Application Note #2437
|
|
- Leslie Stokes
- 6 years ago
- Views:
Transcription
1 Application Note #2437 The CW Command This application note describes the CW Galil command. The CW command has three uses: it (1) prints the controller s copyright message, (2) sets or clears the most significant ASCII bit of unsolicited characters sent by the controller, and (3) controls whether the program pauses when the output communication buffer is full. This note describes each of these uses in detail. CONTENTS 1 COPYRIGHT MESSAGE (CW; CW0; CW?) MARKING UNSOICITED CHARACTERS (CW1; CW2) UNSOICITED CHARACTERS Commands in an Application Program TR Error Messages ASCII AND HOW UNSOICITED CHARACTERS ARE MARKED WHEN TO MARK (CW1) WHEN NOT TO MARK (CW2) SECOND ETHERNET HANDE GETTING UNSOICITED CHARACTERS IN AN APPICATION PROGRAM ROUTING UNSOICITED MESSAGES WITH CF (ETHERNET CONTROERS ONY) PAUSING PROGRAM WHEN FIFO IS FU (CW,0; CW,1) EXAMPE CONTROERS WITH A SINGE-BYTE UART ETHERNET WHEN TO PAUSE (CW,0) WHEN NOT TO PAUSE (CW,1) USAGE NOTE: ONE FIED AT A TIME
2 1 Copyright Message (CW; CW0; CW?) The original use for the CW command was to print a message containing copyright information for the controller (figure 1). :CW Copyright (c) Galil Motion Control, Inc All rights reserved Figure 1. Copyright message output from the CW command Note that CW0 and CW? do the same thing as just CW. 2 Marking Unsolicited Characters (CW1; CW2) This section explains in detail the difference between solicited and unsolicited characters, how the characters are marked, and when to mark and not to mark. 2.1 Unsolicited Characters Two kinds of characters are generated by a Galil controller: solicited and unsolicited (figure 2). PC C program TPX 0: Controller # MG"" WT100 JP# Figure 2. Unsolicited ( ) and solicited (0:) characters. Solicited characters are output by the controller in response to a command sent in on the communication port (e.g. PCI bus, Ethernet, or RS-232). For example, if a host PC sends the command TPX to the controller, the controller might respond with the string 0: indicating the position of the X-axis. All solicited responses end with a colon (:) preceded by a carriage return and line feed. Unsolicited characters are those output by the controller that are not in response to a command sent in on the communication port. These fall into three categories: (1) Commands that produce communication output in a Galil application program, (2) TR1 debugging trace output, and (3) error messages. Unsolicited responses do not end with a colon, but do end in carriage return and line feed (unless {N} is used with the MG command)
3 2.1.1 Commands in an Application Program Certain Galil commands produce communication output (namely MG). When these commands are called from a host PC, their responses are solicited; however, when they are placed in a controller application program, they produce unsolicited characters. Figure 2 above shows a simple application program that repeatedly calls the MG command. Terminal output follows: : Figure 3. Output from the program in figure 2 After the controller responds to the XQ command with a colon (:), it begins running the application program and repeatedly prints the unsolicited character. Commands that produce communication output follow: AW, BS, IN, A,, S, V, MG, QA, QH, QR, QU, QZ, RP, R, SC, TB, TC, TD, TE, TH, TI, T, TP, TS, TT, TV, TZ, U, WH TR1 Turning the debug trace output on also produces unsolicited characters (figure 4): :TR1 :0 # 1 MG"" 2 WT100 3 JP# 0 # 1 MG"" Figure 4. TR1 output for the program in figure Error Messages The last way the controller produces unsolicited characters is when an error occurs. If we add an invalid line to the program in figure 2 and run it, the controller generates an unsolicited message containing a question mark, the line number, and the source code on that line (figure 5). Subsequently issuing TC1 will display a string indicating the reason for the error. :S 0 # 1 MG"" 2 WT100 3 invalid line INVAID INE INSERTED 4 JP# 5 :?3 invalid line :TC1 1 Unrecognized command Figure 5. Example of an error message (unsolicited) - 3 -
4 2.2 ASCII and how Unsolicited Characters are Marked Both solicited and unsolicited messages are composed of ASCII (American Standard Code for Information Interchange) characters. ASCII is a 7-bit protocol that specifies 128 character symbols, which correspond to the numbers 0 to 127 (0 to 7F hexadecimal). Most of the ASCII characters correspond to those on a computer keyboard (figure 6) A B C D E F 0 NU SOH STX ETX EOT ENQ ACK BE BS TAB F VT FF CR SO SI 10 DE DC1 DC2 DC3 DC4 NAK SYN ETB CAN EM SUB ESC FS GS RS US 20 space! " # $ % & ' ( ) * +, -. / : ; < = >? A B C D E F G H I J K M N O 50 P Q R S T U V W X Y Z [ \ ] ^ _ 60 ` a b c d e f g h i j k l m n o 70 p q r s t u v w x y z { } ~ DE Figure 6. ASCII table by hexadecimal code. Nonprintable characters are in grey. Although ASCII is only seven bits, the minimum unit of computer data is the 8-bit byte (figure 7), which allows 256 values. This means that when a character is transmitted, there is an extra bit that is unused: the most significant bit. Several extended ASCII tables have been created that assign non-english characters to the remaining 128 codes, but no true standard has emerged (different computer programs print different characters for a given extended ASCII code). Galil makes clever use of this extra bit by setting it to mark unsolicited characters (if CW1 is set). most significant bit CW hex C hex CW Figure 7. 8-bit byte from the controller s communication output for the ASCII character with CW2 set (top) and CW1 set (bottom) - 4 -
