Fire-Lite P K-411UD Windows-Based Off-Line Programming Utility User Manual
Page 5
Document 50802 Rev. B 1/5/99 P/N: 50802:B
5
Table of Contents
CHAPTER 6: Communications ................................................................................................................... 46
6.1: Download to Communicator ....................................................................................................................... 46
FIGURE 6-1: Downloading ................................................................................................................. 46
FIGURE 6-2: Download Connection Status ........................................................................................ 46
6.1.1: Download with Callback Enabled..................................................................................................... 47
6.1.2: Download with Callback Disabled.................................................................................................... 47
6.2: Upload from Communicator ....................................................................................................................... 48
FIGURE 6-3: Uploading...................................................................................................................... 48
FIGURE 6-4: Upload Connection Status............................................................................................. 48
FIGURE 6-5: Upload Filename ........................................................................................................... 49
6.2.1: Converting an Upload File to a Download File ................................................................................ 49
FIGURE 6-6: Customer Window - Recall File.................................................................................... 49
FIGURE 6-7: Customer Site Information ............................................................................................50
FIGURE 6-8: Filename Selection ........................................................................................................ 50
FIGURE 6-9: Current Information Selection....................................................................................... 51
FIGURE 6-10: Customer Window - Recall File.................................................................................. 51
6.3: Communicator Time.................................................................................................................................... 52
FIGURE 6-11: Communicator Time ................................................................................................... 52
6.4: Troubleshoot................................................................................................................................................ 52
FIGURE 6-12: Troubleshoot Window for the 411UD ........................................................................ 52
FIGURE 6-13: Troubleshoot Window for the 411UDAC................................................................... 53
6.5: Automatic Download .................................................................................................................................. 53
FIGURE 6-14: Automatic Download Window for the 411UD ........................................................... 54
FIGURE 6-15: Automatic Download Window for the 411UDAC...................................................... 54
FIGURE 6-16: View Log..................................................................................................................... 55
CHAPTER 7: Secret Code.......................................................................................................................... 56
FIGURE 7-1: Secret Code ................................................................................................................... 56
CHAPTER 8: Utilities - Compare ................................................................................................................ 57
FIGURE 8-1: Compare ........................................................................................................................57
FIGURE 8-2: Compare File Selections ............................................................................................... 58
FIGURE 8-3: View Comparison.......................................................................................................... 58
8.1: Quick View of Differences .......................................................................................................................... 59
FIGURE 8-4: Quick View Compare.................................................................................................... 59
8.2: Detailed View of Differences ...................................................................................................................... 60
FIGURE 8-5: Detailed View of Compare............................................................................................60
CHAPTER 9: Security Features.................................................................................................................. 61
9.1: Secret Code ................................................................................................................................................. 61
FIGURE 9-1: Secret Code ................................................................................................................... 61
FIGURE 9-2: Downloading Secret Code............................................................................................. 61
9.2: Panel Callback.............................................................................................................................................62
9.3: Digital Communicator Time-out ................................................................................................................. 62
9.4: Error Checking ............................................................................................................................................ 63
9.5: Central Station Acknowledge...................................................................................................................... 63
9.6: Password Protection .................................................................................................................................... 63