Sunteți pe pagina 1din 337

&RS\ULJKW,QIRUPDWLRQ

This manual is © 1994 Dynapro Technologies Inc. All Rights Reserved.

Reproduction of the contents of this copyrighted manual in whole or in part, by any means,
electronic or mechanical, for any purpose, without written permission of Dynapro Technologies
Inc., is prohibited.

,PSRUWDQW8VHU,QIRUPDWLRQ
Because of the variety of uses for the product described in this publication, those responsible for
application and use of this product must satisfy themselves that all necessary steps have been
taken to ensure that each application and use meets all performance and safety requirements,
including any applicable laws, regulations, codes, and standards.

The illustrations, charts, sample programs, and examples shown in this publication are intended
solely for the purposes of example. Because there are so many variables and requirements
associated with any particular installation, Dynapro Technologies Inc. does not assume
responsibility or liability, including intellectual property liability, for actual use based on the
examples shown in this publication.

)&&&RPSOLDQFH
“Warning: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the instruction manual, may cause harmful interference to
radio communications. Operation of this equipment in a residential area is likely to cause
harmful interference, in which case the user will be required to correct the interference at his
own expense.”

“Any modifications or changes to this product not expressly approved in writing by the
manufacturer responsible for compliance to Federal Regulations could void the user’s authority
to operate this product within the Laws and Regulations of the Federal Communications
Commission.”

(GLWLRQ,QIRUPDWLRQ
Document Number: 80-0279
First Edition: July 1994
Second Edition: December 1994

7UDGHPDUNV
Dynapro and ErgoTouch are registered trademarks of Dynapro Systems Inc. All other brand and
product names are trademarks or registered trademarks of their respective companies and are
hereby acknowledged.
(UJR7RXFK7&6'RFXPHQWDWLRQ8SGDWHV
8SGDWH'XDO6FDQ3DVVLYH '63 &RORU/&'
This amends the information supplied in the ErgoTouch TCS Installation Guide, Second Edition,
December 1994. This information was originally published as Document 80-0437.
ErgoTouch’s DSP display has been enhanced. Specifications for the new display are:

• 256 colors
• Display size: 8.43” ( 21.4 cm) wide x 6.35” (16.1 cm) high
Diagonal: 10.4” (26.42 cm)
• Single backlight
• Contrast ratio: 30
• Viewing angle: horizontal: -30° to +30°
vertical: -15° to +25°

8SGDWH6HWXS3DUDPHWHU&KDQJH
This complements the information supplied in the ErgoTouch TCS Installation Guide, Second
Edition, December 1994. This information was originally published as Document 80-0463.
A new function (NO HOST) has been added to the “Display Activity” Setup parameter. In
addition to the ON, OFF and TIMEOUT selections, the user can now select NO HOST.
Selecting NO HOST causes the display to turn off automatically after 30 minutes of inactivity
(similar to the TIMEOUT selection). After the display has turned off (timed out), only activities
by the user will turn the display back on, (that is, touch or keystroke activities, but not the host’s
communications activities).
7DEOHRI&RQWHQWV

CHAPTER 1 GENERAL INFORMATION.......................................................................................... 1-1


OVERVIEW ............................................................................................................................................... 1-1
Features.................................................................................................................................................. 1-1
About This Guide.................................................................................................................................... 1-2
Related Documents................................................................................................................................. 1-2

CHAPTER 2 INTERFACING TO THE HOST COMPUTER............................................................ 2-1


INTRODUCTION ...................................................................................................................................... 2-1
The Serial Interface ................................................................................................................................ 2-1
Serial Data Composition ........................................................................................................................ 2-2
Communication Standards ..................................................................................................................... 2-5
RS-422 and RS-485 ................................................................................................................................ 2-8
Preventing and Detecting Errors ........................................................................................................... 2-9
Buffer Overflow Control......................................................................................................................... 2-9

CHAPTER 3 PROGRAMMING OVERVIEW .................................................................................... 3-1


INTRODUCTION ...................................................................................................................................... 3-1
RELATED ANSI STANDARDS................................................................................................................ 3-1
COMMUNICATION ENVIRONMENTS.................................................................................................. 3-2
COMMUNICATION CODES.................................................................................................................... 3-2
CHARACTER SETS .................................................................................................................................. 3-2
Control Codes......................................................................................................................................... 3-2
Graphic Codes........................................................................................................................................ 3-4
TCS COMMANDS..................................................................................................................................... 3-5
TYPES OF COMMANDS.......................................................................................................................... 3-5
Local Commands.................................................................................................................................... 3-5
Remote Commands ................................................................................................................................. 3-6
Local/Remote Commands....................................................................................................................... 3-6
CONTROL STRINGS ................................................................................................................................ 3-7
Simple Escape Sequences ....................................................................................................................... 3-7
Device Control Strings ........................................................................................................................... 3-7
Control Sequences.................................................................................................................................. 3-8
Control Sequence Parameters ................................................................................................................ 3-9
Numeric Parameters............................................................................................................................... 3-9
Selective Parameters ............................................................................................................................ 3-10
How the TCS Interprets Control Sequences ......................................................................................... 3-10
Canceling Control Strings.................................................................................................................... 3-11
Errors in Control Strings...................................................................................................................... 3-11
HOW TO GENERATE REMOTE COMMANDS ................................................................................... 3-12
STATUS REPORT SUMMARY.............................................................................................................. 3-13
Summary of Status Queries and Responses .......................................................................................... 3-13
SUMMARY OF SELECTABLE MODES ............................................................................................... 3-17
TCS MODE COMMANDS ...................................................................................................................... 3-19
Reset Mode Command [RM] (Remote) ................................................................................................ 3-20
Set Mode Command [SM] (Remote)..................................................................................................... 3-22
COLOR TCS: SUMMARY OF COLOR PROGRAMMING.................................................................... 3-24
Displaying and Erasing Color Characteristics .................................................................................... 3-24
Highlighting Color Characters ............................................................................................................ 3-24
Reversing Foreground and Background Colors .................................................................................. 3-24
Concealing Color Characters .............................................................................................................. 3-25
Reading a Character’s Attributes......................................................................................................... 3-25
Color Controls on the Setup Screen ..................................................................................................... 3-25

CHAPTER 4 CONTROLLING THE SETUP SCREEN AND SERIAL INTERFACE .................... 4-1
INTRODUCTION ...................................................................................................................................... 4-1
TCS FUNCTIONAL VOLATILITY .......................................................................................................... 4-1
SETUP SCREEN PROGRAMMING CONSIDERATIONS...................................................................... 4-5
Keyboard Lockout .................................................................................................................................. 4-5
Touch Panel Lockout.............................................................................................................................. 4-5
Display Activity ...................................................................................................................................... 4-5
Display Contents .................................................................................................................................... 4-5
Host Communication during Setup Session............................................................................................ 4-6
Methods of Changing Setup Parameters ................................................................................................ 4-6
Color TCS Setup Screen Programming Considerations......................................................................... 4-7
User/Host Conflict Resolution................................................................................................................ 4-8
Permanence of Changes to Setup Parameters........................................................................................ 4-9
SETUP SCREEN COMMANDS.............................................................................................................. 4-10
Setup Lockout Mode Command {FSULM} (Remote) ........................................................................... 4-11
Save Setup Command {FSSU} (Local/Remote) .................................................................................... 4-12
Recall Setup Command {FRSU} (Local/Remote) ................................................................................. 4-13
Reset Command [RIS] (Local Remote) ................................................................................................ 4-14
COMMUNICATION COMMANDS........................................................................................................ 4-16
Address Command (Local) ................................................................................................................... 4-17
Baud Rate Command (Local) ............................................................................................................... 4-20
Data Bits Command (Local)................................................................................................................. 4-21
Parity Enable Command (Local).......................................................................................................... 4-22
Parity Sense Command (Local)............................................................................................................ 4-23
Stop Bits Command (Local).................................................................................................................. 4-24
XON/XOFF Mode Command (Local)................................................................................................... 4-25
Local/Remote Mode Command (Local)................................................................................................ 4-27
Hardware Handshake (Local) .............................................................................................................. 4-28
Transmit Mode Command (Local)........................................................................................................ 4-29
Reporting Format Command {FRF} (Remote)..................................................................................... 4-30
Clear User Inputs Command {FCUI} (Remote) ................................................................................... 4-32
COMMUNICATION MONITOR ............................................................................................................ 4-33
Entering and Exiting the Communication Monitor .............................................................................. 4-33
How the Communication Monitor Displays Characters ...................................................................... 4-33
TCS Operation While the Communication Monitor is Active............................................................... 4-34
Using the Communication Monitor ...................................................................................................... 4-36

CHAPTER 5 DISPLAYING CHARACTERS ........................................................................................ 5-1


INTRODUCTION ...................................................................................................................................... 5-1
Displaying Characters............................................................................................................................ 5-1
The Cursor.............................................................................................................................................. 5-2
Format Effectors..................................................................................................................................... 5-3
OVERVIEW OF SCREEN MEMORY ....................................................................................................... 5-5
Introduction ............................................................................................................................................ 5-5
Referring to Screens ............................................................................................................................... 5-5
Selecting a Screen for Editing ................................................................................................................ 5-5
Screen Memory Allocation ..................................................................................................................... 5-6
Terminology: "Screen" vs. "Display" ..................................................................................................... 5-7
SCREEN MEMORY COMMANDS .......................................................................................................... 5-8
Initialize Screen Command {FIS} (Remote) ........................................................................................... 5-9
Select Screen Command {FSS} (Remote) ............................................................................................. 5-11
Copy Screen Command {FCS}(Remote)............................................................................................... 5-15
Delete Screen Command {FDS} (Remote) ........................................................................................... 5-17
Delete All Screens Command {FDAS} (Remote).................................................................................. 5-18
Read Screen Memory Remaining Command {FRSMR} (Remote)........................................................ 5-19
Read Screen Existence Command {FRSE} (Remote) ........................................................................... 5-21
OVERVIEW OF CHARACTER SETS AND CHARACTER FONTS .................................................... 5-23
Static ASCII and Static Special Character Fonts ................................................................................. 5-23
Dynamic Character Fonts .................................................................................................................... 5-23
Manipulating Character Sets and Fonts .............................................................................................. 5-24
Default Conditions ............................................................................................................................... 5-25
Volatility of the Dynamic Character Fonts .......................................................................................... 5-26
Select Character Set Command [SCS] (Remote) ................................................................................. 5-27
Map Character Font Command {FMCF} (Remote) ............................................................................. 5-29
Copy Character Font Command {FCCF} (Remote)............................................................................. 5-34
Down-Line Load Character Font Command {FDLCF} (Remote) ....................................................... 5-36
CHARACTER DISPLAYING COMMANDS.......................................................................................... 5-45
Color Features ..................................................................................................................................... 5-45
Display Double-Width Line Command {DECDWL} (Remote)............................................................. 5-46
Display Double-Size Line Command {DECDHL} (Remote) ................................................................ 5-47
Place Double-Size Line Command {FDSL} (Remote).......................................................................... 5-48
Display Normal Line Command (DECSWL) (Remote)......................................................................... 5-50
Draw Bar for Bar Chart Command {FDBB} (Remote) ........................................................................ 5-51
Erase Character Command [ECH] (Remote) ...................................................................................... 5-54
Erase in Line Command [EL] (Remote)............................................................................................... 5-55
Erase in Display Command [ED] (Remote)......................................................................................... 5-57
CHARACTER INTERPRETATION COMMANDS ............................................................................... 5-59
Auto Wrap-Around Mode Command (DECAWM) (Local/Remote)...................................................... 5-60
Send-Receive Mode Command [SRM] (Local/Remote) ....................................................................... 5-61
New Line Mode Command [LNM] (Local/Remote) ............................................................................. 5-62
NOCHANGE Attribute Mode Command {FNCAM} (Remote) ............................................................. 5-63
National Replacement Code Command {FNRC} (Local/Remote)........................................................ 5-67
Set Character Attributes Command [SGR] (Monochrome: Remote Color: Local/Remote)................. 5-73
Scrolling Region Command (DECSTBM) (Remote)............................................................................. 5-77
Origin Mode Command (DECOM) (Remote)....................................................................................... 5-79
CURSOR COMMANDS .......................................................................................................................... 5-82
Move Cursor to Absolute Position Command [CUP][HVP] (Remote)................................................ 5-83
Move Cursor to Touchkey Command {FMCTK} (Remote) .................................................................. 5-85
Move Cursor Forward Command [CUF] (Remote)............................................................................. 5-86
Move Cursor Backward Command [CUB] (Remote)........................................................................... 5-87
Move Cursor Up Command [CUU] (Remote)...................................................................................... 5-88
Move Cursor Down Command [CUD] (Remote)................................................................................. 5-89
Next Line Command [NEL] (Remote) .................................................................................................. 5-90
Index Command [IND] (Remote) ......................................................................................................... 5-91
Reverse Index Command [RI] (Remote)............................................................................................... 5-92
Read Cursor Position Command [CPR] (Remote)................................................................................ 5-93
Read Character Under Cursor Command {FRCUC} (Remote) ........................................................... 5-94
Read Attributes Under Cursor Command {FRAUC} (Remote) ............................................................ 5-96
Cursor Type Command [FCT] (Local/Remote) ................................................................................... 5-98
SCREEN APPEARANCE COMMANDS .............................................................................................. 5-100
Screen Background Mode Command (DECSCNM) (Local/Remote).................................................. 5-101
Display Activity Command {FDA} (Local/Remote)............................................................................ 5-102

CHAPTER 6 PROGRAMMING THE TOUCH PANEL .................................................................... 6-1


INTRODUCTION ...................................................................................................................................... 6-1
THE TOUCH PANEL ................................................................................................................................ 6-1
Touch Cells............................................................................................................................................. 6-1
Touchkeys and Touch Targets ................................................................................................................ 6-2
Touchkey Visual Extent .......................................................................................................................... 6-3
TOUCH REPORTING ............................................................................................................................... 6-5
TOUCH PANEL COMMANDS................................................................................................................. 6-6
Build Touchkey Command {FBTK} (Remote) ........................................................................................ 6-7
Clear Touchkey Command {FCTK}(Remote)......................................................................................... 6-9
Touchkey Type Command {FTKT}(Remote) ........................................................................................ 6-10
Touchkey Visual Extent Command {FTKVEJ}(Remote) ...................................................................... 6-12
Touchkey Audible Attribute Command {FTKAA}(Remote) .................................................................. 6-14
Auto-Repeat Rate Command {FARR} (Remote) ................................................................................... 6-16
Polled Touch Mode Command {FPTM} (Remote) ............................................................................... 6-18
Read Touchkey Status Command {FRTKS} (Remote) .......................................................................... 6-20
Extended Report Mode Command {FERM} (Remote).......................................................................... 6-22
Touch Panel Lockout Mode Command {FTLM} (Remote)................................................................... 6-24
REGION COMMANDS ........................................................................................................................... 6-25
Color Features ..................................................................................................................................... 6-25
Outline a Touchkey Command {FOTK} (Remote)................................................................................ 6-26
Outline a Region Command {FOR} (Remote) ...................................................................................... 6-28
Custom Outline a Touchkey Command {FCOTK} (Remote)................................................................ 6-30
Custom Outline a Region Command {FCOR} (Remote) ...................................................................... 6-32
Modify Character Attributes in a Touchkey Command {FMCAITK} (Remote) ................................... 6-34
Modify Character Attributes in a Region Command {FMCAIR} (Remote).......................................... 6-36
Reverse Character Attributes in a Touchkey Command {FRCAITK} (Remote) ................................... 6-38
Reverse Character Attributes in a Region Command {FRCAlR} (Remote).......................................... 6-40
Fill a Touchkey With a Character Command {FFTKC} (Remote)....................................................... 6-43
Fill a Region With a Character Command {FFRC} (Remote) ............................................................. 6-45
Erase a Touchkey Command {FETK} (Remote)................................................................................... 6-47
Erase a Region Command {FER} (Remote) ......................................................................................... 6-49

CHAPTER 7 PROGRAMMING THE OPTIONAL KEYBOARD .................................................... 7-1


INTRODUCTION ...................................................................................................................................... 7-1
KEYBOARD DESCRIPTION.................................................................................................................... 7-1
Standard Keys......................................................................................................................................... 7-1
The Set Up Key ....................................................................................................................................... 7-3
Cursor Control Keys............................................................................................................................... 7-3
Special Function Keys ............................................................................................................................ 7-5
Auxiliary Keypad .................................................................................................................................... 7-6
KEYBOARD COMMANDS ....................................................................................................................... 7-8
Keyboard Lockout Mode Command [KAM] (Remote)........................................................................... 7-9
Keypad Mode Command [DECKPAM] [DECKPNM] (Remote)......................................................... 7-10
Local/Remote Mode Command (Local)................................................................................................ 7-11

Send Long Break Command (Local) .................................................................................................... 7-12


Send Short Break Command (Local) .................................................................................................... 7-13

CHAPTER 8 REMOTE SELF-TESTING............................................................................................. 8-1


