WT 50 ;'wait 50 milliseconds JP# Figure 13. Program to demonstrate program pause (4) run it with XQ and observe the controller s red light blink (5) close the terminal and observe the controller s red light stop blinking (indicating the program has paused execution) - 8 -

9 3.2 Controllers with a Single-Byte UART All controllers pause as described above for CW,0 except for the following controllers, which have only a single-byte UART: DMC-14x5/6, 21x2/3, and 3xxx. For these controllers, CW,0 causes the following error to be generated instead of pausing if the serial communication link is severed: 131 Serial port hardware handshake timeout CW,1 causes no error to be generated, and again the program is not paused. Note that error 131 is special in that it will not stop the application program and it cannot be handled with #CMDERR. 3.3 Ethernet For Ethernet communication, the second CW argument is ignored and the following error is generated instead of pausing if the Ethernet communication link is severed: 123 TCP lost sync or timeout This error can be handled with the #TCPERR routine. 3.4 When to pause (CW,0) The CW,0 (factory default) setting should be used when a host PC program communicates with the controller and is critical to the machine operation. In this case, any controller communication output is deemed important, so if the communication link is severed, the machine will pause to notify the operator that something is wrong. If a PC program consists of a GUI that only displays machine status, it may not be important enough to pause the machine when communication is down. 3.5 When not to pause (CW,1) The CW,1 setting should be used when the controller is running stand alone, without a host PC (or for the case of a bus controller, without a custom PC application program). For a properly written Galil-language program (with no errors), any communication output consists only of debug messages (MG or TR1), which are not critical to the machine s operation, and can be ignored. 3.6 Usage Note: One Field at a Time When setting the pause status (CW,0 or CW,1), the mark unsolicited messages status (CW1 or CW2) cannot be set at the same. That is CW2,1 is invalid, but CW2;CW,1 is valid. (CW2,1 will set the first field and ignore the second.) - 9 -

Fundamentals of Programming (C)

Fundamentals of Programming (C) Borrowed from lecturer notes by Omid Jafarinezhad Fundamentals of Programming (C) Group 8 Lecturer: Vahid Khodabakhshi Lecture Number Systems Department of Computer Engineering Outline Numeral Systems

More information

Data Representation and Binary Arithmetic. Lecture 2

Data Representation and Binary Arithmetic. Lecture 2 Data Representation and Binary Arithmetic Lecture 2 Computer Data Data is stored as binary; 0 s and 1 s Because two-state ( 0 & 1 ) logic elements can be manufactured easily Bit: binary digit (smallest

More information

1.1. INTRODUCTION 1.2. NUMBER SYSTEMS

1.1. INTRODUCTION 1.2. NUMBER SYSTEMS Chapter 1. 1.1. INTRODUCTION Digital computers have brought about the information age that we live in today. Computers are important tools because they can locate and process enormous amounts of information

More information

Application Note #4434

Application Note #4434 Jan-12 Application Note #4434 Creating a Custom Ethernet Communication Interface to a Galil Controller For most applications, the standard GalilTools communication libray or API (Application Programming

More information

Number System (Different Ways To Say How Many) Fall 2016

Number System (Different Ways To Say How Many) Fall 2016 Number System (Different Ways To Say How Many) Fall 2016 Introduction to Information and Communication Technologies CSD 102 Email: mehwish.fatima@ciitlahore.edu.pk Website: https://sites.google.com/a/ciitlahore.edu.pk/ict/

More information

Fundamentals of Programming

Fundamentals of Programming Fundamentals of Programming Lecture 2 Number Systems & Arithmetic Lecturer : Ebrahim Jahandar Some Parts borrowed from slides by IETC1011-Yourk University Common Number Systems System Base Symbols Used

More information

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON Prof. Gurindar Sohi TAs: Pradip Vallathol and Junaid Khalid Midterm Examination 1 In Class (50 minutes) Friday, September

More information

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON Prof. Gurindar Sohi TAs: Junaid Khalid and Pradip Vallathol Midterm Examination 1 In Class (50 minutes) Friday, September

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter Bits, Data Types, and Operations How do we represent data in a computer? At the lowest level, a computer is an electronic machine. works by controlling the flow of electrons Easy to recognize two

More information

Lecture (09) x86 programming 8

Lecture (09) x86 programming 8 Lecture (09) x86 programming 8 By: Dr. Ahmed ElShafee 1 Basic Input Output System BIOS BIOS refers to a set of procedures or functions that enable the programmer have access to the hardware of the computer.

