SOFTWARE CONFIGURATION
125
7
2. Run the application and monitor the output data from the DL.CODE Console or a
configured channel terminal.
The Reading Mask shows which device reads which Expected Code. The mask is
composed of a fixed 32-character string (0=No Read or 1=Read) representing the 32
possible readers in an ID-NET network. The Master is the last character in the string (first
character to the right). The Slaves are shown in order from right to left (1 to 31).
Example
: Slave 1 = 00000000000000000000000000000011
The figure above shows the Master reading Code 128 and Slave 1 reading Code 39.
3. After verifying correct functioning of the reading devices, return the Expected Code fields
from Reading Mask to Code Content.
4.
If you haven’t made any other changes you can exit without saving. Otherwise, save the
Master device configuration overwriting its previous one, making sure to save
without
Clone Master Configuration on Slaves
, otherwise the Slave configurations will be
overwritten.
Reading Mask
Output Data
Содержание Matrix 210N
Страница 1: ...REFERENCE MANUAL Matrix 210N...
Страница 76: ...MATRIX 210N REFERENCE MANUAL 64 4 Figure 46 ID NET Network Connections with isolated power blocks...
Страница 77: ...CBX ELECTRICAL CONNECTIONS 65 4 Figure 47 ID NET Network Connections with Common Power Branch Network...
Страница 78: ...MATRIX 210N REFERENCE MANUAL 66 4 Figure 48 ID NET Network Connections with Common Power Star Network...
Страница 82: ...MATRIX 210N REFERENCE MANUAL 70 4 Figure 52 NPN External Trigger Using Matrix 210N Power NPN...
Страница 131: ...SOFTWARE CONFIGURATION 119 7 ID NET Slave 2 ID NET Master ID NET Slave 1...
Страница 133: ...SOFTWARE CONFIGURATION 121 7 Open the cloned application job...
Страница 167: ......