Chapter 7
Appendix — Technical information
256 - ENGLISH
Control commands via LAN
The projector can be controlled via the <DIGITAL LINK> terminal or the <LAN> terminal by using the control
command format via the <SERIAL/MULTI SYNC IN> terminal.
For examples of the available commands, refer to “Control command” (
x
page 262).
Note
f
To send/receive the command via LAN, it is necessary to set the password of the administrator account. (
x
page 169)
When connecting in protect mode
Connecting
Following is the connection method when the [NETWORK] menu
→
[NETWORK SECURITY]
→
[COMMAND
PROTECT] is set to [ENABLE].
1) Obtain the IP address and port number (Initial set value = 1024) of the projector and request a
connection to the projector.
f
You can obtain both the IP address and the port number from the menu screen of the projector.
IP address
Obtain from the [NETWORK] menu
→
[NETWORK STATUS].
Port number
Obtain from the [NETWORK] menu
→
[NETWORK CONTROL]
→
[COMMAND PORT].
2) Check the response from the projector.
Data section
Blank
Mode
Blank
Random number section
Termination
symbol
Command
example
“NTCONTROL”
(ASCII string)
‘ ’
0x20
‘1’
0x31
‘ ’
0x20
“zzzzzzzz”
(ASCII code hex number)
(CR)
0x0d
Data length
9 bytes
1 byte
1 byte
1 byte
8 bytes
1 byte
f
Mode: 1 = Protect mode
f
Example: Response during protect mode (random number section is undefined value)
“NTCONTROL 1 23181e1e” (CR)
3) Generate a 32-byte hash value from the following data using MD5 algorithm.
f
“xxxxxx:yyyyy:zzzzzzzz”
xxxxxx
The user name for the administrator account
yyyyy
The password for the administrator account
zzzzzzzz
8-byte random number obtained in Step
2)
Command transmission method
Transmit using the following command formats.
r
Transmitted data
Header
Data section
Termination
symbol
Command
example
Hash value
“Connecting” (
x
page 256)
‘0’
0x30
‘0’
0x30
Control command
(ASCII string)
(CR)
0x0d
Data length
32 bytes
1 byte
1 byte
Undefined length
1 byte
f
Example: Transmission of power supply status acquisition command (hash value is calculated from the user
name and password of the administrator account, and acquired random number)
“dbdd2dabd3d4d68c5dd970ec0c29fa6400QPW” (CR)