TF1100-EC/EI Manual
66
second byte is insignificant (random 0 or 1).
②
Signal strength and signal quality: 8 bytes
(
ASCII code
)
, signal strength value is
4 bytes, the last byte is fractional part.
③
Redundancy check bits: 2 bytes
(
ASCII code
)
, it is the accumulative sum of former
10 bytes(with decimal additions accumulated) as redundancy check code in transmission
process.
For example: Master station Command 4
,
signal strength is 88.9
,
signal quality is 17.8,
it should send 34
,
30
,
30
,
38
,
38
,
39
,
30
,
31
,
37
,
38
,
34
,
35.
Note: accumulative sum is 45(should send 34, 35).
4.2.5.6 Answer Signal format for Master station Command 5
Command and symbol redundancy check bits
①
②
①
Command and symbol: 2 bytes, the first byte is Master station command 5; the
second byte is insignificant (random 0 or 1).
②
redundancy check bits: 2 bytes
(
ASCII code
)
, it is the accumulative sum of former
2 bytes(with decimal additions accumulated) as redundancy check code in transmission
process.
This command is used for clearing total flow of Slave station.
For example: Master station Command 5, it should send 35
,
30
,
36
,
35.
Note: accumulative sum is 65(should send 36, 35).
4.2.5.7 Answer Signal format for Master station Command 6
Command and symbol redundancy check bits
①
②
①
Command and symbol: 2 bytes, the first byte is Master station command 6; the
second byte is insignificant (random 0 or 1).
②
Redundancy check bits: 2 bytes
(
ASCII code
)
, it is the accumulative sum of former
2 bytes(with decimal additions accumulated) as redundancy check code in transmission
process.
This command is used for clearing total working time of Slave station.
For example: Master station Command 6, it should send 36
,
30
,
36
,
36.
Note: accumulative sum is 66(should send 36, 36).
5. KEY CODE
In a network environment, a key code is used to simulate the use of keys at the host device.
For example, the instruction “M1” is input through the serial port, which is equivalent to
pressing Key 1 on the keyboard of the TF1100 ultrasonic flowmeter. Thus all functions of
key operation can be completely implemented at the host device. All key codes are shown
in Table A-2.