Pacific Research Solutions RI-200 User Manual

Page 59

Advertising
background image

Pacific Research Solutions

RI-200 User Manual

Page 58

1.

Un-lock the controller with your password.

2.

Send “63 152” and un-key, you should hear a function complete CW “OK”. This will set the macro start line pointer to
line 152.

3.

Send “64 A1 01 1” and un-key, you should hear a function complete CW “OK”. 64 is the macro editor command. A1 is
the address of the controller that will execute the following S-Command. 19 is the CTCSS decode table control S-
Command. . 01 is the system mode S-Command. 1 is the repeater COS access S-Command data.

4.

Send “64” and un-key, you should hear a function complete CW “OK”. 64 without data will tell the controller to insert a
“D” to identify the end of this macro.

5.

The data stored in the macro table at line 152 will look like “A1011CD”.

5.2

TELEPHONE COMMANDS

Telephone commands are the same a standard commands, but they allow a method to pass along a telephone number to be
checked by the accept and reject tables. The controller has 8 telephone commands available. Telephone commands are
processed just like standard commands but the repeater user can include a telephone number or auto dial number along with
the name. The telephone number that is entered with this command will be checked by the accept and reject table before it is
allowed to be executed. In the macro data memory, the telephone off-hook S-Command 82 must be included for the
command to operate correctly. On-hook S-Command 820 do not have to be processed by a telephone user command. This
type of command is better placed in a standard user command as it does not require telephone number information.

5.3

USER S-COMMANDS

Think of user S-Commands as just renaming an S-Commands. In the RI-200, you have 21 user S-Commands available. User
S-Commands are processed just like standard commands. User S-Commands can, but do not have to pass the data field to the
actual S-Command.

Use the user S-Commands for simple applications. Use standard commands for applications with multiple S-Commands.
The following example will allow a user to lock on the repeater transmitter for a set time.

1.

Un-lock the controller with your password.

2.

Send “61 02 1 05 21” and un-key, you should hear a function complete CW “OK”. 61 is the user S-Command. The 01
is the user S-Command number. The 1 is the group number for this command. The 05 is the force PTT on for x time
S-Command. The 21 is the name of the user S-Command.

3.

Send “69” and un-key, you should hear a function complete CW “OK”. This locked the controller

4.

Send “22 15” and un-key, you should hear a function complete CW “OK”. Next you should notice that the repeater
transmitter will stay keyed for 15 seconds. The 22 is the name of the user S-Command and the 15 was the data that is
passed to S-Command 05.

5.

You now have a user command to force on the repeater transmitter.

5.4

PROGRAMMING CW MESSAGE

CW messages are Morse code messages like the station ID, courtesy tones and system telemetry. The messages consist of
tone generator or CW commands in sequence. Each of these commands consist of a 3 digit value and are used to tell the RI-
200’s tone generator what to do. These commands include setting the tone frequency, CW code speed, CW character, beeps
and pauses. The messages are stored in the same memory area as macros. For this reason, it is important to manage and
track the memory usage as not to damage other data stored in the memory. Once a message is stored, it can be triggered for
playback. This is done with the message triggers (S-Command 32). Messages can also be imbedded directly inside a macro.

There are two types of messages. First, messages that stand by themselve and are triggered by events within the controller.
These messages include the ID and courtesy tones. The second type of message is one that is imbedded within a macro.
These are messages with S-Commands in the same memory segment or macro.

Advertising