Pacific Research Solutions PET-820 User Manual

Page 14

Advertising
background image

Pacific Research

PET-820 User Manual

Page 13

3.3

OPERATING COMMAND FORMAT

All operating commands contain four parts. The first part [Command Code] defines the function that is to be executed. The
second part [Key Code] is used as a security function within the operating command codes. The third part [User Data] is the
new information that replaces the previous information in the appropriate command code memory location. The data
information is not always required. Refer to each command for details. The fourth part [#] identifies the end of the command
string. This works in the same manner as the ENTER key on a computer keyboard. The following is an example of a typical
operating command:

COMMAND SYNTAX:

[Command Code] [ Key Code] <User Data> #

The user data may be optional or required in
certain commands.

Throughout this section the following punctuation will be used to identify the syntax of all command codes.

WHERE:

#

= Enter (end of data string).

*

= Clear (start command over again).

[ ]

= Prompts user for missing parameters.

< >

= Prompts user for optional parameters.

3.4

TELEMETRY READ BACK

Once the user has issued an operating command, the PET-820 will read back the current condition of that operation in
standard English speech. You can also read back the current condition of any command code data by not entering the user
data. Examples of this are shown in the command read back syntax.

3.5

PASSWORD

The password is an individualized code that enables you to gain access to the system. The system will respond in standard
English speech when the password is excepted. A password is required in order to issue any of the following commands.
First, in applications where telephone communication has been established through the PET-820 via the local telephone port
and when the system has not answered the original call, the password can be used to force the PET-820 to establish
communication and disconnect the auxiliary telephone port. The default password code is 321 and can be changed through
programming. Once this code is changed, the default code will no longer work (reference the programming section of this
manual for further details on changing the password code). When attempting to send a password, the PET-820 keeps track of
the number of times that the wrong password is sent and will terminate the telephone call if this count exceeds the maximum
number errors allowed (see the programming section for more details in changing this counter).

COMMAND CODE:

60

COMMAND SYNTAX:

60 [Password] #

WHERE:

Password = Current password code

EXAMPLE:

60 321 # = Will enable the system to except additional commands.

DEFAULT:

60 321 #

3.6

KEY CODE

Once a password has been issued, the user is ready to operate the system. All operating commands require a key code in
order to operate properly. The purpose of the key code is to maintain a second level of security for system access. Like the
password, the key code is also programmable and may be changed at any time.

DEFAULT KEY CODE:

11

Advertising