Machine to machine connections, Serial connection other, Serial connection – Perle Systems DS1 User Manual

Page 35: Other

Advertising
background image

Machine To Machine Connections

Configuring the Device Server 35

Serial Connection

You also need to know the serial interface specifications as follows:

z

EIA-232 and its speed

z

EIA-422 and its speed

z

EIA-485 and

its speed

half duplex with/without echo suppression or full duplex

TX driver control is automatic or RTS

Other

The most important thing to keep in mind when configuring the hardware parameters is to make sure
that they are consistent with the serial device you have connected to the port. So, if you are
connecting to a modem that sends out a DSR signal, you probably want to turn the

Monitor DSR

option on. Following is a list of just some of the other hardware configuration options:

z

Data Bits—5 to 8

z

Stop Bits—1, 1.5, 2

z

Monitor DSR—on, off

z

Monitor DCD—on, off

z

Parity—None, Odd, Even, Space, Mark

z

Flow—Software, Hardware, or None

Machine To Machine Connections

If you are using the Device Server to connect two hosts, allowing data to flow freely between them,
you just need to configure the

Server

and the

Line

(no

User

required). In the following example, the

serial device is a security Card Reader that needs to transmit and receive information to/from a host
on the network that maintains the Card Reader’s application every time an employee uses an access
card to attempt to gain entry to the company.

Network

Device Server

Card

Reader

Security

pe
rle

After configuring the

Server

parameters (

Server Name

,

IP Address

,

Ethernet

and Serial interfaces,

etc.), the

Line Service

is set to

Sil Raw

, which creates an automatic, continuous connection between

the Card Reader and its associated application on the Security host (though the Device Server), by
specifying the Security host name (which must already be configured in the Device Server’s Host
Table) and TCP/IP port number. Therefore, the Card Reader can make a request to the Security host
card reader application for employee verification, also logging access time, employee name, etc., and
the Security host application can send back a code that does or does not unlock the door.

Advertising