Software Handshake Protocol - HP 82718A Expansion Pod Reference Manual

For use with the hp-75
Hide thumbs Also See for HP 82718A Expansion Pod:
Table of Contents

Advertisement

lced
you
the
igiL
is that
eful to
ication,
cannot
'er, the
because
and the
am will
between
it puts a
tao
j
(NEW)
h.aracters
ltax of a
(together
preceded
elow;
PM
Software Usage and Examples
eM
command[,command,
0"
,command]
~~
or
~M
command [ , command, ... , command],
~~
For a single command, this simplifies to
9.M
corrm:::md
~R.
Some examples are shown below:
{
%G a,E
1
,F 3,A
PR
%G a,E
1
,F 3,A,9ft
Two characters will abort the command string if they appear anywhere between the
~M
and the
tR:
!~$
(backspace-ASCII 8 or control-H) and
~AN
(cancel-ASCII 24 or control-X). All characters after the
:ij$
or
9~~
and before the
9.~
will be ignored (neither executed nor transmitted).
NOTE
If you incorrectly type a low-level modem command using a terminal
program, the modem will respond with \ %ABORT followed by %OK (or \ "/.A
followed by
%4
for short responses). The modem will continue to treat all
subsequent characters as part of the aborted command until it receives a
carriage return. Therefore, if you type a low-level command incorrectly,
press [RTN] before trying to repeat the command.
Each command consists of the command name followed by any parameters. The exact syntax of each
command is listed in the "Low-Level Modem Command Dictionary".
Commands can be upper- or
lowercase. If a command requires a parameter, all characters from the first character of the command
name up to the first space are ignored.
For example, several equivalent representations of the
G
(GIVEBACK) command are:
G 0
GI 0
giveback 0
GivethedatabacktotheHP-75
a
If you need to send the command character as data, see "Sending Command Characters as Data" later in
this section.
Software Handshake Protocol
Software handshakes are used for controlling the flow of information between the modem and another
computer.
They prevent problems that could arise from the increased use of time-sharing and
multitasking on computer networks. If the remote computer is temporarily busy, it needs a method to
31

Advertisement

Table of Contents
loading

Table of Contents