More information

CS341 *** TURN OFF ALL CELLPHONES *** Practice NAME

CS341 *** TURN OFF ALL CELLPHONES *** Practice NAME CS341 *** TURN OFF ALL CELLPHONES *** Practice Final Exam B. Wilson NAME OPEN BOOK / OPEN NOTES: I GIVE PARTIAL CREDIT! SHOW ALL WORK! 1. Processor Architecture (20 points) a. In a Harvard architecture

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter 2 Bits, Data Types, and Operations How do we represent data in a computer? At the lowest level, a computer is an electronic machine. works by controlling the flow of electrons Easy to recognize

More information

EXPERIMENT 8: Introduction to Universal Serial Asynchronous Receive Transmit (USART)

EXPERIMENT 8: Introduction to Universal Serial Asynchronous Receive Transmit (USART) EXPERIMENT 8: Introduction to Universal Serial Asynchronous Receive Transmit (USART) Objective: Introduction To understand and apply USART command for sending and receiving data Universal Serial Asynchronous

More information

EXPERIMENT 7: Introduction to Universal Serial Asynchronous Receive Transmit (USART)

EXPERIMENT 7: Introduction to Universal Serial Asynchronous Receive Transmit (USART) EXPERIMENT 7: Introduction to Universal Serial Asynchronous Receive Transmit (USART) Objective: To understand and apply USART command for sending and receiving data Introduction Universal Serial Asynchronous

More information

Binary Numbers. The Basics. Base 10 Number. What is a Number? = Binary Number Example. Binary Number Example

Binary Numbers. The Basics. Base 10 Number. What is a Number? = Binary Number Example. Binary Number Example The Basics Binary Numbers Part Bit of This and a Bit of That What is a Number? Base Number We use the Hindu-Arabic Number System positional grouping system each position represents a power of Binary numbers

More information

Chapter 3. Information Representation

Chapter 3. Information Representation Chapter 3 Information Representation Instruction Set Architecture APPLICATION LEVEL HIGH-ORDER LANGUAGE LEVEL ASSEMBLY LEVEL OPERATING SYSTEM LEVEL INSTRUCTION SET ARCHITECTURE LEVEL 3 MICROCODE LEVEL

More information

Connecting UniOP to Datalogic Barcode Readers

Connecting UniOP to Datalogic Barcode Readers Connecting UniOP to Datalogic Barcode Readers This Technical Note contains the information needed to connect UniOP to Datalogic Barcode Scanners. Contents 1. Introduction...1 2. Designer setup...1 2.1

More information

RS-232 Control of the Advantage EQ281/8, EQ282/8 and Advantage SMS200

RS-232 Control of the Advantage EQ281/8, EQ282/8 and Advantage SMS200 RS-232 Control of the Advantage EQ281/8, EQ282/8 and Advantage SMS200 Biamp Systems, 14130 N.W. Science Park, Portland, Oregon 97229 U.S.A. (503) 641-7287 an affiliate of Rauland-Borg Corp. Introduction

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter 2 Bits, Data Types, and Operations Original slides from Gregory Byrd, North Carolina State University Modified slides by Chris Wilcox, Colorado State University How do we represent data in a computer?!

More information

Chapter 8. Characters and Strings

Chapter 8. Characters and Strings Chapter 8 Characters and s OJECTIVES After you have read and studied this chapter, you should be able to Declare and manipulate data of the char data type. Write string processing programs using and uffer

More information

Source coding and compression

Source coding and compression Computer Mathematics Week 5 Source coding and compression College of Information Science and Engineering Ritsumeikan University last week binary representations of signed numbers sign-magnitude, biased

More information

Oberon Data Types. Matteo Corti. December 5, 2001

Oberon Data Types. Matteo Corti. December 5, 2001 Oberon Data Types Matteo Corti corti@inf.ethz.ch December 5, 2001 1 Introduction This document is aimed at students without any previous programming experience. We briefly describe some data types of the

More information

Chapter 2 Number System

Chapter 2 Number System Chapter 2 Number System Embedded Systems with ARM Cortext-M Updated: Tuesday, January 16, 2018 What you should know.. Before coming to this class Decimal Binary Octal Hex 0 0000 00 0x0 1 0001 01 0x1 2

More information

Bits and Bytes. Data Representation. A binary digit or bit has a value of either 0 or 1; these are the values we can store in hardware devices.