5 2.3 When to Mark (CW1) Unsolicited characters should be differentiated from solicited characters when the controller communicates with a host PC program (and in fact Galil s SmartTerminal sends CW1 upon connection to a controller). The following example shows what happens when unsolicited characters aren t marked. The below C program (figure 8) asks the controller repeatedly for the position of the X-axis and prints the raw string result. By issuing CW2 (the factory default), the program leaves unsolicited characters unmarked and this leaves the potential for the problem described below. Figure 8. C program that repeatedly queries the controller X-axis position without marking unsolicited characters Figure 9 shows the output from the C program while the controller runs the program in figure 2. A normal response to TPX is a number followed by a colon (the C program could easily parse this string and convert it to a number). The second response in figure 9 shows how a response to TPX also contains the character! Since unsolicited characters aren t being marked, the PC has no way of differentiating solicited characters from unsolicited characters. Even worse, if the unsolicited character were a number, there would be no way to tell it apart from the number the C program is trying to get. 0 : 0 : 1 st response (normal) 2 nd response with interleaved unsolicited character Figure 9. Output of the C program in figure 8 when the controller runs the program in figure 2 If the C program had set CW1 instead, the Galil driver would know that the was not an intended response to TPX and the program output would be correct
6 2.4 When not to Mark (CW2) Marked unsolicited characters will show up as non-english characters (figure 10) when you connect to the controller with a terminal that was not developed by Galil (for example telnet or Windows HyperTerminal). As described in section 2.2, this is because the terminal will display its extended ASCII characters since the most significant bit of incoming characters is set. This will be the case unless the terminal knows to force the incoming data to 7-bit ASCII (which is possible with HyperTerminal and is the case for Galil s SmartTerminal). Issue CW2 to read the unsolicited characters in a third-party terminal. Since no third-party terminals are available for Galil bus controllers (such as the DMC-1800 PCI or DMC-1700 ISA controllers), CW should always be set to 1 on these controllers. :S 0 # 1 MG"" 2 WT JP# :CW1 :ÌŠÌŠCW2 NON-ENGISH CHARACTERS : Figure 10. Unsolicited characters viewed in Windows HyperTerminal with both CW1 and CW2 2.5 Second Ethernet Handle For the case of Ethernet, it is possible to mark the unsolicited characters in another way: via a TCP/IP port number (Figure 11). When registering an Ethernet controller, it is possible to choose whether to have the controller send unsolicited characters on the primary handle (port) or a second handle. If using a single handle for both solicited and unsolicited characters (Use primary handle) CW1 is still necessary to mark unsolicited characters. When you choose open second handle, the unsolicited characters come in marked with a different port number, so marking the most significant bit is no longer necessary. Figure 11. Galil controller registration dialog showing how to configure the controller to send unsolicited characters on a second handle - 6 -
7 2.6 Getting Unsolicited Characters in an Application Program There are two ways to retrieve unsolicited characters in a custom application program (for example written in C or Visual Basic): (1) If you are using DMCWin32 (the free Galil Windows API), use the Galil API function DMCGetUnsolicitedResponse. (2) If you are using the Galil ActiveX Toolkit, use the DMCShell event DMCResponse (not to be confused with the DMCShell.DMCResponse property, which gives only solicited responses to DMCShell.DMCCommand). Either of these returns only characters whose most significant bit is set with CW1 (or characters which came in on a separate Ethernet handle, if this was set up as described in section 2.5). 2.7 Routing Unsolicited Messages with CF (Ethernet Controllers Only) When trying to retrieve unsolicited messages on an Ethernet controller, both the CW and CF commands must be configured properly. For a bus (e.g. PCI) controller, there is only one place communication output can go: the bus. For an Ethernet controller, which also has a serial port, there are nine places: the serial port and eight Ethernet handles (A-H). Each Ethernet handle corresponds to a different IP address and/or TCP/IP port. By factory default, an Ethernet controller routes unsolicited messages to the serial port (CFS). If you connect to a new Ethernet controller through SmartTerminal and run the program in figure 2 you will not see any output (figure 12). To see the output, issue the WH command, which tells you which controller handle you are currently connected to, and then issue CF to route the messages to that handle: :S 0 # 1 MG"" 2 WT100 3 JP# 4 :WH IHA :CFA : Figure 12. Demonstration of the CF command Use the TH command to show which handles are in use
