Crimson User Manual

Crimson User Manual

LP0577 CRIMSON 2 USER MANUAL Copyright © 2003-2006 Red Lion Controls. All Rights Reserved Worldwide. The information contained herein is provided in good faith, but is subject to change without notice. It is supplied with no warranty whatsoever, and does not represent a commitment on the part of Red Lion Controls. Companies, names and data used as examples herein are fictitious unless otherwise stated. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, without the express written permission of Red Lion Controls All trademarks are acknowledged as the property of their respective owners. Written by Mike Granby and Jesse Benefiel. TABLE OF CONTENTS TABLE OF CONTENTS GETTING STARTED ........................................................................................... 1 SYSTEM REQUIREMENTS ..................................................................................... 1 INSTALLING THE SOFTWARE................................................................................. 1 CHECKING FOR UPDATES..................................................................................... 1 INSTALLING THE USB DRIVERS ............................................................................ 2 CRIMSON BASICS............................................................................................. 3 MAIN SCREEN ICONS ......................................................................................... 3 COMMUNICATIONS............................................................................................................................3 DATA TAGS.....................................................................................................................................3 USER INTERFACE..............................................................................................................................4 PROGRAMMING ................................................................................................................................4 DATA LOGGER .................................................................................................................................4 WEB SERVER...................................................................................................................................4 SECURITY MANAGER .........................................................................................................................4 SELECTING A TERMINAL...................................................................................... 5 USING BALLOON HELP........................................................................................ 5 WORKING WITH DATABASES ................................................................................ 5 DOWNLOADING TO A TERMINAL ............................................................................ 6 CONFIGURING THE LINK.....................................................................................................................6 VERIFYING THE USB LINK ..................................................................................................................6 SETTING THE IP ADDRESS..................................................................................................................7 SENDING THE DATABASE ....................................................................................................................7 EXTRACTING DATABASES....................................................................................................................7 MOUNTING THE COMPACTFLASH ..........................................................................................................8 FORMATTING THE COMPACTFLASH........................................................................................................9 SENDING THE TIME AND DATE.............................................................................................................9 UPDATING VIA COMPACTFLASH............................................................................. 9 GURU MEDITATION CODES ................................................................................ 10 CONFIGURING COMMUNICATIONS..................................................................... 11 SERIAL PORT USAGE........................................................................................ 11 SELECTING A PROTOCOL ................................................................................... 12 PROTOCOL OPTIONS........................................................................................ 12 WORKING WITH DEVICES.................................................................................. 13 ETHERNET CONFIGURATION............................................................................... 13 IP PARAMETERS.............................................................................................................................14 IP ROUTING .................................................................................................................................14 PHYSICAL LAYER ............................................................................................................................14 REMOTE UPDATE............................................................................................................................14 PROTOCOL SELECTION.....................................................................................................................14 SLAVE PROTOCOLS .......................................................................................... 15 SELECTING THE PROTOCOL ...............................................................................................................16 ADDING GATEWAY BLOCKS ...............................................................................................................16 ADDING ITEMS TO A BLOCK ..............................................................................................................17 ACCESSING INDIVIDUAL BITS ............................................................................................................17 REVISION 9 PAGE I TABLE OF CONTENTS CRIMSON USER MANUAL PROTOCOL CONVERSION ................................................................................... 18 MASTER AND SLAVE ........................................................................................................................18 MASTER AND MASTER......................................................................................................................18 WHICH WAY AROUND?....................................................................................................................19 DATA TRANSFORMATION ................................................................................... 19 NOTES FOR EDICT USERS .................................................................................. 19 ADVANCED COMMUNICATIONS ......................................................................... 21 USING EXPANSION CARDS ................................................................................. 21 SHARING SERIAL PORTS.................................................................................... 22 ENABLING TCP/IP..........................................................................................................................22 SHARING THE REQUIRED PORT..........................................................................................................22 CONNECTING VIA ANOTHER PORT ......................................................................................................22 CONNECTING VIA ETHERNET .............................................................................................................23 PURE VIRTUAL PORTS .....................................................................................................................24 LIMITATIONS.................................................................................................................................25 USING ELECTRONIC MAIL .................................................................................. 25 CONFIGURING SMTP ......................................................................................................................25 CONFIGURING SMS ........................................................................................................................27 THE ADDRESS BOOK .......................................................................................................................28 WORKING WITH MODEMS.................................................................................. 28 SOME TYPICAL APPLICATIONS ...........................................................................................................29 ADDING A DIAL-IN CONNECTION........................................................................................................30 ADDING A DIAL-OUT CONNECTION .....................................................................................................32 ADDING AN SMS CONNECTION..........................................................................................................33 SMS MESSAGE PROCESSING .............................................................................................................34 USING MULTIPLE INTERFACES ...........................................................................................................34 CHECKING THE

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    321 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us