Bits and Bytes. Data Representation. A binary digit or bit has a value of either 0 or 1; these are the values we can store in hardware devices. Bits and Bytes 1 A binary digit or bit has a value of either 0 or 1; these are the values we can store in hardware devices. A byte is a sequence of 8 bits. A byte is also the fundamental unit of storage

More information

User s Manual. Xi3000 Scanner. Table of Contents

User s Manual. Xi3000 Scanner. Table of Contents Xi3000 Scanner User s Manual Table of Contents Restore Default Settings... 1 Exit Setup without Changes... 1 Configure Through RS232... 1 List Setting... 1 Buzzer Settings... 2 Reading Redundancy Setting...

More information

Do not start the test until instructed to do so!

Do not start the test until instructed to do so! Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted one-page formula sheet. No calculators or other electronic devices

More information

Number Representations

Number Representations Simple Arithmetic [Arithm Notes] Number representations Signed numbers Sign-magnitude, ones and twos complement Arithmetic Addition, subtraction, negation, overflow MIPS instructions Logic operations MIPS

More information

PureScan - ML1. Configuration Guide. Wireless Linear Imager Wireless Laser scanner - 1 -

PureScan - ML1. Configuration Guide. Wireless Linear Imager Wireless Laser scanner - 1 - PureScan - ML1 Wireless Linear Imager Wireless Laser scanner Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up the parameter 3 Chapter 2

More information

Do not start the test until instructed to do so!

Do not start the test until instructed to do so! Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted one-page formula sheet. No calculators or other electronic devices

More information

The Binary Number System

The Binary Number System The Binary Number System Robert B. Heckendorn University of Idaho August 24, 2017 Numbers are said to be represented by a place-value system, where the value of a symbol depends on where it is... its place.

More information

Configuration Manual PULSAR C CCD SCANNER. Table of Contents

Configuration Manual PULSAR C CCD SCANNER. Table of Contents Table of Contents PULSAR C CCD SCANNER Configuration Manual Metrologic Instruments GmbH Dornier Strasse 2 82178 Puchheim Germany Tel +49 89 890190 Fax +49 89 89019200 www.europe.metrologic.com Metrologic

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter 2 Bits, Data Types, and Operations Computer is a binary digital system. Digital system: finite number of symbols Binary (base two) system: has two states: 0 and 1 Basic unit of information is the

More information

2D BARCODE SCANNER CA-SC-20200B

2D BARCODE SCANNER CA-SC-20200B D BARCODE SCANNER CA-SC-B Quick Start Guide Getting Familiar with Your Device Thank you for choosing Capture Bar Code Scanner. All Devices deliver world-class performance for a broad range of applications

More information

Chapter 2 Bits, Data Types, and Operations

Chapter 2 Bits, Data Types, and Operations Chapter 2 Bits, Data Types, and Operations Original slides from Gregory Byrd, North Carolina State University Modified by Chris Wilcox, S. Rajopadhye Colorado State University How do we represent data

More information

FD-011WU. 2D Barcode Reader User Guide V1.6CC

FD-011WU. 2D Barcode Reader User Guide V1.6CC FD-011WU 2D Barcode Reader User Guide V1.6CC Table of Contents 1 Getting Started... 1 1.1 Factory Defaults... 1 2 Communication Interfaces...2 2.1 TTL-232 Interface... 2 2.2 Baud Rate... 3 2.3 Data Bit

More information

Serial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey

Serial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey 4: Serial I/O CET360 Microprocessor Engineering J. Sumey Introduction serial, i.e. bit-at-a-time, interfacing techniques are useful when parallel interfacing limitations become problematic distance limitations

More information

Addmaster Corporation

Addmaster Corporation IJ-1000 Ink-Jet Validation Printer Specification Addmaster Corporation Address: 225 East Huntington Drive Monrovia, CA 91016 Web: www.addmaster.com Phone: (626) 358-2395 FAX: (626) 358-2784 Document: ij1w.doc

More information

CPS 104 Computer Organization and Programming Lecture-2 : Data representations,

CPS 104 Computer Organization and Programming Lecture-2 : Data representations, CPS 104 Computer Organization and Programming Lecture-2 : Data representations, Sep. 1, 1999 Dietolf Ramm http://www.cs.duke.edu/~dr/cps104.html CPS104 Lec2.1 GK&DR Fall 1999 Data Representation Computers

