Level mapping, Level mode, Locks – Grass Valley NV9000-SE v.3.0 User Manual

Page 382: Level mapping level mode locks, Idental changes. (see, Control panels

Advertising
background image

362

Rev 3.0 • 25 Mar 10

11. Control Panels

Panel Operation

Usually a ‘Level’ button displays 3 lines of text. The top line of text identifies the current source. If
the current destination had a breakaway take, the sources will be different across the set of ‘Level’
buttons. If the destination does not include a particular level, that button will be dark, but will dis-
play the level name. When a source is preset, prior to a take, the ‘Level’ buttons show the preset
source on the middle line of text. After a take, the ‘Level’ buttons show the new source on the top
line of text and on the XY status button. The bottom line of text always shows the level mnemonic.

Level Mapping

Level mapping is available in X-Y mode only. Level mapping enables the operator to map one level
to another level. Typically, level mapping is used for AES levels, for example, connecting level
AES1/2 to level AES3/4 (normally AES1/2 maps to AES1/2 only). To put it another way, level
mapping is a way to “remap” source virtual levels to different destination virtual levels rather than
to destinations on the same level as the source.

The operator can only map compatible signal (level) types. For example, you can map AES1/2 to
AES5/6, but not AES1/2 to HD. Level mappings are cancelled whenever the next normal “take” is
performed involving the selected devices.

For mapping between physical levels, see

Tielines

on page 457.

Level Mode

Level mode is available only in the NV9609 control panel. This button enables the user to scroll
between levels and perform breakaways. (See

About Breakaways

on page 359.)

Locks

A “lock” prevents anyone

even the user who issued the lock

from routing to the destination or

source. A “protect” prevents others from routing to a destination or source, but not the user who
created the protect. Locks and protects are useful for preventing accidental routes. For more infor-
mation on “protects,” see

Protect

on page 363.

Locking a destination prevents any user, including the control panel’s owner, from switching the
locked source to any other device. Similarly, locking a source prevents any user, even the control
panel owner, from routing from a source device to any locked destination. When locked, the button
displays ‘Unlock’ to indicate that pressing it unlocks the destination. When unlocked, the button
displays ‘Lock’ to indicate that pressing it locks the destination.

Locks are applied by an “owner” of a control panel. The owner is identified by the User Name.
Depending on the control panel, users of other control panels, when a device is locked a “+”
appears in the ‘Preset’ column in the display area. The user can press

Info

to learn which user

applied the lock. (See

Information

on page 361.) If a lock was applied by the current user of a con-

trol panel, no “+” displays. To remove a lock applied by another user, Forced Release mode must
be enabled. For instructions, see

Force Release

on page 360.

The

Dest Lock

and

Lock

buttons are toggles. In addition to having a “lock” button on the control

panel, Lock mode must be enabled in the Panel Options (‘Enable Source Lock’; ‘Enable Destina-
tion Lock’). See

Adding a Control Panel

on page 240.

Advertising
This manual is related to the following products: