Introduction
CTS.............................................................................................45
RS-422 PIN Assignments RJ-45 Connector......................45
RS-422 Port Operation.......................................................45
Transmit Data (TXD-A), PIN 1...................................................45
Transmit Data (TXD-B), PIN 2...................................................45
Receive Data (RXD-A), PIN 3....................................................45
Receive Data (RXD-B), DCD Input............................................46
CABLES.............................................................................46
To PC 9-pin COM: port..............................................................46
EtherPath-X4 to PC crossover ethernet cable..............................46
.................................................................................46
Appendix C
Programming..........................................................47
Introduction........................................................................47
Description and Behavior...................................................47
Ports used by the EtherPath................................................47
Server Mode.......................................................................48
Transmit Conditions....................................................................48
Locking Avoidance Mechanism.........................................48
When in Raw Server mode:.........................................................48
Application Notes...............................................................49
Appendix D
AT Command Summary........................................50
AT Commands....................................................................50
AT Command Responses...................................................50
AT Command Operation ...................................................50
Appendix E
Open Source Software Information......................51
Introduction........................................................................51
Obtaining the Source Code.................................................51
v