More information

A GUIDE TO RS-232 COMMUNICATION WITH FX PLCS

A GUIDE TO RS-232 COMMUNICATION WITH FX PLCS A GUIDE TO RS-232 COMMUNICATION WITH FX PLCS Page 1 of 35 A GUIDE TO RS-232 COMMUNICATION WITH FX PLCS This document has been written specifically for FX and FX0N users that are unfamiliar with RS-232

More information

ASSIGNMENT 5 TIPS AND TRICKS

ASSIGNMENT 5 TIPS AND TRICKS ASSIGNMENT 5 TIPS AND TRICKS linear-feedback shift registers Java implementation a simple encryption scheme http://princeton.edu/~cos26 Last updated on /26/7 : PM Goals OOP: implement a data type; write

More information

Datalogic Scanning, Inc. 959 Terry Street Eugene, Oregon Telephone: (541) Fax: (541)

Datalogic Scanning, Inc. 959 Terry Street Eugene, Oregon Telephone: (541) Fax: (541) Datalogic Scanning, Inc. 959 Terry Street Eugene, Oregon 97402 Telephone: (541) 683-5700 Fax: (541) 345-7140 An Unpublished Work - All rights reserved. No part of the contents of this documentation or

More information

PD1100 STAND-ALONE PROGRAMMING & USER S GUIDE. use the freedom

PD1100 STAND-ALONE PROGRAMMING & USER S GUIDE. use the freedom PD1100 STAND-ALONE ALPHANUMERIC POLE DISPLAY PROGRAMMING & USER S GUIDE use the freedom Forward The information contained in this user s guide is subject to change without notice. This Programming and

More information

3.1. Unit 3. Binary Representation

3.1. Unit 3. Binary Representation 3.1 Unit 3 Binary Representation ANALOG VS. DIGITAL 3.2 3.3 Analog vs. Digital The analog world is based on continuous events. Observations can take on (real) any value. The digital world is based on discrete

More information

Programmable #182 Parallel Interface Cash Drawer Manual

Programmable #182 Parallel Interface Cash Drawer Manual Programmable #182 Parallel Interface Cash Drawer Manual The following warning is required by the FCC for all Class A computing devices which have been tested and comply with the standard indicated: Warning:

More information

5/17/2009. Digitizing Discrete Information. Ordering Symbols. Analog vs. Digital

5/17/2009. Digitizing Discrete Information. Ordering Symbols. Analog vs. Digital Chapter 8: Bits and the "Why" of Bytes: Representing Information Digitally Digitizing Discrete Information Fluency with Information Technology Third Edition by Lawrence Snyder Copyright 2008 Pearson Education,

More information

1. Character/String Data, Expressions & Intrinsic Functions. Numeric Representation of Non-numeric Values. (CHARACTER Data Type), Part 1

1. Character/String Data, Expressions & Intrinsic Functions. Numeric Representation of Non-numeric Values. (CHARACTER Data Type), Part 1 Character/String Data, Expressions Intrinsic Functions (CHARACTER Data Type), Part 1 1. Character/String Data, Expressions Intrinsic Functions (CHARACTER Data Type), Part 1 2. Numeric Representation of

More information

Universal Asynchronous Receiver Transmitter Communication

Universal Asynchronous Receiver Transmitter Communication Universal Asynchronous Receiver Transmitter Communication 13 October 2011 Synchronous Serial Standard SPI I 2 C Asynchronous Serial Standard UART Asynchronous Resynchronization Asynchronous Data Transmission

More information

EE 109 Unit 3. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL

EE 109 Unit 3. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL 3. 3. EE 9 Unit 3 Binary Representation Systems ANALOG VS. DIGITAL 3.3 3. Analog vs. Digital The analog world is based on continuous events. Observations can take on any (real) value. The digital world

More information

Unit 3. Analog vs. Digital. Analog vs. Digital ANALOG VS. DIGITAL. Binary Representation

Unit 3. Analog vs. Digital. Analog vs. Digital ANALOG VS. DIGITAL. Binary Representation 3.1 3.2 Unit 3 Binary Representation ANALOG VS. DIGITAL 3.3 3.4 Analog vs. Digital The analog world is based on continuous events. Observations can take on (real) any value. The digital world is based

More information

Mounting Dimensions / Viewing 2 Mounting Options 3. Wiring Configuration 4. Quick Set up Procedure 5. Changing Intensity 6.