INTRODUCTION ...................................................................................................................................... 8-1
STATUS REPORTING COMMANDS...................................................................................................... 8-2
Power-Up Interrupt Mode Command {FPUIM} (Remote)..................................................................... 8-3
Request Power Status Command {FRPS} (Remote) ............................................................................... 8-4
Error Interrupt Mode Command {FEIM} (Remote) ............................................................................... 8-5
Request Error Status Command {FRES} (Remote) ................................................................................ 8-6
Request TCS Identification Command [DA] (Remote)........................................................................... 8-8
Request TCS Status Command [DSR] (Remote) .................................................................................. 8-10
REMOTE SELF-TEST COMMANDS..................................................................................................... 8-11
Continuous Integrity Test Command {FClT} (Local/Remote).............................................................. 8-12
Request ROM Test Report Command {FRRTR} (Remote) ................................................................... 8-14
Request Nonvolatile Memory Test Report Command {FRETR} (Remote) ........................................... 8-15
Request RAM Test Report Command {FRRATR} (Remote) ................................................................. 8-17
Request Touch Panel Test Report Command {FRTTR} (Remote) ........................................................ 8-19

APPENDIX A SAMPLE PROGRAM .................................................................................................. A-1


PROGRAM DESCRIPTION ..................................................................................................................... A-1
PHYSICAL CONNECTION ..................................................................................................................... A-1
Setting up the IBM PC............................................................................................................................A-1
Setting up the TCS ..................................................................................................................................A-1
The Sample Program..............................................................................................................................A-2

APPENDIX B COMMAND SUMMARY TABLE .............................................................................. B-1


INTRODUCTION ..................................................................................................................................... B-1

APPENDIX C CUSTOM CHARACTER FONTS............................................................................... C-1


INTRODUCTION ..................................................................................................................................... C-1
The Distinction Between Character Sets and Character Fonts............................................................. C-1
Creating Custom Characters Using Software or Firmware.................................................................. C-4
CHARACTER DESCRIPTION................................................................................................................. C-4
Description Of Static Character Fonts.................................................................................................. C-5
Boxtypes ................................................................................................................................................ C-7
HOW CHARACTERS ARE STORED...................................................................................................... C-8
Character Sizes...................................................................................................................................... C-9
PIXEL DATA .......................................................................................................................................... C-11
APPENDIX D IN CASE OF DIFFICULTY......................................................................................... D-1
INTRODUCTION ..................................................................................................................................... D-1
SYMPTOM/SOLUTION CHART ............................................................................................................ D-1
COMMON PROGRAMMING PROBLEMS ............................................................................................ D-8
Interaction Between Polled Touch Mode and the Read Touchkey Status Command ............................ D-9
Interaction Between Reporting Format and the End Of Line Character ............................................ D-10
Interaction Between Origin Mode and Scrolling Region .................................................................... D-11
Interaction Between NOCHANGE Attribute Mode and Attribute Commands .................................... D-13
Interaction Between the Conceal Attribute and Commands that Modify Attributes............................ D-14
Editing a Stored Screen with the Select Screen Command.................................................................. D-15
Mapping Character Fonts ................................................................................................................... D-16
Interaction Between Power-Up Interrupt Mode and Multidrop Protocol........................................... D-17
Interaction Between Dead Touchkeys and Touch Operation .............................................................. D-18
Inconsistent Communication Setup Between Host and TCS................................................................ D-19
COMMON OPERATOR PROBLEMS ................................................................................................... D-20
Saving Display Activity as OFF .......................................................................................................... D-20
Incorrectly Selecting Other Setup Screen Parameters ........................................................................ D-20
Touching the Display during Transition ............................................................................................. D-20
OPERATIONAL STATUS REPORT TABLE........................................................................................ D-21
/LVWRI7DEOHV

Table 2-1. Framing Formats ........................................................................................................ 2-2


Table 2-2. Touch Control Screen Parity Settings ......................................................................... 2-4
Table 3-1. Control Codes Recognized by the TCS....................................................................... 3-3
Table 3-2. Representing 8-bit Control Codes With 7-Bit Escape Sequences .............................. 3-5
Table 3-3. Condition for Acceptance of Certain Control Codes within Control Strings ........... 3-12
Table 3-4. Summary of Status Queries and Reports................................................................... 3-14
Table 3-5. Summary of Selectable Modes.................................................................................. 3-18
Table 4-1. Overview of Functional Volatility .............................................................................. 4-2
Table 4-2. Control over Individual Setup Parameters .................................................................. 4-6
Table 4-3. Numeric Values for Foreground and Background Color Parameters ......................... 4-7
Table 4-4. Multidrop Addresses and Codes ............................................................................... 4-17
Table 4-5. Effects of Multidrop Addresses on Control Codes ................................................... 4-18
Table 4-6. Flow Control ............................................................................................................. 4-25
Table 5-1. Format Effectors.......................................................................................................... 5-4
Table 5-2. Typical Screen Storage Capacity ................................................................................ 5-6
Table 5-3. Default Values of Screen-Dependent Items ................................................................ 5-9
Table 5-4. Code Values Corresponding to Character Positions ................................................. 5-30
Table 5-5. Standard Characters Used For Special Purposes ...................................................... 5-31
Table 5-6. Extended Characters Used for Special Purposes ...................................................... 5-31
Table 5-7. Effects of the Line Mode on the Return and Enter Keys .......................................... 5-62
Table 5-8. Effects of the New Line Mode on Cursor Movement............................................... 5-62
Table 5-9. Commands Affected by NOCHANGE Attribute Mode............................................ 5-64
Table 5-10. Commands Unaffected by NOCHANGE Attribute Mode...................................... 5-66
Table 5-11. National Replacement Code Characters.................................................................. 5-70
Table 5-12. Color Parameters of the Set Character Attributes Command ................................. 5-75
Table 5-13. Color Attribute Definitions (* = Default) .............................................................. 5-97
Table 7-1. Non-Alphanumeric Standard Key Codes.................................................................... 7-2
Table 7-2. Codes Sent by Keys when Pressed with the Ctrl Key................................................. 7-4
Table 7-3. Cursor Control Key Codes .......................................................................................... 7-5
Table 7-4. Special Function Key Codes ....................................................................................... 7-6
Table 7-5. Auxiliary Keypad Codes ............................................................................................. 7-7
Table B-1. Summary of TCS Commands Grouped According to Related Functions................. B-2
Table C-1. Static ASCII Character Font...................................................................................... C-2
Table C-2. Static Special Character Font .................................................................................... C-3
Table C-3. Consequences of Changing the Static ASCII Character Font PROM....................... C-5
Table C-4. Consequences of Changing the Static Special Character Font PROM ..................... C-6
Table C-5. Boxtype Characters ................................................................................................... C-7
Table D-1. Symptom/Solution Chart ........................................................................................... D-2
/LVWRI)LJXUHV

Figure 2-1. Typical Asynchronous Framing Format .................................................................... 2-3


Figure 4-1. Sample Communication Monitor Screen................................................................. 4-34
Figure 5-1. Codes Access the Character Sets ............................................................................... 5-3
Figure 5-2. Selecting a Screen for Editing ................................................................................... 5-6
Figure 5-3. Manipulating Character Sets and Fonts ................................................................... 5-24
Figure 5-4. Character Font Map Operations............................................................................... 5-29
Figure 5-5. Character Font Copy Operations ............................................................................. 5-34
Figure 5-6. Example Custom Character Design ......................................................................... 5-37
Figure 5-7. Dividing the Character into Sixels........................................................................... 5-38
Figure 5-8. Encoding the Sixels.................................................................................................. 5-40
Figure 5-9. Vertical and Horizontal Bars ................................................................................... 5-51
Figure 5-10. Conceptual Model: Characters and Their Attributes ............................................. 5-73
Figure 6-1. Touch Cell Number Assignments .............................................................................. 6-2
Figure 6-2. Example Touchkey .................................................................................................... 6-3
Figure 6-3. Touchkey Visual Extent............................................................................................. 6-4
Figure C-1. Encoding the Letter H .............................................................................................. C-8
Figure C-2. Display Character Addressing.................................................................................. C-9
&+$37(5*(1(5$/,1)250$7,21
29(59,(:
The Touch Control Screen (TCS) is a sophisticated interface between human operators and
computer-driven systems. The TCS allows the operator, with a minimum of training, to
accurately and efficiently control complex operations by touching the screen.
The Touch Control Screen interprets codes from the host computer to create displays that
provide the operator with information or ask the operator to select from the choices presented.
The operator responds naturally by pointing to the appropriate choice, and touching the display.
The TCS, acting as a software configured control panel, notifies the computer that a particular
area was touched.
The TCS can be integrated into any computer-based system, and is packaged to be easily
mounted in a wall, in a rack, on a boom, or on a table top. High-level software support facilitates
the design of touch targets using a few simple commands. The extreme reliability and durability
of TCS makes it appropriate for use in a variety of rugged environments.

)HDWXUHV
Features of the TCS include the following:

6RIWZDUH
• Line attributes that can be selected by the user: normal, double width, double size

• Character attributes that can be selected by the user: highlight, underline, blink, concealed,
and reverse video

• Direct cursor addressing

• Region commands that allow the programmer to outline and modify attributes within a
rectangular region of the display

• Programmable cursor type, including non-blinking, slow-blinking and fast-blinking reverse


block, non-blinking, slow-blinking and fast-blinking underlines, and invisible

• Two character sets (128 characters each)

• Four character fonts for mapping into the character sets. Two of the fonts are fixed and two
can be altered by the user. Each font contains 128 characters.

• National Replacement Code method to display international characters

• 8 basic colors for displaying character foreground and background

• 8 highlight colors, associated with each of the basic colors, chosen to enable applications
developed for monochrome TCS to effectively display in a color environment

1-1
+DUGZDUH
• Integral touch panel with a 120 touch cell matrix (12 rows by 10 columns)

• Keyboard port with adapter cable for connection to a standard PC-AT keyboard

• High contrast electroluminescent (EL) or Dual Scan Passive (DSP) color display that can
display 1920 characters (24 lines of 80 characters each)

• RS-232 serial interface port with selectable baud rates in standard increments up to 19,200
baud

• RS-422 and RS-485 serial interface port for communication at distances of up to 1200 meters
(4000 ft) and for multidrop configurations (not yet available)

• Optional rack, panel, wall and boom mount capabilities

• NEMA 4 (National Electrical Manufacturers Association) and NEMA 4X water and dust
resistance on all surfaces. (Requires the optional NEMA 4 Hatch Kit.)

• Nonvolatile memory for storing Setup parameters while the power is off

• 96 kilobytes of user random-access memory (RAM) for storing frequently used screens and
two dynamic character fonts

• Test Screen for user-selected testing of the electronics, the display, and the touch panel

• Communication Monitor to help troubleshoot communications

• Safety standards include: CSA-C22.2

• Other compliances include FCC Class A and VDE 0871A

• High resistance to shock and vibration

$ERXW7KLV*XLGH
The ErgoTouch TCS Application Developer’s Guide explains how to program the TCS to create
the interface between the user and host computer. It explains how to display characters, create
touch keys, and control and interpret user input. Basic troubleshooting information and sample
programs are also included.

5HODWHG'RFXPHQWV
The ErgoTouch TCS Installation Guide provides instructions for mounting and connecting the
TCS, configuring with the Setup Menu, and maintaining the TCS at an operational level (fuse
replacement and cleaning). The guide also includes a full set of specifications.

1-2
&+$37(5,17(5)$&,1*727+(+267&20387(5
,1752'8&7,21
This chapter provides information about communication between the Touch Control Screen
(TCS) and host computer. Topics include:

• A description of serial data

• Electronics Industries Association (EIA) standards RS-232-E, RS-422-A, and RS-485

• TCS error checking methods, including buffer overflow control

• A summary of TCS communication parameters that can be set by the user

• Multidrop communication protocol

7KH6HULDO,QWHUIDFH
The TCS and the host computer communicate by a serial interface, whereby information is
exchanged between devices as a series of binary codes known as bit-serial data.

%LW6HULDO'DWD
Bit-serial data is digital information represented as a series of bits sent over a wire, one bit at a
time. Specified voltage levels indicate the binary state, either zero or one, of each bit.

7UDQVPLWWHG'DWD
Data bits are sent between the TCS and host in groups of seven or eight bits. Each group of data
bits constitutes one code, and the TCS recognizes 256 such codes from the host. The data bits are
preceded and followed by other bits, described later in this chapter. The number of data bits per
code is controlled by the Data Bits parameter, selectable from the Setup Screen. (Refer to the
ErgoTouch TCS Installation Guide for Setup Screen information.)
TCS operation involves two types of codes: graphic codes and control codes. Graphic codes
generally cause a character to be displayed on the TCS display. Control codes do an action, such
as changing a display characteristic or regulating data flow between the TCS and host.
Chapter 3 explains how TCS handles codes and characters, including the results of using seven
or eight data bits. Appendix C contains detailed information about Standard and Custom
Character Fonts.

2-1
7LPLQJ)RUPDW
Serial data can be transmitted in either a synchronous or asynchronous timing format. In a
synchronous format, individual codes in the message are synchronized to a clock signal and sent
one after another, without any special bits separating them. Start and stop codes mark the
beginning and end of each message block, but start and stop bits are not sent with each code.
In an asynchronous format, transmitted data is not synchronized to a clock. Instead, start and stop
bits mark the beginning and end of each code. Asynchronous formats have the advantage that the
sender and receiver do not need to be synchronized with each other. The TCS uses an
asynchronous format only.

'DWD5DWH
Serial data speed is expressed in bits per second, or baud. Although baud technically means the
number of state changes per second (which is not always equal to bits per second), the term baud
rate is usually used interchangeably with bit rate. The TCS can send and receive data at all the
following bit rates: 110, 300,600, 1200, 2400, 4800, 9600, and 19200 baud.
The TCS sends and receives data at the same rate. For example, the TCS cannot be set to
transmit data at 9600 baud and receive data at 1200 baud.
The baud rate is selected by the user through the Setup Screen. Instructions for selecting the baud
rate are provided in the Installation Guide, under the heading, Using the Setup Screen.

6HULDO'DWD&RPSRVLWLRQ
Each code sent between the TCS and the host is preceded by one start bit, a space (binary zero).
The start bit is immediately followed by seven or eight data bits, the code itself. The data bits are
followed by an optional parity bit, and finally one or two stop bits, which are marks (binary
ones).
The combination of all the serial bits is called the framing format. Table 2-1 shows all framing
formats supported by the TCS. Figure 2-1 shows the framing format to transmit a code using
seven data bits, a parity bit, and two stop bits.

7DEOH)UDPLQJ)RUPDWV
6WDUW%LW  'DWD%LWV   6WRS%LW  %LWV7RWDO
6WDUW%LW  'DWD%LWV 3DULW\%LW  6WRS%LW  %LWV7RWDO
6WDUW%LW  'DWD%LWV   6WRS%LWV  %LWV7RWDO
6WDUW%LW  'DWD%LWV   6WRS%LW  %LWV7RWDO
6WDUW%LW  'DWD%LWV   6WRS%LWV  %LWV7RWDO
6WDUW%LW  'DWD%LWV 3DULW\%LW  6WRS%LWV  %LWV7RWDO
6WDUW%LW  'DWD%LWV 3DULW\%LW  6WRS%LW  %LWV7RWDO
6WDUW%LW  'DWD%LWV 3DULW\%LW  6WRS%LWV  %LWV7RWDO

2-2
6WDUW %LW 2SWLRQDO 3DULW\ %LW
,GOH 6WRS %LWV ,GOH

'DWD %LWV

)LJXUH7\SLFDO$V\QFKURQRXV)UDPLQJ)RUPDW

NOTE
In Figure 2-1, indicates a space (logical zero) and indicates a mark (logical one).
However, on the RS-232 line itself these are inverted, so a mark is a low voltage and a space is a high
voltage. On the RS-485 line, the Data + signal appears as shown in the above figure.

6WDUW%LW
The start bit tells the receiving station that the next seven bits (or eight, depending on how the
Data Bits parameter is set) represent an ASCII code, transmitted with the least significant bit
first. The start bit is always a single zero bit (a space).

6WRS%LW
The stop bit tells the receiving station that it has received the end of the code. The stop bit is
always a one bit (a mark), which is the idle state of the line. A stop bit can be immediately
followed by the start bit preceding the next code, or it can just return the line to its idle state. The
latter case, for example, occurs when the stop bit follows the last code to be transmitted.
To meet the requirements of various host computers and interfaces, the TCS can use either one or
two stop bits. The number of stop bits is selected by the user through the Setup Screen.
Instructions for selecting the number of stop bits are provided in the Installation Guide, under the
heading, Using the Setup Screen.