8 3 Pausing Program when FIFO is Full (CW,0; CW,1) The third use for the CW command has to do with notifying the machine operator that the communication link has been severed. The second argument to CW controls whether the controller will pause its application program if the output communication buffer (bus or serial) is full. This will happen, for example, if the serial link is severed or if the terminal is closed while the controller is sending characters. 3.1 Example This example works on all controllers except for DMC-14x5/6, 21x2/3, and 3xxx. To see the controller pause program execution: (1) connect to the controller through a terminal (2) issue CW,0 (3) download the program in figure 13 # ER 0 MG 1 WT 50 ;'turn red light on ;'print ;'wait 50 milliseconds ER 1000 ;'turn red light off MG 0 ;'print WT 50 ;'wait 50 milliseconds JP# Figure 13. Program to demonstrate program pause (4) run it with XQ and observe the controller s red light blink (5) close the terminal and observe the controller s red light stop blinking (indicating the program has paused execution) - 8 -
9 3.2 Controllers with a Single-Byte UART All controllers pause as described above for CW,0 except for the following controllers, which have only a single-byte UART: DMC-14x5/6, 21x2/3, and 3xxx. For these controllers, CW,0 causes the following error to be generated instead of pausing if the serial communication link is severed: 131 Serial port hardware handshake timeout CW,1 causes no error to be generated, and again the program is not paused. Note that error 131 is special in that it will not stop the application program and it cannot be handled with #CMDERR. 3.3 Ethernet For Ethernet communication, the second CW argument is ignored and the following error is generated instead of pausing if the Ethernet communication link is severed: 123 TCP lost sync or timeout This error can be handled with the #TCPERR routine. 3.4 When to pause (CW,0) The CW,0 (factory default) setting should be used when a host PC program communicates with the controller and is critical to the machine operation. In this case, any controller communication output is deemed important, so if the communication link is severed, the machine will pause to notify the operator that something is wrong. If a PC program consists of a GUI that only displays machine status, it may not be important enough to pause the machine when communication is down. 3.5 When not to pause (CW,1) The CW,1 setting should be used when the controller is running stand alone, without a host PC (or for the case of a bus controller, without a custom PC application program). For a properly written Galil-language program (with no errors), any communication output consists only of debug messages (MG or TR1), which are not critical to the machine s operation, and can be ignored. 3.6 Usage Note: One Field at a Time When setting the pause status (CW,0 or CW,1), the mark unsolicited messages status (CW1 or CW2) cannot be set at the same. That is CW2,1 is invalid, but CW2;CW,1 is valid. (CW2,1 will set the first field and ignore the second.) - 9 -
Fundamentals of Programming (C)
Borrowed from lecturer notes by Omid Jafarinezhad Fundamentals of Programming (C) Group 8 Lecturer: Vahid Khodabakhshi Lecture Number Systems Department of Computer Engineering Outline Numeral Systems
More informationData Representation and Binary Arithmetic. Lecture 2
Data Representation and Binary Arithmetic Lecture 2 Computer Data Data is stored as binary; 0 s and 1 s Because two-state ( 0 & 1 ) logic elements can be manufactured easily Bit: binary digit (smallest
More information1.1. INTRODUCTION 1.2. NUMBER SYSTEMS
Chapter 1. 1.1. INTRODUCTION Digital computers have brought about the information age that we live in today. Computers are important tools because they can locate and process enormous amounts of information
More informationApplication Note #4434
Jan-12 Application Note #4434 Creating a Custom Ethernet Communication Interface to a Galil Controller For most applications, the standard GalilTools communication libray or API (Application Programming
More informationNumber System (Different Ways To Say How Many) Fall 2016
Number System (Different Ways To Say How Many) Fall 2016 Introduction to Information and Communication Technologies CSD 102 Email: mehwish.fatima@ciitlahore.edu.pk Website: https://sites.google.com/a/ciitlahore.edu.pk/ict/
More informationFundamentals of Programming
Fundamentals of Programming Lecture 2 Number Systems & Arithmetic Lecturer : Ebrahim Jahandar Some Parts borrowed from slides by IETC1011-Yourk University Common Number Systems System Base Symbols Used
More informationCS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON
CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON Prof. Gurindar Sohi TAs: Pradip Vallathol and Junaid Khalid Midterm Examination 1 In Class (50 minutes) Friday, September
More informationCS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON
CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON Prof. Gurindar Sohi TAs: Junaid Khalid and Pradip Vallathol Midterm Examination 1 In Class (50 minutes) Friday, September
More informationChapter 2 Bits, Data Types, and Operations
Chapter Bits, Data Types, and Operations How do we represent data in a computer? At the lowest level, a computer is an electronic machine. works by controlling the flow of electrons Easy to recognize two
More informationLecture (09) x86 programming 8
Lecture (09) x86 programming 8 By: Dr. Ahmed ElShafee 1 Basic Input Output System BIOS BIOS refers to a set of procedures or functions that enable the programmer have access to the hardware of the computer.