Mounting Dimensions / Viewing 2 Mounting Options 3. Wiring Configuration 4. Quick Set up Procedure 5. Changing Intensity 6. Section Mounting Dimensions / Viewing 2 Mounting Options 3 Section 2 Wiring Configuration 4 Section 3 Quick Set up Procedure 5 Section 4 Changing Intensity 6 Section 5 Option Summary 7 Section 6 Option

More information

Experiment 3. TITLE Optional: Write here the Title of your program.model SMALL This directive defines the memory model used in the program.

Experiment 3. TITLE Optional: Write here the Title of your program.model SMALL This directive defines the memory model used in the program. Experiment 3 Introduction: In this experiment the students are exposed to the structure of an assembly language program and the definition of data variables and constants. Objectives: Assembly language

More information

4/14/2015. Architecture of the World Wide Web. During this session we will discuss: Structure of the World Wide Web

4/14/2015. Architecture of the World Wide Web. During this session we will discuss: Structure of the World Wide Web Internet Gambling Investigations Architecture of the World Wide Web Ω Objectives During this session we will discuss: The term world wide web User interaction on the world wide web The purpose of gateways

More information

RS-422 Code-Operated Switches

RS-422 Code-Operated Switches JUNE 2000 SW421A-R2 SW422A-R2 RS-422 Code-Operated Switches COS/4 TEXT TRANSPARENT GRAPHICS MODE RESET ST LO CUSTOMER SUPPORT INFORMATION Order toll-free in the U.S. 24 hours, 7 A.M. Monday to midnight

More information

FA269 - DIGITAL MEDIA AND CULTURE

FA269 - DIGITAL MEDIA AND CULTURE FA269 - DIGITAL MEDIA AND CULTURE ST. LAWRENCE UNIVERSITY a. hauber http://blogs.stlawu.edu/digitalmedia DIGITAL TECHNICAL PRIMER INCLUDED HERE ARE THE FOLLOWING TOPICS A. WHAT IS A COMPUTER? B. THE DIFFERENCE

More information

ADDMASTER. Addmaster Corporation. IJ-3080 Journal/Validation Printer. Specification. IJ-3080 Specification

ADDMASTER. Addmaster Corporation. IJ-3080 Journal/Validation Printer. Specification. IJ-3080 Specification IJ-3080 Journal/Validation Printer Specification Provides the electrical, mechanical, and interface specifications of the IJ-3080 Journal/Validation Printer. Cover Models: IJ-3080 The Addmaster Model IJ-3080

More information

MK D Imager Barcode Scanner Configuration Guide

MK D Imager Barcode Scanner Configuration Guide MK-5500 2D Imager Barcode Scanner Configuration Guide V1.4 Table of Contents 1 Getting Started... 3 1.1 About This Guide... 3 1.2 Barcode Scanning... 3 1.3 Factory Defaults... 3 2 Communication Interfaces...

More information

Xi2000-BT Series Configuration Guide

Xi2000-BT Series Configuration Guide U.S. Default Settings Sequence Reset Scanner Xi2000-BT Series Configuration Guide Auto-Sense Mode ON UPC-A Convert to EAN-13 OFF UPC-E Lead Zero ON Save Changes POS-X, Inc. 2130 Grant St. Bellingham, WA

More information

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent?

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent? CSC 2400: Computer Systems Data Representa5on What kinds of data do we need to represent? - Numbers signed, unsigned, integers, floating point, complex, rational, irrational, - Text characters, strings,

More information

Table of Contents Sleep Settings How to Configure the Scanner. 7 Chapter 2 System Setup

Table of Contents Sleep Settings How to Configure the Scanner. 7 Chapter 2 System Setup Table of Contents Chapter 1 System Information 1.1 Setup Scanner with PC 1.2 Setup Scanner with Mobile Device 1.3 Configure ios On-Screen Keyboard 1.4 Memory Mode 3 4 4 5 1.5 Sleep Settings 6 1.6 How to

More information

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent?

