![Imagine Panacea Lite Operation Manual Download Page 59](http://html1.mh-extra.com/html/imagine/panacea-lite/panacea-lite_operation-manual_2045417059.webp)
Chapter 4
P12×1-SP Installation, Configuration, and Operation
40
Copyright © 2004-2007, 2008, 2010, Harris Corporation
References
The following reference was used for implementing the protocol translation:
Grass Valley General Purpose Interface Terminal/Computer Interface (TC/I) Manual
RS-232/RS-422
Jumper Orienta-
tion
Figure 4-9
shows the proper orientation for the RS-232 and RS-422 jumper. (See
Figure 4-6
on page 34 for an illustration of the pin 1 reference point location.)
Preset Take
Presets the Take of the source to the destination on the
levels selected that are controlled by the GVG Horizon
router.
Preset Clear
Clears all Presets previously entered but not yet
executed.
Preset Execute
Takes/executes all Presets previously entered.
Preset Status Request
Looks through all previously entered Presets for the
destination and levels requested, and returns the status
of any Preset that affects that destination and level.
Frame Size
Reports the highest valid destination number and source
number for a level.
Frame Size Request
Requests the highest valid destination number and
source number for a level.
*
The GVG Horizon treats all commands received from the serial port as if they came from one device.
The Protect feature as implemented by GVG does not actually Protect one Harris device from switching
a destination protected by another. Therefore, the LXYTOTSLUMD will assume that any destination
being reported by the Horizon as Protected is actually Locked from the Harris point of view and all
switch requests on that destination will be turned down until it is unprotected. In this fashion, the GVG
Horizon Protect feature is being implemented as a Lock on the Harris control system. Therefore, both
Lock and Protect requests coming from Harris devices end up operating as if the request was for a Lock.
From a GVG control panel’s point of view (a control panel connected to the GVG Horizon), the
destination will be Protected by the serial port. Since a Protect placed by one device actually looks like a
Lock from another device’s point of view, the destination will look as if it is Locked from the GVG
control panels as well.
Table 4-3
Added Features
Feature
Description