More informationCS341 *** TURN OFF ALL CELLPHONES *** Practice NAME
CS341 *** TURN OFF ALL CELLPHONES *** Practice Final Exam B. Wilson NAME OPEN BOOK / OPEN NOTES: I GIVE PARTIAL CREDIT! SHOW ALL WORK! 1. Processor Architecture (20 points) a. In a Harvard architecture
More informationChapter 2 Bits, Data Types, and Operations
Chapter 2 Bits, Data Types, and Operations How do we represent data in a computer? At the lowest level, a computer is an electronic machine. works by controlling the flow of electrons Easy to recognize
More informationEXPERIMENT 8: Introduction to Universal Serial Asynchronous Receive Transmit (USART)
EXPERIMENT 8: Introduction to Universal Serial Asynchronous Receive Transmit (USART) Objective: Introduction To understand and apply USART command for sending and receiving data Universal Serial Asynchronous
More informationEXPERIMENT 7: Introduction to Universal Serial Asynchronous Receive Transmit (USART)
EXPERIMENT 7: Introduction to Universal Serial Asynchronous Receive Transmit (USART) Objective: To understand and apply USART command for sending and receiving data Introduction Universal Serial Asynchronous
More informationBinary Numbers. The Basics. Base 10 Number. What is a Number? = Binary Number Example. Binary Number Example
The Basics Binary Numbers Part Bit of This and a Bit of That What is a Number? Base Number We use the Hindu-Arabic Number System positional grouping system each position represents a power of Binary numbers
More informationChapter 3. Information Representation
Chapter 3 Information Representation Instruction Set Architecture APPLICATION LEVEL HIGH-ORDER LANGUAGE LEVEL ASSEMBLY LEVEL OPERATING SYSTEM LEVEL INSTRUCTION SET ARCHITECTURE LEVEL 3 MICROCODE LEVEL
More informationConnecting UniOP to Datalogic Barcode Readers
Connecting UniOP to Datalogic Barcode Readers This Technical Note contains the information needed to connect UniOP to Datalogic Barcode Scanners. Contents 1. Introduction...1 2. Designer setup...1 2.1
More informationRS-232 Control of the Advantage EQ281/8, EQ282/8 and Advantage SMS200
RS-232 Control of the Advantage EQ281/8, EQ282/8 and Advantage SMS200 Biamp Systems, 14130 N.W. Science Park, Portland, Oregon 97229 U.S.A. (503) 641-7287 an affiliate of Rauland-Borg Corp. Introduction
More informationChapter 2 Bits, Data Types, and Operations
Chapter 2 Bits, Data Types, and Operations Original slides from Gregory Byrd, North Carolina State University Modified slides by Chris Wilcox, Colorado State University How do we represent data in a computer?!
More informationChapter 8. Characters and Strings
Chapter 8 Characters and s OJECTIVES After you have read and studied this chapter, you should be able to Declare and manipulate data of the char data type. Write string processing programs using and uffer
More informationSource coding and compression
Computer Mathematics Week 5 Source coding and compression College of Information Science and Engineering Ritsumeikan University last week binary representations of signed numbers sign-magnitude, biased
More informationOberon Data Types. Matteo Corti. December 5, 2001
Oberon Data Types Matteo Corti corti@inf.ethz.ch December 5, 2001 1 Introduction This document is aimed at students without any previous programming experience. We briefly describe some data types of the
More informationChapter 2 Number System
Chapter 2 Number System Embedded Systems with ARM Cortext-M Updated: Tuesday, January 16, 2018 What you should know.. Before coming to this class Decimal Binary Octal Hex 0 0000 00 0x0 1 0001 01 0x1 2
More informationBits and Bytes. Data Representation. A binary digit or bit has a value of either 0 or 1; these are the values we can store in hardware devices.
Bits and Bytes 1 A binary digit or bit has a value of either 0 or 1; these are the values we can store in hardware devices. A byte is a sequence of 8 bits. A byte is also the fundamental unit of storage
More informationUser s Manual. Xi3000 Scanner. Table of Contents
Xi3000 Scanner User s Manual Table of Contents Restore Default Settings... 1 Exit Setup without Changes... 1 Configure Through RS232... 1 List Setting... 1 Buzzer Settings... 2 Reading Redundancy Setting...
More informationDo not start the test until instructed to do so!
Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted one-page formula sheet. No calculators or other electronic devices
More informationNumber Representations
Simple Arithmetic [Arithm Notes] Number representations Signed numbers Sign-magnitude, ones and twos complement Arithmetic Addition, subtraction, negation, overflow MIPS instructions Logic operations MIPS
More informationPureScan - ML1. Configuration Guide. Wireless Linear Imager Wireless Laser scanner - 1 -
PureScan - ML1 Wireless Linear Imager Wireless Laser scanner Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up the parameter 3 Chapter 2
More informationDo not start the test until instructed to do so!
Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted one-page formula sheet. No calculators or other electronic devices
More informationThe Binary Number System
The Binary Number System Robert B. Heckendorn University of Idaho August 24, 2017 Numbers are said to be represented by a place-value system, where the value of a symbol depends on where it is... its place.