Data Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent? CSC 2400: Computer Systems Data Representa5on What kinds of data do we need to represent? - Numbers signed, unsigned, integers, floating point, complex, rational, irrational, - Text characters, strings,

More information

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums plc numbers - 3. 3. NUMBERS AND DATA Topics: Number bases; binary, octal,, hexa Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;

More information

2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme

2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme 2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme repeated (integer) division by two. Example: What is

More information

marson MT8200S 2D Handheld Scanner User Manual V / 6 / 25 - I -

marson MT8200S 2D Handheld Scanner User Manual V / 6 / 25 - I - marson MT8200S 2D Handheld Scanner User Manual V1.1 2018 / 6 / 25 - I - Table of Contents 1 Gettting Started...1 1.1 Introduction...1 1.2 Configuring MT8200S...1 1.2.1 Barcode Configurability...1 1.2.2

More information

Positional Number System

Positional Number System Positional Number System A number is represented by a string of digits where each digit position has an associated weight. The weight is based on the radix of the number system. Some common radices: Decimal.

More information

Number Systems Base r

Number Systems Base r King Fahd University of Petroleum & Minerals Computer Engineering Dept COE 2 Fundamentals of Computer Engineering Term 22 Dr. Ashraf S. Hasan Mahmoud Rm 22-44 Ext. 724 Email: ashraf@ccse.kfupm.edu.sa 3/7/23

More information

PS232. RS-232 to PS/2 Keyboard Port Adapter Part # SA0009 (Version 4.0) Copyright 2003 L3 Systems, Inc. Redmond

PS232. RS-232 to PS/2 Keyboard Port Adapter Part # SA0009 (Version 4.0) Copyright 2003 L3 Systems, Inc. Redmond PS232 RS-232 to PS/2 Keyboard Port Adapter Part # SA0009 (Version 4.0) Copyright 2003 L3 Systems, Inc. Redmond Quick Reference Command Description Pg ~H Help Screen Displays short command reference 4 ~V

More information

Setup Procedures 2 Batch Setup 3. Bar Code Setup Menu 5. 1 Device Selection and Default. 2 Beep and Delay Keyboard Wedge..

Setup Procedures 2 Batch Setup 3. Bar Code Setup Menu 5. 1 Device Selection and Default. 2 Beep and Delay Keyboard Wedge.. Contents Setup Procedures 2 Batch Setup 3 Bar Code Setup Menu 5 1 Device Selection and Default 5 2 Beep and Delay... 7 3 Keyboard Wedge.. 9 4 RS232 Serial Setting.... 11 5 Scanner.. 13 7 Symbologies(I):

More information

DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes. Error Detection Codes

DATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes. Error Detection Codes 1 DATA REPRESENTATION Data Types Complements Fixed Point Representations Floating Point Representations Other Binary Codes Error Detection Codes 2 Data Types DATA REPRESENTATION Information that a Computer

More information

Numbers and Computers. Debdeep Mukhopadhyay Assistant Professor Dept of Computer Sc and Engg IIT Madras

Numbers and Computers. Debdeep Mukhopadhyay Assistant Professor Dept of Computer Sc and Engg IIT Madras Numbers and Computers Debdeep Mukhopadhyay Assistant Professor Dept of Computer Sc and Engg IIT Madras 1 Think of a number between 1 and 15 8 9 10 11 12 13 14 15 4 5 6 7 12 13 14 15 2 3 6 7 10 11 14 15

More information

FACTORY AUTOMATION MANUAL IC-KP-B6-V15B IC-KP-B6-2V15B IC-KP-B6-SUBD

FACTORY AUTOMATION MANUAL IC-KP-B6-V15B IC-KP-B6-2V15B IC-KP-B6-SUBD FACTORY AUTOMATION MANUAL IC-KP-B6-V15B IC-KP-B6-2V15B IC-KP-B6-SUBD Communication in "IRI-B6" and "IVI-B6 mode With regard to the supply of products, the current issue of the following document is applicable:

More information

MANUAL RFID Supervisor

MANUAL RFID Supervisor FACTORY AUTOMATION MANUAL RFID Supervisor Configuration software for IDENTControl interfaces and UHF read / write heads With regard to the supply of products, the current issue of the following document

More information

ASCII Code - The extended ASCII table

ASCII Code - The extended ASCII table ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage

More information

NC-1200 BARCODE SCANNER. Configuration Guide - 1 -

NC-1200 BARCODE SCANNER. Configuration Guide - 1 - NC-1200 BARCODE SCANNER Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up the parameter-i 3 1.3 How to set up the parameter II 4 1.4 Resetting

More information

Variables and data types

Variables and data types Programming with Python Module 1 Variables and data types Theoretical part Contents 1 Module overview 4 2 Writing computer programs 4 2.1 Computer programs consist of data and instructions......... 4 2.2

