TK-90
8
6-3. Programming
1. Run the PC firmware programming software (Fpro.exe).
2. Set the communication baud rate to 19,200 bps. (Do not
use other baud rates, as they cannot be used for commu-
nications.)
3. Select the new firmware file.
4. While press the [ ] key, turn the transceiver power on.
Then release the [ ] key, “PROG 19200” will appear on
the transceiver display.
5. Confirm the connection between the transceiver and the
PC.
6. Press the “Write” button on the PC screen. “PG” will
appear on the transceiver display when data reception be-
gins.
7. When data reception has completed, the transceiver will
calculate the checksum and indicate the results.
8. To repeat the data writing process on additional transceiv-
ers, repeat steps 4 to 7.
Notes:
• The TK-90 hardware can use only a baud rate of 19,200
bps for communications.
• The transceiver baud rate cannot be changed.
• A communication error where occur and programming
cannot be performed if the firmware programming soft-
ware (Fpro.exe) is set to a baud rate other than 19,200
bps.
• It takes approximately 2 1/2 minutes to reprogram a single
transceiver.
6-4. Function
1. While “PROG 19200” appears on the display, you can cal-
culate the checksum by pressing the [ ] key. The results
will be indicated on the display.
2. While the checksum results are displayed, press the [ ]
key again to return the display to “PROG 19200”.
7. Clone Mode
Memory channel data can be transferred from one radio to
another by connecting them via their MIC connectors. The
operation is as follows (the transmit radio is the source and
the receive radio is a target).
The “password” of description by explanation of 1. to 6.
are “Read Authorization Password”.
1. Turn the source transceiver power ON with the [ ] key
held down. The transceiver displays “CLONE”.
2. Power on the target transceiver.
3. Connect the cloning cable (part No. E30-3382-05) to the
MIC connectors on the source and target.
4. Press the [ ] key on the source while the source displays
“CLONE”. The data of the source is sent to the target.
While the target is receiving the data, “PROGRAM” is dis-
played. When cloning of data is completed, the source
displays “END”, and the target automatically operates in
the User mode. The target can then be operated by the
same memory channel as the source.
SJPK=
NK
!"#$%&'$
=EcéêçKÉñÉF
OK
!"#$%
NVIOMM=Äéë
E
!"#$%&'()*
!"#
F
PK
!"#$#%
QK
=x
z=
!"#$%&'()*+,-"
=x
z=
!
!"#$%&'(
mold=NVOMM
RK
!"#$%&'$()*+
SK
!"#$%
=
!
=
!"#$%&'()*+,
!"#$%
=
md
TK
!"#$%&'()*+,-./0123456
UK
!"#$%&'()*+,-./012)*34
Q
T
qhJVM
!"#$
NVIOMM=Äéë
!"#$%
!"#$%&'()
!"#$!
=EcéêçKÉñÉF=
NVIOMM=Äéë
!"
!"#$%&'()*+,-./
!"#$%&'()*+,
OKR
SJQK=
NK
!"#
=
mold=NVOMM
=
!"#
=x z=
!"
!"#$%&!'(
OK
!"#$%&'()
= x
z=
!"#$%
=
mold
NVOMM
TK=
!
jf`
!"#$%&'()*+$,-./01
!"#$%&'( !")*+,-./
=E
!"# $
F
NúS
!
=
!
=
=
!"#$%&
NK
=x z=
!"#$%&'()*"#$%&+,
=
`il
kb
OK
!"#$%&'()
PK
!"
=E
bPMJPPUOJMRF=
!"#$%&'(
jf`
!"
QK
!"#$%
=
`ilkb
=
!"#$%&'(
= x z
!"#$%&'()*+,-.!"#$%
!"#$%&'()*+,-
=
moldo^j
!"
!"#$%&'()*
=
bka
!"#$%&'()
!"#$%&'()*+,-./012()*+,
!"#$%&'()
REALIGNMENT /
!