More informationConfiguration Manual PULSAR C CCD SCANNER. Table of Contents
Table of Contents PULSAR C CCD SCANNER Configuration Manual Metrologic Instruments GmbH Dornier Strasse 2 82178 Puchheim Germany Tel +49 89 890190 Fax +49 89 89019200 www.europe.metrologic.com Metrologic
More informationChapter 2 Bits, Data Types, and Operations
Chapter 2 Bits, Data Types, and Operations Computer is a binary digital system. Digital system: finite number of symbols Binary (base two) system: has two states: 0 and 1 Basic unit of information is the
More information2D BARCODE SCANNER CA-SC-20200B
D BARCODE SCANNER CA-SC-B Quick Start Guide Getting Familiar with Your Device Thank you for choosing Capture Bar Code Scanner. All Devices deliver world-class performance for a broad range of applications
More informationChapter 2 Bits, Data Types, and Operations
Chapter 2 Bits, Data Types, and Operations Original slides from Gregory Byrd, North Carolina State University Modified by Chris Wilcox, S. Rajopadhye Colorado State University How do we represent data
More informationFD-011WU. 2D Barcode Reader User Guide V1.6CC
FD-011WU 2D Barcode Reader User Guide V1.6CC Table of Contents 1 Getting Started... 1 1.1 Factory Defaults... 1 2 Communication Interfaces...2 2.1 TTL-232 Interface... 2 2.2 Baud Rate... 3 2.3 Data Bit
More informationSerial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey
4: Serial I/O CET360 Microprocessor Engineering J. Sumey Introduction serial, i.e. bit-at-a-time, interfacing techniques are useful when parallel interfacing limitations become problematic distance limitations
More informationAddmaster Corporation
IJ-1000 Ink-Jet Validation Printer Specification Addmaster Corporation Address: 225 East Huntington Drive Monrovia, CA 91016 Web: www.addmaster.com Phone: (626) 358-2395 FAX: (626) 358-2784 Document: ij1w.doc
More informationCPS 104 Computer Organization and Programming Lecture-2 : Data representations,
CPS 104 Computer Organization and Programming Lecture-2 : Data representations, Sep. 1, 1999 Dietolf Ramm http://www.cs.duke.edu/~dr/cps104.html CPS104 Lec2.1 GK&DR Fall 1999 Data Representation Computers
More informationA GUIDE TO RS-232 COMMUNICATION WITH FX PLCS
A GUIDE TO RS-232 COMMUNICATION WITH FX PLCS Page 1 of 35 A GUIDE TO RS-232 COMMUNICATION WITH FX PLCS This document has been written specifically for FX and FX0N users that are unfamiliar with RS-232
More informationASSIGNMENT 5 TIPS AND TRICKS
ASSIGNMENT 5 TIPS AND TRICKS linear-feedback shift registers Java implementation a simple encryption scheme http://princeton.edu/~cos26 Last updated on /26/7 : PM Goals OOP: implement a data type; write
More informationDatalogic Scanning, Inc. 959 Terry Street Eugene, Oregon Telephone: (541) Fax: (541)
Datalogic Scanning, Inc. 959 Terry Street Eugene, Oregon 97402 Telephone: (541) 683-5700 Fax: (541) 345-7140 An Unpublished Work - All rights reserved. No part of the contents of this documentation or
More informationPD1100 STAND-ALONE PROGRAMMING & USER S GUIDE. use the freedom
PD1100 STAND-ALONE ALPHANUMERIC POLE DISPLAY PROGRAMMING & USER S GUIDE use the freedom Forward The information contained in this user s guide is subject to change without notice. This Programming and
More information3.1. Unit 3. Binary Representation
3.1 Unit 3 Binary Representation ANALOG VS. DIGITAL 3.2 3.3 Analog vs. Digital The analog world is based on continuous events. Observations can take on (real) any value. The digital world is based on discrete
More informationProgrammable #182 Parallel Interface Cash Drawer Manual
Programmable #182 Parallel Interface Cash Drawer Manual The following warning is required by the FCC for all Class A computing devices which have been tested and comply with the standard indicated: Warning:
More information5/17/2009. Digitizing Discrete Information. Ordering Symbols. Analog vs. Digital
Chapter 8: Bits and the "Why" of Bytes: Representing Information Digitally Digitizing Discrete Information Fluency with Information Technology Third Edition by Lawrence Snyder Copyright 2008 Pearson Education,
More information1. Character/String Data, Expressions & Intrinsic Functions. Numeric Representation of Non-numeric Values. (CHARACTER Data Type), Part 1
Character/String Data, Expressions Intrinsic Functions (CHARACTER Data Type), Part 1 1. Character/String Data, Expressions Intrinsic Functions (CHARACTER Data Type), Part 1 2. Numeric Representation of
More informationUniversal Asynchronous Receiver Transmitter Communication
Universal Asynchronous Receiver Transmitter Communication 13 October 2011 Synchronous Serial Standard SPI I 2 C Asynchronous Serial Standard UART Asynchronous Resynchronization Asynchronous Data Transmission
More informationEE 109 Unit 3. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL
3. 3. EE 9 Unit 3 Binary Representation Systems ANALOG VS. DIGITAL 3.3 3. Analog vs. Digital The analog world is based on continuous events. Observations can take on any (real) value. The digital world
More informationUnit 3. Analog vs. Digital. Analog vs. Digital ANALOG VS. DIGITAL. Binary Representation
3.1 3.2 Unit 3 Binary Representation ANALOG VS. DIGITAL 3.3 3.4 Analog vs. Digital The analog world is based on continuous events. Observations can take on (real) any value. The digital world is based
More informationMounting Dimensions / Viewing 2 Mounting Options 3. Wiring Configuration 4. Quick Set up Procedure 5. Changing Intensity 6.