More information

Unit 3, Lesson 2 Data Types, Arithmetic,Variables, Input, Constants, & Library Functions. Mr. Dave Clausen La Cañada High School

Unit 3, Lesson 2 Data Types, Arithmetic,Variables, Input, Constants, & Library Functions. Mr. Dave Clausen La Cañada High School Unit 3, Lesson 2 Data Types, Arithmetic,Variables, Input, Constants, & Library Functions Mr. Dave Clausen La Cañada High School Vocabulary Variable- A variable holds data that can change while the program

More information

RIO-47xxx USER MANUAL. By Galil Motion Control, Inc. Manual Rev. 1.0k

RIO-47xxx USER MANUAL. By Galil Motion Control, Inc. Manual Rev. 1.0k USER MANUAL RIO-47xxx Manual Rev. 1.0k By Galil Motion Control, Inc. Galil Motion Control, Inc. 270 Technology Way Rocklin, California 95765 Phone: (916) 626-0101 Fax: (916) 626-0102 Email: support@galilmc.com

More information

EE 109 Unit 2. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL

EE 109 Unit 2. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL EE 9 Unit Binary Representation Systems ANALOG VS. DIGITAL Analog vs. Digital The analog world is based on continuous events. Observations can take on any (real) value. The digital world is based on discrete

More information

Using AutoInstall to Remotely Configure Cisco Networking Devices

Using AutoInstall to Remotely Configure Cisco Networking Devices Using AutoInstall to Remotely Configure Cisco Networking Devices First Published: November 28, 2005 Last Updated: May 4, 2009 AutoInstall enables remote, automatic configuration of networking devices.

More information

3. Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1. ARes/ComNet

3. Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1. ARes/ComNet Anonymous number: 3 Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1 AResComNet 20172018 Rou destination Final exam : Version A in English Rou

More information

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc.

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc. 9 February 2011 CSE-1520R Test #1 [7F] w/ answers p. 1 of 8 CSE-1520R Test #1 Sur / Last Name: Given / First Name: Student ID: Instructor: Parke Godfrey Exam Duration: 45 minutes Term: Winter 2011 The

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

Number Systems II MA1S1. Tristan McLoughlin. November 30, 2013

Number Systems II MA1S1. Tristan McLoughlin. November 30, 2013 Number Systems II MA1S1 Tristan McLoughlin November 30, 2013 http://en.wikipedia.org/wiki/binary numeral system http://accu.org/index.php/articles/18 http://www.binaryconvert.com http://en.wikipedia.org/wiki/ascii

More information

HOST MODE PROGRAMMING. > Matrix N Family

HOST MODE PROGRAMMING. > Matrix N Family HOST MODE PROGRAMMING > Matrix N Family Datalogic Automation Srl Via Lavino, 265 40050 - Monte S. Pietro Bologna - Italy Matrix N Family Host Mode Programming Ed.: 10/2016 This manual refers to software

More information

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc.

CSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc. 9 February 2011 CSE-1520R Test #1 [B4] p. 1 of 8 CSE-1520R Test #1 Sur / Last Name: Given / First Name: Student ID: Instructor: Parke Godfrey Exam Duration: 45 minutes Term: Winter 2011 The exam is closed

More information

BD-6500BT Bluetooth 2D Barcode Scanner Configuration Guide

BD-6500BT Bluetooth 2D Barcode Scanner Configuration Guide BD-6500BT Bluetooth 2D Barcode Scanner Configuration Guide V 2.1 Table of Contents 1 Getting Started. 3 1.1 About This Guide.. 3 1.2 Barcode Scanning.. 3 1.3 Factory Defaults.. 3 1.4 Pairing Cradle 4 1.5

More information

DLL2020. Software Configuration Manual

DLL2020. Software Configuration Manual DLL2020 Software Configuration Manual DLL2020 SOFTWARE CONFIGURATION MANUAL DATALOGIC S.p.A. Via Candini 2 40012 - Lippo di Calderara di Reno Bologna - Italia DLL2020 Software Configuration Manual Ed.:02/2003

More information

S-Series Sensor ASCII Protocol v8.1.0

S-Series Sensor ASCII Protocol v8.1.0 S-Series Sensor v8.1.0 Legend: ADR Node/Slave Address TIME STAT Status Byte ERR CTRL Control Byte SP # POS Position DATA TARG Target CHAR VEL Velocity OFF SN CODE PAR # Serial Number Security Code Parameter

More information

Exercises Software Development I. 03 Data Representation. Data types, range of values, internal format, literals. October 22nd, 2014

Exercises Software Development I. 03 Data Representation. Data types, range of values, internal format, literals. October 22nd, 2014 Exercises Software Development I 03 Data Representation Data types, range of values, ernal format, literals October 22nd, 2014 Software Development I Wer term 2013/2014 Priv.-Doz. Dipl.-Ing. Dr. Andreas

More information

Pins 2, 3 - Baud rate select - Selects the baud rate for the serial transmission.