3DULW\%LW
The parity bit follows the seven or eight data bits. The parity bit is used to check for transmission
errors. Parity checking can use either even or odd parity.
Even parity means that the parity bit and the data bits together contain an even number of binary
ones. For example, for the data bits 1010100, the parity bit is 1, making the total number of ones
even (in this example there are a total of four ones).
Odd parity means that the parity and data bits together contain an odd number of ones. For
example, for the data bits 1010100, the parity bit is 0, making the total number of ones odd (in
this example there is a total of three ones).
By setting two TCS parameters (Parity Enable and Parity Sense), the parity bit can be used in
five ways, as shown in Table 2-2. Instructions for setting the Parity Enable and Parity Sense
parameters are provided in the Installation Guide, under Using the Setup Screen.

2-3
By setting two TCS parameters (Parity Enable and Parity Sense), the parity bit can be used in
five ways, as shown in Table 2-2. Instructions for setting the Parity Enable and Parity Sense
parameters are provided in the Installation Guide, under Using the Setup Screen.

2-4
7DEOH7RXFK&RQWURO6FUHHQ3DULW\6HWWLQJV
3$5,7<(1$%/( 3$5,7<6(16( ())(&7
6(77,1* 6(77,1*
2II (YHQRURGG 3DULW\FKHFNLQJDQGJHQHUDWLRQDUHGLVDEOHG7KH7&6GRHVQRW
WUDQVPLWDSDULW\ELWDQGGRHVQRWH[SHFWSDULW\ELWVLQWKHGDWDLW
UHFHLYHV,IWKH7&6UHFHLYHVGDWDFRQWDLQLQJDSDULW\ELWWKHGDWDLV
GLVSOD\HGDVDIUDPLQJHUURU )( 
2Q (YHQ 3DULW\FKHFNLQJDQGJHQHUDWLRQDUHHQDEOHG7KH7&6WUDQVPLWV
HYHQSDULW\GDWDE\DSSHQGLQJDSDULW\ELWDQGH[SHFWVUHFHLYHG
GDWDWRKDYHHYHQSDULW\,IWKH7&6UHFHLYHVGDWDWKDWKDVRGG
SDULW\WKHGDWDLVGLVSOD\HGDVDSDULW\HUURU 3( 
2Q 2GG 3DULW\FKHFNLQJDQGJHQHUDWLRQDUHHQDEOHG7KH7&6WUDQVPLWV
RGGSDULW\GDWDE\DSSHQGLQJDSDULW\ELWDQGH[SHFWVUHFHLYHGGDWD
WRKDYHRGGSDULW\,IWKH7&6UHFHLYHVGDWDWKDWKDVHYHQSDULW\
WKHGDWDLVGLVSOD\HGDVDSDULW\HUURU 3( 
,JQRUH (YHQ 3DULW\FKHFNLQJLVGLVDEOHGEXWHYHQSDULW\JHQHUDWLRQLVHQDEOHG
7KH7&6WUDQVPLWVHYHQSDULW\GDWDE\DSSHQGLQJDSDULW\ELWDQG
H[SHFWVUHFHLYHGGDWDWRKDYHDSDULW\ELW+RZHYHUWKH7&6GRHV
QRWFKHFNWKHSDULW\RIWKHUHFHLYHGGDWD
,JQRUH 2GG 3DULW\FKHFNLQJLVGLVDEOHGEXWRGGSDULW\JHQHUDWLRQLVHQDEOHG
7KH7&6WUDQVPLWVRGGSDULW\GDWDE\DSSHQGLQJDSDULW\ELWDQG
H[SHFWVUHFHLYHGGDWDWRKDYHDSDULW\ELW+RZHYHUWKH7&6GRHV
QRWFKHFNWKHSDULW\RIWKHUHFHLYHGGDWD

2-5
&RPPXQLFDWLRQ6WDQGDUGV
The TCS adheres to three widely used Electronics Industries Association (EIA) standards:
RS-232-E, RS-422-A, and RS-485. RS-232-E is the most widely accepted standard for digital
data communication; few pieces of computer-related equipment are supplied without an RS-232-
E port.
However, RS-232-E is not suitable for all installations. Generally, RS-422-A and RS-485 provide
for communications over longer distances and provide for multidrop configurations. RS-485
operates the same as RS-422-A but can handle more devices in a multidrop configuration (32 as
opposed to 16). This manual refers only to RS-485 when discussing these two standards,
although the TCS does support both interfaces. For more information, refer to the sections on
RS-485 and Multidrop Communications Protocol in this chapter.
The RS-232-E standard specifies that transmitted and received data are each carried on a single
data line; RS-485 specifies that transmitted and received data are each carried on balanced lines.
The RS-232-E standard prescribes signal types, signal levels, and the control signals that
establish communication between devices (in this case, the host and the TCS). The RS-485
standard prescribes only signal types and signal levels.

The RS-232-E and RS-485 interfaces attach to the same serial port connector on the TCSa
25-pin, D-series, male connector. Pin assignments for this connector and names of the respective
circuits are listed in the ErgoTouch TCS Installation Guide.

56(
First established in 1969 and later revised, the RS-232-E standard defines the electrical and
mechanical characteristics of an “interface between data terminal equipment and data
communication equipment employing serial binary exchange.”

NOTE
The TCS is data terminal equipment (DTE) as described by the RS-232-E standard. As a DTE unit, the TCS
is connected to data communication equipment (DCE) such as a modem. A null-modem cable is required to
connect to another DTE unit.

The RS-232-E, RS-422-A, and RS-485 interfaces attach to the 25-pin, D-series, male connector.
Pin assignments for this connector and names of the respective circuits are listed in the
Installation Guide.

2-6
56(6WDQGDUG
The RS-232-E standard defines the electrical and mechanical characteristics of an interface
between data terminal equipment (DTE) and data communication equipment (DCE) that uses
serial binary data interchange.

NOTE
The TCS is data terminal equipment (DTE) as described by the RS-232-E standard. As a DTE unit, the TCS
is connected to data communication equipment (DCE), such as a modem. Connection to another DTE unit
requires the use of a null-modem cable.

The RS-232-E standard specifies unbalanced transmission, which uses a single high-low signal
line referenced to signal ground. The standard assigns functions to the circuit on each pin of the
RS-232-E connector. Signal voltage level and timing requirements are prescribed by the
standard, but framing format and baud rate can vary among RS-232-E compatible devices. The
RS-232-E standard also assigns gender to individual connectors: the RS-232-E connector is male
on DTE and female on DCE.

56(6LJQDO'HVFULSWLRQV
RS-232-E was originally designed as a computer interface for use over telephone lines. Because
of this, signals have names like Received Line Signal Detector (RLSD). The line referred to is
the telephone line. Since the introduction of the standard, more ways of using RS-232-E have
been developed. For example, instead of using telephone lines, a specially wired cable called a
null-modem cable can be used to directly link two DTE units, such as the TCS and a host
computer. The DTE units at each end of the null-modem cable interpret the cable as two modems
communicating over telephone lines.
RS-232-E signals used by the TCS are described below. It is not necessary to understand each of
these signals to program the TCS; this information is provided to help interface the TCS with
different types of DCE devices. The circuit designations defined in RS-232-E are given in
parentheses after each signal name, (for example, AA).

NOTE
When an RS-232-E control signal is on, its voltage is +3 V to +25 V. When the control signal is off, its
voltage is -3 V to -25 V. When an RS-232- C data transmit and receive signal is in mark (one) condition, its
voltage is -3 V to -25 V. When the data signal is in space (zero) condition, its voltage is +3 V to +25 V.

• Protective Ground (AA)


Protective Ground is the common chassis ground of the TCS.

• Signal Ground (AB)


Signal Ground is the common reference for the data and control lines.

• Transmitted Data (BA) (Output)


Transmitted Data carries the stream of bits generated by the TCS and sent to the DCE.

• Received Data (BB) (Input)


Received Data carries the stream of bits generated by the DCE and received by the TCS.

2-7
• Request to Send (CA) (Output)
In the TCS, Request to Send (RTS) is always on immediately after the power-up sequence
and self-tests have finished executing. RTS remains on except during a reset, a long break, or
if the power to the TCS is switched off.

NOTE
This use of Request to Send complies with the RS-232-E standard but precludes operating the TCS in
half-duplex mode.

• Clear to Send (CB) (Input)


The TCS polls Clear to Send (CTS) each time a code is to be transmitted to the DCE over the
serial link. If CTS is off, the code is not sent. When the DCE switches CTS off, transmission
from the TCS halts on the next code boundary. The TCS can be set up to ignore this signal in
3-wire systems.
Normally, the standard does not allow the DCE to switch CTS high or low at random.
However, this technique is commonly used to allow DCE to halt transmission from the TCS
via a hardware signal. Allowing switched operation of CTS to halt transmission is
compatible with operation as described by the RS-449 standard.