Section Mounting Dimensions / Viewing 2 Mounting Options 3 Section 2 Wiring Configuration 4 Section 3 Quick Set up Procedure 5 Section 4 Changing Intensity 6 Section 5 Option Summary 7 Section 6 Option
More informationExperiment 3. TITLE Optional: Write here the Title of your program.model SMALL This directive defines the memory model used in the program.
Experiment 3 Introduction: In this experiment the students are exposed to the structure of an assembly language program and the definition of data variables and constants. Objectives: Assembly language
More information4/14/2015. Architecture of the World Wide Web. During this session we will discuss: Structure of the World Wide Web
Internet Gambling Investigations Architecture of the World Wide Web Ω Objectives During this session we will discuss: The term world wide web User interaction on the world wide web The purpose of gateways
More informationRS-422 Code-Operated Switches
JUNE 2000 SW421A-R2 SW422A-R2 RS-422 Code-Operated Switches COS/4 TEXT TRANSPARENT GRAPHICS MODE RESET ST LO CUSTOMER SUPPORT INFORMATION Order toll-free in the U.S. 24 hours, 7 A.M. Monday to midnight
More informationFA269 - DIGITAL MEDIA AND CULTURE
FA269 - DIGITAL MEDIA AND CULTURE ST. LAWRENCE UNIVERSITY a. hauber http://blogs.stlawu.edu/digitalmedia DIGITAL TECHNICAL PRIMER INCLUDED HERE ARE THE FOLLOWING TOPICS A. WHAT IS A COMPUTER? B. THE DIFFERENCE
More informationADDMASTER. Addmaster Corporation. IJ-3080 Journal/Validation Printer. Specification. IJ-3080 Specification
IJ-3080 Journal/Validation Printer Specification Provides the electrical, mechanical, and interface specifications of the IJ-3080 Journal/Validation Printer. Cover Models: IJ-3080 The Addmaster Model IJ-3080
More informationMK D Imager Barcode Scanner Configuration Guide
MK-5500 2D Imager Barcode Scanner Configuration Guide V1.4 Table of Contents 1 Getting Started... 3 1.1 About This Guide... 3 1.2 Barcode Scanning... 3 1.3 Factory Defaults... 3 2 Communication Interfaces...
More informationXi2000-BT Series Configuration Guide
U.S. Default Settings Sequence Reset Scanner Xi2000-BT Series Configuration Guide Auto-Sense Mode ON UPC-A Convert to EAN-13 OFF UPC-E Lead Zero ON Save Changes POS-X, Inc. 2130 Grant St. Bellingham, WA
More informationData Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent?
CSC 2400: Computer Systems Data Representa5on What kinds of data do we need to represent? - Numbers signed, unsigned, integers, floating point, complex, rational, irrational, - Text characters, strings,
More informationTable of Contents Sleep Settings How to Configure the Scanner. 7 Chapter 2 System Setup
Table of Contents Chapter 1 System Information 1.1 Setup Scanner with PC 1.2 Setup Scanner with Mobile Device 1.3 Configure ios On-Screen Keyboard 1.4 Memory Mode 3 4 4 5 1.5 Sleep Settings 6 1.6 How to
More informationData Representa5on. CSC 2400: Computer Systems. What kinds of data do we need to represent?
CSC 2400: Computer Systems Data Representa5on What kinds of data do we need to represent? - Numbers signed, unsigned, integers, floating point, complex, rational, irrational, - Text characters, strings,
More informationplc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums
plc numbers - 3. 3. NUMBERS AND DATA Topics: Number bases; binary, octal,, hexa Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;
More information2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme
2a. Codes and number systems (continued) How to get the binary representation of an integer: special case of application of the inverse Horner scheme repeated (integer) division by two. Example: What is
More informationmarson MT8200S 2D Handheld Scanner User Manual V / 6 / 25 - I -
marson MT8200S 2D Handheld Scanner User Manual V1.1 2018 / 6 / 25 - I - Table of Contents 1 Gettting Started...1 1.1 Introduction...1 1.2 Configuring MT8200S...1 1.2.1 Barcode Configurability...1 1.2.2
More informationPositional Number System
Positional Number System A number is represented by a string of digits where each digit position has an associated weight. The weight is based on the radix of the number system. Some common radices: Decimal.
More informationNumber Systems Base r
King Fahd University of Petroleum & Minerals Computer Engineering Dept COE 2 Fundamentals of Computer Engineering Term 22 Dr. Ashraf S. Hasan Mahmoud Rm 22-44 Ext. 724 Email: ashraf@ccse.kfupm.edu.sa 3/7/23
More informationPS232. RS-232 to PS/2 Keyboard Port Adapter Part # SA0009 (Version 4.0) Copyright 2003 L3 Systems, Inc. Redmond
PS232 RS-232 to PS/2 Keyboard Port Adapter Part # SA0009 (Version 4.0) Copyright 2003 L3 Systems, Inc. Redmond Quick Reference Command Description Pg ~H Help Screen Displays short command reference 4 ~V
More informationSetup Procedures 2 Batch Setup 3. Bar Code Setup Menu 5. 1 Device Selection and Default. 2 Beep and Delay Keyboard Wedge..