Pins 2, 3 - Baud rate select - Selects the baud rate for the serial transmission. General The CSI Model DB1000 Decoder is available in a PLCC-44 pin package. The list below describes the function of each pin. The basic connection schematic shows connections that are common to all configurations.

More information

RS-232 Control of the Advantage DRI

RS-232 Control of the Advantage DRI RS-232 Control of the Advantage DRI Biamp Systems, 14130 N.W. Science Park, Portland, Oregon 97229 U.S.A. (503) 641-7287 an affiliate of Rauland-Borg Corp. Introduction This document contains technical

More information

2D Barcode Reader User Guide V 1.2.1

2D Barcode Reader User Guide V 1.2.1 2D Barcode Reader User Guide V 1.2.1 Table of Contents 1 Getting Started... 3 1.1 About This Guide... 3 1.2 Barcode Scanning... 3 1.3 Factory Defaults... 3 1.4 Firmware Version Number... 3 2 Communication

More information

Hardware. ( Not so hard really )

Hardware. ( Not so hard really ) Hardware ( Not so hard really ) Introduction to Computers What is a computer? Why use a computer anyway? Do they have limitations? What s next? A bit of history Mechanical Early 1614 1643 1673 Abacus Slide

More information

Fundamental Data Types

Fundamental Data Types Fundamental Data Types Lecture 4 Sections 2.7-2.10 Robb T. Koether Hampden-Sydney College Mon, Sep 3, 2018 Robb T. Koether (Hampden-Sydney College) Fundamental Data Types Mon, Sep 3, 2018 1 / 25 1 Integers

More information

8.2 User Defined Protocol Communication

8.2 User Defined Protocol Communication 8.2 User Defined Protocol Communication 8.2.1 Introduction User Defined Protocol Communication allows users who do communication between GM7 Basic Unit and other kind of device to define the other company

More information

Chapter 1. Hardware. Introduction to Computers and Programming. Chapter 1.2

Chapter 1. Hardware. Introduction to Computers and Programming. Chapter 1.2 Chapter Introduction to Computers and Programming Hardware Chapter.2 Hardware Categories Input Devices Process Devices Output Devices Store Devices /2/27 Sacramento State - CSc A 3 Storage Devices Primary

More information

Serial Communication. Transmit. Receive To EECC250 - Shaaban. From Universal Asynchronous Receiver/Transmitter (UART) Parity Bit

Serial Communication. Transmit. Receive To EECC250 - Shaaban. From Universal Asynchronous Receiver/Transmitter (UART) Parity Bit Parity Bit ASCII Character From 68000 Transmit Transmitter Buffer (TB) Serial Communication Receive To 68000 ASCII Character Parity Bit To device Parity Bit ASCII Character Receiver Buffer (RB) Universal

More information

First Data U.S. Debit Test Card Set. Version 1.20

First Data U.S. Debit Test Card Set. Version 1.20 First Data U.S. Debit Test Card Set August, 2016 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from

More information

BARCODE SCANNER. Configuration Guide - 1 -

BARCODE SCANNER. Configuration Guide - 1 - BARCODE SCANNER Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up the parameter 3 1.3 How to set up the parameter - II 4 Chapter 2 System

More information

Introduction to Decision Structures. Boolean & If Statements. Different Types of Decisions. Boolean Logic. Relational Operators

Introduction to Decision Structures. Boolean & If Statements. Different Types of Decisions. Boolean Logic. Relational Operators Boolean & If Statements Introduction to Decision Structures Chapter 4 Fall 2015, CSUS Chapter 4.1 Introduction to Decision Structures Different Types of Decisions A decision structure allows a program

More information

Lecture 13 Serial Interfaces

Lecture 13 Serial Interfaces CPE 390: Microprocessor Systems Spring 2018 Lecture 13 Serial Interfaces Bryan Ackland Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken, NJ 07030 Adapted from HCS12/9S12

More information