• Data Set Ready (CC) (Input)


Data Set Ready (DSR) is set on by the DCE when ready for operation. The TCS polls DSR
before every code transmission to the DCE. If DSR is off, the code is not sent to the DCE.
The TCS can be set up to ignore this signal in 3-wire systems.

• Data Terminal Ready (CD) (Output)


Data Terminal Ready (DTR) is switched on by the TCS as soon as the power-up sequence
and self-tests are concluded. DTR remains on at all times, except during a reset or long
break. DTR is switched off for the duration of the reset or long break signal and is reasserted
on following the break, regardless of the state of the DSR.
The RS-232-E standard specifies that once DTR is switched off by the terminal, DTR can not
be driven on again until Data Set Ready from the DCE is switched off. Because the TCS
supports a minimal 3-wire, RS-232-E interface where unconnected control circuits such as
DSR are biased on, DTR operation is independent of DSR.

• Data Carrier Detect (CF) (Input)


Data Carrier Detect (DCD) is switched on by the DCE whenever the DCE detects a suitable
primary carrier in the receive state. The primary carrier is the telephone line connection, or if
a null-modem cable is used, the proper hard-wired connection. RLSD allows one station to
determine whether the station at the other end has valid contact. If RLSD is off, the Received
Data line is ignored by the TCS.

• Secondary Request to Send (SCA) (Output)


Secondary Request to Send (SRTS) is switched off by the TCS whenever the TCS stalls the
host. SRTS is switched on by the TCS whenever the TCS unstalls the host. The SRTS line
can be used to implement a control line hold-off of the host.

2-8
56DQG56
The unbalanced interface defined by the RS-232-E standard is suitable for many installations.
But for installations requiring increased line lengths, especially at high data rates, problems begin
to emerge. It becomes difficult to distinguish between valid data signals and noise due to ground
shifts or electromagnetic interference.
To overcome these problems, the EIA established the RS-422-A standard as an alternative to
unbalanced transmission. With RS-422-A, transmitted and received data are each carried on a
pair of signal lines that are independent of signal ground. The balanced lines carry data as a
differential signal. With this type of transmission, noise generally appears as common-mode
levels and is rejected by the differential line receiver. When using RS-422, the balanced
Transmitted Data lines are connected to pins 14 and 15, and the balanced Received Data lines are
connected to pins 9 and 10. Pins 13 and 23 must be connected to enable the RS-422 drivers. Pins
17 and 18 must be connected to provide a 100-ohm termination on the transmit pins and pins 24
and 25 must be connected to provide a 100-ohm termination on the receive pins.
In 1983, the EIA established the RS-485 standard which provides the features of RS-422 but also
allows up to 32 drivers and receivers to exist on the same communication link. RS-485, by
nature, will only support half-duplex communications. When using RS-485, the balanced
Transmitted Data/Received Data lines are connected to pins 9 and 10. Pins 13 and 23 must be
connected to enable the RS-485 drivers. Pins 24 and 25 must be connected to provide a 100-ohm
termination on the transmit/receive pins.
When using RS-422 or RS-485, the RS-232-E data lines Transmitted Data (pin 2) and Received
Data (pin 3) are not used, and must be left disconnected.

:KHQ6KRXOG56%H8VHG"
• The interconnecting cable is too long for effective unbalanced operation. With RS-232-E
there is a recommended limit of 15 meters (50 feet) between stations. Using RS-422, that
distance can be up to 1200 meters (4000 feet).

• The interconnecting cable is exposed to excessive extraneous electrical noise sources.


Equipment that complies with the RS-422 standard exhibits better noise immunity than can
be achieved using the RS-232-E standard.

• Interference with other signals must be minimized.

• The signals must be inverted. This can be done simply by reversing the leads at one end of
each pair of data lines.

• Ground loop problems exist.

:KHQ6KRXOG56%H8VHG"
• Multiple TCS’s are connected to the host on the same data link (a multidrop configuration).
In a multidrop configuration, the total length of the interconnecting cables should not exceed
1200 meters.

2-9
3UHYHQWLQJDQG'HWHFWLQJ(UURUV
Because communication with the host computer occurs over a serial hardware link, noisy or
faulty connections can possibly corrupt the data stream and introduce errors. The TCS uses
techniques to minimize the possible effects of several types of communication errors. In
particular, to maintain communication integrity, the TCS monitors and reports the following
types of errors:

• Framing Error
A Framing Error occurs when a code is received without a following stop bit. When a
framing error occurs, the single mnemonic character FE is displayed in place of the character
in error.

• Buffer Overflow
A Buffer Overflow Error occurs when one or more codes have overflowed the TCS input
buffer and been lost. When a buffer overflow error occurs, the single mnemonic character BO
is displayed on the screen instead of the codes that were lost.

• Overrun Error
An Overrun Error occurs when a received code is overwritten by the next code before it can
be read from the Universal Asynchronous Receiver/Transmitter (UART) in the TCS. When
an overrun error occurs, the code that was overrun is lost, the single mnemonic character OE
is displayed, and the code that overran the previous code is interpreted normally.

• Parity Error
A Parity Error occurs when a code is received with an incorrect parity. When a parity error
occurs, the single mnemonic character PE is displayed in place of the code in error. (The TCS
checks for parity errors only when the user has enabled parity checking; see Parity Bit earlier
in this chapter.)

%XIIHU2YHUIORZ&RQWURO
To prevent the TCS and host from overflowing each other’s input buffers, the TCS supports two
methods of communication control: exercising the SRTS and CTS control lines and sending
XON (17 decimal) and XOFF (19 decimal) codes. The method used depends on whether the
XON/XOFF mode is set. For a complete description of XON/XOFF, refer to Chapter 4.

NOTE
Throughout this manual, the terms stall and unstall refer to the stopping and starting of data flow between
the TCS and host, using either the control lines or the XON and XOFF codes.

To prevent its own input buffer from overflowing, the TCS stalls the host. When the TCS is
ready to accept more data, it unstalls the host. Similarly, to prevent the host’s input buffer from
overflowing, the host stalls the TCS, and when ready to receive more data, the host unstalls the
TCS. The input and output buffers each hold a maximum of 636 codes.

2-10
Regardless of the state of the XON/XOFF mode, the TCS can stall and unstall the host only after
two-way communication of control codes is established. Two-way communication of control
codes occurs when multidrop operation is disabled, multidrop is enabled and TCS is addressed
individually, or when multidrop is enabled and TCS 1 is addressed in broadcast mode.

6WDOOLQJWKH+RVW
When XON/XOFF mode is on, the TCS stalls the host by sending an XOFF code and switching
the SRTS line to off. When XON/XOFF mode is off, the TCS stalls the host by switching the
SRTS line off. The TCS stalls the host when any of the following conditions exist:

• The TCS input buffer is 75% full and the next code received is not a communication control
code. This is the first warning.

• The TCS input buffer is 100% full, the buffer has not yet overflowed, and the next code is
not a communication control code. This is the second warning.
If additional codes are received while the input buffer is full, the TCS does not stall the host
again. However, communication control codes do not overflow the input buffer; they are
received and processed even while the input buffer is full. Any other code received while the
input buffer is full is ignored by TCS.

• The host addresses the TCS for two-way communication and the TCS input buffer is 75% or
more full. This applies when a TCS not addressed by two-way communication is addressed
individually or when TCS is addressed in a broadcast mode.

• The TCS address is changed to RS232 or RS422, the TCS was not addressed for two-way
communication, and the input buffer is 75% or more full.

8QVWDOOLQJWKH+RVW
When XON/XOFF mode is on, the TCS unstalls the host by switching SRTS on and sending an
XON code. When XON/XOFF mode is off, the TCS unstalls the host by switching the SRTS line
on. The TCS unstalls the host when any of the following conditions exist:

• The TCS has emptied its input buffer and the host was previously stalled due to a filled TCS
input buffer, but the user has not stalled the host by pressing Ctrl/S.

• A Reset command has been completed and the TCS is ready to receive input from the host.

• When the TCS performs an acknowledged disconnect or mandatory disconnect as part of the
multidrop protocol and it had previously stalled the host. Multidrop protocol is described
later in this chapter.

• When the multidrop address is changed, if the TCS was previously addressed and had stalled
the host.

• The host addresses the TCS for two-way communication using multidrop protocol and the
TCS input buffer is less than 75% full. This applies when a TCS that is not addressed for
two-way communication is addressed individually or when TCS 1 is addressed in broadcast
mode.

2-11
• When the TCS address is changed from RS232 or RS485 to a multidrop address and the host
has been stalled.