Contents Setup Procedures 2 Batch Setup 3 Bar Code Setup Menu 5 1 Device Selection and Default 5 2 Beep and Delay... 7 3 Keyboard Wedge.. 9 4 RS232 Serial Setting.... 11 5 Scanner.. 13 7 Symbologies(I):
More informationDATA REPRESENTATION. Data Types. Complements. Fixed Point Representations. Floating Point Representations. Other Binary Codes. Error Detection Codes
1 DATA REPRESENTATION Data Types Complements Fixed Point Representations Floating Point Representations Other Binary Codes Error Detection Codes 2 Data Types DATA REPRESENTATION Information that a Computer
More informationNumbers and Computers. Debdeep Mukhopadhyay Assistant Professor Dept of Computer Sc and Engg IIT Madras
Numbers and Computers Debdeep Mukhopadhyay Assistant Professor Dept of Computer Sc and Engg IIT Madras 1 Think of a number between 1 and 15 8 9 10 11 12 13 14 15 4 5 6 7 12 13 14 15 2 3 6 7 10 11 14 15
More informationFACTORY AUTOMATION MANUAL IC-KP-B6-V15B IC-KP-B6-2V15B IC-KP-B6-SUBD
FACTORY AUTOMATION MANUAL IC-KP-B6-V15B IC-KP-B6-2V15B IC-KP-B6-SUBD Communication in "IRI-B6" and "IVI-B6 mode With regard to the supply of products, the current issue of the following document is applicable:
More informationMANUAL RFID Supervisor
FACTORY AUTOMATION MANUAL RFID Supervisor Configuration software for IDENTControl interfaces and UHF read / write heads With regard to the supply of products, the current issue of the following document
More informationASCII Code - The extended ASCII table
ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage
More informationNC-1200 BARCODE SCANNER. Configuration Guide - 1 -
NC-1200 BARCODE SCANNER Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up the parameter-i 3 1.3 How to set up the parameter II 4 1.4 Resetting
More informationVariables and data types
Programming with Python Module 1 Variables and data types Theoretical part Contents 1 Module overview 4 2 Writing computer programs 4 2.1 Computer programs consist of data and instructions......... 4 2.2
More informationUnit 3, Lesson 2 Data Types, Arithmetic,Variables, Input, Constants, & Library Functions. Mr. Dave Clausen La Cañada High School
Unit 3, Lesson 2 Data Types, Arithmetic,Variables, Input, Constants, & Library Functions Mr. Dave Clausen La Cañada High School Vocabulary Variable- A variable holds data that can change while the program
More informationRIO-47xxx USER MANUAL. By Galil Motion Control, Inc. Manual Rev. 1.0k
USER MANUAL RIO-47xxx Manual Rev. 1.0k By Galil Motion Control, Inc. Galil Motion Control, Inc. 270 Technology Way Rocklin, California 95765 Phone: (916) 626-0101 Fax: (916) 626-0102 Email: support@galilmc.com
More informationEE 109 Unit 2. Analog vs. Digital. Analog vs. Digital. Binary Representation Systems ANALOG VS. DIGITAL
EE 9 Unit Binary Representation Systems ANALOG VS. DIGITAL Analog vs. Digital The analog world is based on continuous events. Observations can take on any (real) value. The digital world is based on discrete
More informationUsing AutoInstall to Remotely Configure Cisco Networking Devices
Using AutoInstall to Remotely Configure Cisco Networking Devices First Published: November 28, 2005 Last Updated: May 4, 2009 AutoInstall enables remote, automatic configuration of networking devices.
More information3. Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1. ARes/ComNet
Anonymous number: 3 Provide the routing table of host H located in LAN E, assuming that the host s network interface is called i1 AResComNet 20172018 Rou destination Final exam : Version A in English Rou
More informationCSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc.
9 February 2011 CSE-1520R Test #1 [7F] w/ answers p. 1 of 8 CSE-1520R Test #1 Sur / Last Name: Given / First Name: Student ID: Instructor: Parke Godfrey Exam Duration: 45 minutes Term: Winter 2011 The
More informationCMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes
Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter
More informationNumber Systems II MA1S1. Tristan McLoughlin. November 30, 2013
Number Systems II MA1S1 Tristan McLoughlin November 30, 2013 http://en.wikipedia.org/wiki/binary numeral system http://accu.org/index.php/articles/18 http://www.binaryconvert.com http://en.wikipedia.org/wiki/ascii
More informationHOST MODE PROGRAMMING. > Matrix N Family
HOST MODE PROGRAMMING > Matrix N Family Datalogic Automation Srl Via Lavino, 265 40050 - Monte S. Pietro Bologna - Italy Matrix N Family Host Mode Programming Ed.: 10/2016 This manual refers to software
More informationCSE-1520R Test #1. The exam is closed book, closed notes, and no aids such as calculators, cellphones, etc.
