76
NSM-8×1AES/NSM-7×2AES Installation and Operation Manual
Preliminary—Contents are proprietary and confidential. Do not photocopy or distribute.
Appendix B: Resource Module X-Y Network Communication
Examples
Table B-14
shows a typical
Lock
command and describes the resulting
action and response that takes place.
Parameters
<Lvl>
Level number (0–9, A–F)
<Dest>,
Destination number (0 – FFF0)
<ID>
Device ID for the requesting
device’s ID (valid ID numbers are in
hex = 0–9, A– F)
1
Reports the Lock established
Table B-14.
Typical Command Examples
Command Sent
Action
@ W:7/A,1B,1
Level 7, Destination 10 (1A hex) is locked by
Device ID 27 (1B hex)
@ W:7/A,1B,2
Level 7, Destination 10 (1A hex) is protected
by Device ID 27 (1B hex)
@ W:7/A,1B,0
Level 7, Destination 10 (1A hex) is unlocked
by Device ID 27 (1B hex)
Response
Description
W!1A,1B,1
Destination 10 on Level 7 is locked by device
ID 27
Table B-13.
Lock/Protect
Response Syntax
(Continued)
Response Syntax
Element
Syntax Format Description