• The TCS address is changed to RS232 or RS485, the TCS was not addressed for two-way
communication, and the input buffer is less than 75% full.
When XON/XOFF mode is on, the user can manually unstall the host by pressing Ctrl/Q on the
optional keyboard, as long as the host is not in a stall condition as a result of a filled TCS input
buffer. If the host is stalled for this reason, pressing Ctrl/Q will not override the stall. Refer to
XON/XOFF Mode Command in Chapter 4 for a full description of how TCS handles Ctrl/Q
keystrokes.

6WDOOLQJWKH7&6
When XON/XOFF mode is on, the host can stall the TCS by turning the CTS line off, or by
sending an XOFF code, or both. When XON/XOFF mode is off, the host stalls the TCS by
turning the CTS line off. To improve performance, the TCS uses a two character transmit buffer.
Upon receiving a stall signal from the host, the TCS stops all transmissions when the two-
character transmit buffer is emptied. In some situations, the host is unable to accept more than
one character when the stall signal is sent. Under these conditions, the TCS can be configured in
Setup to use a single character transmit buffer which would result in transmissions stopping on
the next code boundary after the stall signal was received.

8QVWDOOLQJWKH7&6
How the host unstalls the TCS depends on how the TCS was stalled. If the host stalled the TCS
by switching the CTS line off, it unstalls the TCS by switching CTS on. If the host stalled the
TCS by sending an XOFF code, it must send an XON mode to unstall the TCS. Note that TCS
ignores XON and XOFF codes when XON/XOFF mode is disabled.

2-12
&+$37(5352*5$00,1*29(59,(:
,1752'8&7,21
This chapter provides a general overview of Touch Control Screen (TCS) programming. Topics
include:

• Coding standards

• Communication environments

• Communication codes

• Character sets

• TCS commands

• A general description of control strings

• How to generate remote commands from the host

• A summary of TCS status reports

• A summary of selectable modes

• Detailed descriptions of the TCS Mode commands


Except for the TCS Mode commands, which are described in this chapter, commands mentioned
in this chapter are described in detail in the rest of this manual.
For quick reference to a particular command, refer to the command lookup tables in Appendix B.

5(/$7('$16,67$1'$5'6
The TCS conforms to the following standards for representing characters and controls:

• ANSI X3.4-1977 American National Standard Code for Information Interchange (ASCII)

• ANSI X3.41-1974 American National Standard Code Extension Techniques for Use With
7 bit Coded Character Set of American National Standard Code for
Information Interchange

• ANSI X3.64-1979 American National Standard Additional Controls for Use With
American National Standard Code for Information Interchange
All TCS controls comply with American National Standards Institute (ANSI) Standard X3.64-
1979. Some TCS controls are ANSI-specified; others are ANSI- compatible DEC-private or
ANSI-compatible TCS-private. The ANSI standard referenced throughout the rest of this manual
is Standard X3.64-1979.

3-1
&20081,&$7,21(19,5210(176
The TCS can communicate with the host using either 7 or 8 data bits. The number of data bits is
selected by setting the Data Bits parameter in the Setup Screen. (See the Data Bits command in
Chapter 4.)
When the TCS is set for 7-bit communication, the TCS sends and receives 7-bit codes. Seven-bit
communication allows the host and the TCS to send and receive the lower 128 codes directly.
The upper 128 codes are sent and received using 7-bit codes with the control codes Shift Out
(<SO>, 0E hex) and Shift In (<SI>, 0F hex). This technique is explained in detail in Chapter 5.
When the TCS is set for 8-bit communication, the TCS sends and receives 8-bit codes. Eight-bit
communication allows the host and the TCS to send and receive the full set of 256 codes directly.

&20081,&$7,21&2'(6
ASCII established a widely used set of 7-bit codes for representing 128 characters for
transmission. The code set includes displayable characters (including letters, numbers, and
punctuation) and non-displayable control codes (which perform specific functions, such as
sounding a beeper or moving a cursor).
To represent the 128 ASCII codes plus an additional 128 codes, the TCS extends the ASCII code
set by including an additional high-order bit, thereby converting 7-bit ASCII codes to 8-bit codes.
The host and the TCS can thereby send each other any of 256 possible codes (decimal 0 through
255). Of these 256 codes, ANSI has designated 66 as control codes and 190 as graphic codes.

&+$5$&7(56(76
The TCS has two character sets corresponding to the codes that can be sent by the host. The
Standard Character Set corresponds to the lower 128 codes; the Extended Character Set
corresponds to the upper 128 codes. The contents of these character sets can be changed as
described in Chapter 5, Character Set and Character Font Commands. The default contents of
the character sets are documented in Appendix C.

&RQWURO&RGHV
Of the 256 communication codes, 66 are reserved by ANSI as control codes. Individual control
codes perform specific functions in the TCS, such as sounding the beeper or moving the cursor,
and do not normally cause the display of a corresponding graphic character.
Half of the control codes can be sent using 7-bit ASCII codes. Thirty-two of these codes
correspond to columns 0 and l of the Standard Character Set (code values 00 through lF
hexadecimal). The thirty-third 7-bit control code corresponds to the last location in the Standard
Character Set (code value 7F).
The other half of the control codes can only be sent using 8-bit ASCII codes. Thirty-two of these
codes correspond to columns 8 and 9 of the Extended Character Set (code values 80 through 9F
hexadecimal). The thirty-third 8-bit control code corresponds to the last location in the Extended
Character Set (code value FF).

3-2
Of the 66 control codes reserved by ANSI, the TCS acts upon those listed in Table 3-1. Any
other control codes received by the TCS are ignored (except as described later in this chapter
under the heading, Errors in Control Strings).

7DEOH&RQWURO&RGHV5HFRJQL]HGE\WKH7&6
01(021,& +(;9$/8( 1$0( $&7,217$.(1%<7&6 )227127(
(27!  (QGRI7UDQVPLVVLRQ 0XOWLGURSSURWRFRO 
(14!  (QTXLU\ 0XOWLGURSSURWRFRO 
$&.!  $FNQRZOHGJH 0XOWLGURSSURWRFRO 
%(/!  %HOO 6RXQGVDXGLEOHEHOO 
%6!  %DFNVSDFH 0RYHVFXUVRUEDFNZDUGV
+7!  +RUL]RQWDO7DE 0RYHVFXUVRUWRQH[WWDE 
/)! $ /LQH)HHG 3HUIRUPVDOLQHIHHG
97! % 9HUWLFDO7DE 3HUIRUPVDYHUWLFDOWDE 
))! & )RUP)HHG 3HUIRUPVDIRUPIHHG 
&5! ' &DUULDJH5HWXUQ 3HUIRUPVDFDUULDJHUHWXUQ
62! ( 6KLIW2XW 6HOHFWV([W&KDUDFWHU6HW
6,! ) 6KLIW,Q 6HOHFWV6WG&KDUDFWHU6HW
'/(!  'DWD/LQN(VFDSH 0XOWLGURSSURWRFRO 
'&!  'HYLFH&RQWURO ;21HQDEOHV7&6RXWSXW 
'&!  'HYLFH&RQWURO ;2))GLVDEOHV7&6RXWSXW 
1$.!  1RW$FNQRZOHGJHG 0XOWLGURSSURWRFRO 
&$1!  &DQFHO &DQFHOFRQWUROVHTXHQFH
68%! $ 6XEVWLWXWH &DQFHOFRQWUROVHTXHQFH
(6&! % (VFDSH ,QWHUSUHWHVFDSHVHTXHQFH
,1'!  ,QGH[ ,QGH[&RPPDQG 
1(/!  1H[W/LQH 1H[W/LQH&RPPDQG 
5,! ' 5HYHUVH,QGH[ 5HYHUVH,QGH[&RPPDQG 
'&6!  'HYLFH&RQWURO6WULQJ %HJLQGHYLFHFRQWUROVWULQJ 
&6,! % &RQWURO6HT,QWURGXFHU ,QWHUSUHWFRQWUROVHTXHQFH 
67! & 6WULQJ7HUPLQDWRU (QGRIGHYLFHFRQWUROVWULQJ 