9 February 2011 CSE-1520R Test #1 [B4] p. 1 of 8 CSE-1520R Test #1 Sur / Last Name: Given / First Name: Student ID: Instructor: Parke Godfrey Exam Duration: 45 minutes Term: Winter 2011 The exam is closed
More informationBD-6500BT Bluetooth 2D Barcode Scanner Configuration Guide
BD-6500BT Bluetooth 2D Barcode Scanner Configuration Guide V 2.1 Table of Contents 1 Getting Started. 3 1.1 About This Guide.. 3 1.2 Barcode Scanning.. 3 1.3 Factory Defaults.. 3 1.4 Pairing Cradle 4 1.5
More informationDLL2020. Software Configuration Manual
DLL2020 Software Configuration Manual DLL2020 SOFTWARE CONFIGURATION MANUAL DATALOGIC S.p.A. Via Candini 2 40012 - Lippo di Calderara di Reno Bologna - Italia DLL2020 Software Configuration Manual Ed.:02/2003
More informationS-Series Sensor ASCII Protocol v8.1.0
S-Series Sensor v8.1.0 Legend: ADR Node/Slave Address TIME STAT Status Byte ERR CTRL Control Byte SP # POS Position DATA TARG Target CHAR VEL Velocity OFF SN CODE PAR # Serial Number Security Code Parameter
More informationExercises Software Development I. 03 Data Representation. Data types, range of values, internal format, literals. October 22nd, 2014
Exercises Software Development I 03 Data Representation Data types, range of values, ernal format, literals October 22nd, 2014 Software Development I Wer term 2013/2014 Priv.-Doz. Dipl.-Ing. Dr. Andreas
More informationPins 2, 3 - Baud rate select - Selects the baud rate for the serial transmission.
General The CSI Model DB1000 Decoder is available in a PLCC-44 pin package. The list below describes the function of each pin. The basic connection schematic shows connections that are common to all configurations.
More informationRS-232 Control of the Advantage DRI
RS-232 Control of the Advantage DRI Biamp Systems, 14130 N.W. Science Park, Portland, Oregon 97229 U.S.A. (503) 641-7287 an affiliate of Rauland-Borg Corp. Introduction This document contains technical
More information2D Barcode Reader User Guide V 1.2.1
2D Barcode Reader User Guide V 1.2.1 Table of Contents 1 Getting Started... 3 1.1 About This Guide... 3 1.2 Barcode Scanning... 3 1.3 Factory Defaults... 3 1.4 Firmware Version Number... 3 2 Communication
More informationHardware. ( Not so hard really )
Hardware ( Not so hard really ) Introduction to Computers What is a computer? Why use a computer anyway? Do they have limitations? What s next? A bit of history Mechanical Early 1614 1643 1673 Abacus Slide
More informationFundamental Data Types
Fundamental Data Types Lecture 4 Sections 2.7-2.10 Robb T. Koether Hampden-Sydney College Mon, Sep 3, 2018 Robb T. Koether (Hampden-Sydney College) Fundamental Data Types Mon, Sep 3, 2018 1 / 25 1 Integers
More information8.2 User Defined Protocol Communication
8.2 User Defined Protocol Communication 8.2.1 Introduction User Defined Protocol Communication allows users who do communication between GM7 Basic Unit and other kind of device to define the other company
More informationChapter 1. Hardware. Introduction to Computers and Programming. Chapter 1.2
Chapter Introduction to Computers and Programming Hardware Chapter.2 Hardware Categories Input Devices Process Devices Output Devices Store Devices /2/27 Sacramento State - CSc A 3 Storage Devices Primary
More informationSerial Communication. Transmit. Receive To EECC250 - Shaaban. From Universal Asynchronous Receiver/Transmitter (UART) Parity Bit
Parity Bit ASCII Character From 68000 Transmit Transmitter Buffer (TB) Serial Communication Receive To 68000 ASCII Character Parity Bit To device Parity Bit ASCII Character Receiver Buffer (RB) Universal
More informationFirst Data U.S. Debit Test Card Set. Version 1.20
First Data U.S. Debit Test Card Set August, 2016 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from
More informationBARCODE SCANNER. Configuration Guide - 1 -
BARCODE SCANNER Configuration Guide - 1 - Table of Contents Chapter 1 System Information 1.1 About this manual 3 1.2 How to set up the parameter 3 1.3 How to set up the parameter - II 4 Chapter 2 System
More informationIntroduction to Decision Structures. Boolean & If Statements. Different Types of Decisions. Boolean Logic. Relational Operators
Boolean & If Statements Introduction to Decision Structures Chapter 4 Fall 2015, CSUS Chapter 4.1 Introduction to Decision Structures Different Types of Decisions A decision structure allows a program
More informationLecture 13 Serial Interfaces
CPE 390: Microprocessor Systems Spring 2018 Lecture 13 Serial Interfaces Bryan Ackland Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken, NJ 07030 Adapted from HCS12/9S12
More information