3-3
)227127(6
 7KHVHFRQWUROFRGHVDUHLJQRUHGLIWKH0XOWLGURS$GGUHVVRIWKH7&6LVVHWWRQRQH
 $OWKRXJKWKLVFRGHIRUPVSDUWRIWKHPXOWLGURSSURWRFROZKHQWUDQVPLWWHGE\WKH7&6LWLVLJQRUHGZKHQ
UHFHLYHG
 (DFK%(/!ZLOOVRXQGRQHEHOOZKHQVHQWWRWKH'LVSOD\HG6FUHHQ,ID%(/!LVUHFHLYHGZKLOHDVWRUHG
VFUHHQLVVHOHFWHGQRDXGLEOHEHOOZLOOVRXQG
 +RUL]RQWDO7DEZLGWKLVIL[HGDWFROXPQV
 97!DQG))!DFWLGHQWLFDOO\WR/)!
 ;21;2))RQO\VWDUWVWRS7&6RXWSXWLIWKH;21;2))0RGHLVRQ,IWKH;21;2))0RGHLVRIIWKH\DUH
LJQRUHG
 (DFKELWFRQWUROFRGHKDVDQHTXLYDOHQWELWHVFDSHVHTXHQFH6HH7DEOH

Because only half of the control codes can be sent using 7-bit codes, ANSI created a mechanism
to allow each 8-bit control code to be specified by an equivalent 7-bit escape sequence as shown
in Table 3-2. This allows full access to all control codes, regardless of whether the TCS and host
are communicating using 7- or 8-bit codes. Because the TCS ignores many of the 8-bit control
codes, Table 3-2 shows only those 7-bit sequences corresponding to the 8-bit control codes acted
on by the TCS.
Although each character set contains characters in locations that correspond to control codes,
these characters cannot be directly displayed. This is because the corresponding communication
code will be interpreted as a control code since it falls within the range of control codes defined
by ANSI. The characters in these locations are generally used for special purposes and can only
be displayed indirectly by:

• Operation within the Communication Monitor

• Region commands that specify a boxtype

• Region commands that specify custom characters

*UDSKLF&RGHV
Of the 256 communication codes, those that are not reserved for use as control codes are graphic
codes. Each graphic code specifies a location within either the Standard or Extended Character
Set of a character that is to be displayed.
Characters within the Standard Character Set can be displayed by sending the appropriate 7- or
8-bit graphic code. Characters within the Extended Character Set can be displayed either by
sending the appropriate 8-bit graphic code, or by selecting the Extended Character Set (using the
Select Character Set command) and sending the proper 7-bit code.
Graphic codes always cause a corresponding character to be displayed on a screen except when
they are embedded within a control string as described under Control Strings further on in this
chapter.

3-4
Characters in either character set corresponding to control codes cannot be directly displayed.
These characters must be displayed by other means, as described previously in this chapter under
the heading, Control Codes.
See Chapter 5 for additional information about using graphic codes to display characters,

7DEOH5HSUHVHQWLQJELW&RQWURO&RGHV:LWK%LW(VFDSH6HTXHQFHV
01(021,& +(;9$/8( 1$0( (48,9$/(17%,7
6(48(1&(
,1'!  ,QGH[ (6&!'
1(/!  1H[W/LQH (6&!(
5,! ' 5HYHUVH,QGH[ (6&!0
'&6!  'HYLFH&RQWURO6WULQJ (6&!3
&6,! % &RQWURO6HTXHQFH,QWURGXFHU (6&!>
67! & 6WULQJ7HUPLQDWRU (6&!?

7&6&200$1'6
Touch Control Screen commands are the actions that the host or user can take to control the
TCS. Commands allow the host to display touchkeys and text, select character attributes, move
the cursor, and delete text from the display. If the user also has access to the Setup Screen, the
commands enable the user to do several functions such as change the Setup Screen parameters,
align the display, and run tests.
All Touch Control Screen commands are summarized in Appendix B. For clarity, most control
codes are not repeated in Table B-1.

7<3(62)&200$1'6
Touch Control Screen commands can be categorized according to their source:

• Local commands

• Remote commands

• Local/remote commands

/RFDO&RPPDQGV
Local commands are actions the user can take by means of the Setup Screen or by pressing
certain keys on an optional keyboard.
For example, the user issues the Baud Rate command by entering the Setup Screen and, using
touchkeys or the keys on an optional keyboard, selecting the baud rate. Likewise, the user can
send the Short Break command by pressing the Break key.

3-5
1n addition to these actions, the user can cause the TCS to send codes to the host by pressing the
touch panel or typing on the keyboard. However, these actions are not referred to as local
commands.

5HPRWH&RPPDQGV
Remote commands are those sent by the host to the TCS over the serial interface.
Remote commands are used to control the interface between the TCS and the user (for example,
displaying characters on the screen, defining touchkeys, changing character attributes, and
barring the user from the Setup Screen). Remote commands are also used to control the interface
between the TCS and the host (for example, selecting a reporting format for TCS status reports).

NOTE
To make software development easier, remote commands can also be entered from an optional keyboard
by setting the Local/Remote Mode to Local. See “Local/Remote Mode Command,” in Chapter 4.

There are two types of remote commands: control codes and control strings. Control codes are
described at the beginning of this chapter.
A control string is a sequence of codes, beginning with a control code which is usually an
<ESC>, but could be a <CSI> or <DCS>. The sequence causes the TCS to perform a specific
function. For example, the host can reverse the TCS display background by sending the
following control string:
<ESC>[?5h
Control strings are described in more detail later in this chapter.

/RFDO5HPRWH&RPPDQGV
Local/remote commands can be sent either remotely by the host, or issued by the user from the
Setup Screen, Test Screen, or Alignment Screen.
An example of a local/remote command is the Cursor Type command, which selects the type of
cursor that is displayed. The Cursor Type command can be sent as a control string from the host.
For example, the string
<ESC>[3v
selects a reverse-video block cursor. The Cursor Type command can also be issued by the user
by entering the Setup Screen and selecting the cursor type.

3-6
&21752/675,1*6
An ANSI standard control string is a remote command that consists of a special sequence of two
or more codes starting with the Escape code <ESC>, the Control Sequence Introducer code
<CSI>, or the Device Control String code <DCS>. Control strings provide the host with
commands that control the TCS.
The starting control code indicates to the TCS that it should interpret the next code as belonging
to a command. If the command is in the correct format, and is recognized, the TCS does a
specific function. If the command is in the correct format, but is not recognized, the TCS ignores
the command. If the command is not in the correct format, the TCS prints out the remainder of
the command, from the point where the format became incorrect.
All control strings supported by the TCS are summarized in Table 3-3, grouped by function.
Some of the control strings include optional numeric and selective parameters, which are
represented in Table 3-3 in angle brackets (for example, <Ps>). Numeric and selective
parameters are discussed more fully later in this chapter. The specific parameters for each
command are described in the detailed command descriptions in Chapter 5.
The control strings supported by the TCS can be grouped into three categories, according to their
composition:

• Simple Escape sequences

• Device Control Strings

• Control sequences

6LPSOH(VFDSH6HTXHQFHV
Simple Escape sequences can be sent by the host as described in Appendix B, and do not include
optional parameters. These control strings begin with the <ESC> code, followed by any code
other than [, possibly followed in turn by other codes. For example, the Index command consists
of the control string <ESC>D. All variations of these control strings are listed in Appendix B and
again in the detailed descriptions of the respective commands.

'HYLFH&RQWURO6WULQJV
Device Control Strings begin with the <DCS> code (or its equivalent escape sequence,
<ESC>P), and are terminated by the <ST> code (or its equivalent escape sequence, <ESC>\).
The TCS recognizes only one Device Control String, the Down-Line Load Character Font
command. For more information, refer to the description of this command in Chapter 5.

3-7
&RQWURO6HTXHQFHV
The general format for a control sequence is:
<ESC>[<Pr><P1>;<P2>;...;<Pn><F>
or
<CSI><Pr><P1>;<P2>;...;<Pn><F>
where:
<ESC> [ = Control Sequence Introducer
<CSI> = Control Sequence Introducer
<Pr> = Optional private command code (?>)
<P1> = First optional parameter
<P2> = Second optional parameter
<Pn> = Last optional parameter
<F> = Final code
A control sequence always begins with the Control Sequence Introducer and ends with a Final
code. The Control Sequence Introducer can be the two codes <ESC> [, or it can be the control
code <CSI> when the TCS is set for 8-bit communication. The Final code is a single code
representing @ through ~ (40 through 7E hex, inclusive). The Final code varies, depending on
the command.
Between the Control Sequence Introducer and the Final code are an optional private command
code and optional parameters.
If used, the private command code identifies the control sequence as a privately interpreted,
ANSI-compatible control sequence. The private command code is either the code representing ?
or >. The code ? identifies the control string as ANSI-compatible, DEC-private. The code >
identifies the control string as ANSI-compatible, TCS-private.
An optional parameter is either a numeric parameter (which passes a numeric value) or a
selective parameter (which selects a particular subfunction from a specified list). Numeric and
selective parameters are described more completely under the next heading.
The following are examples of valid control sequences:
<ESC>[5B Moves the cursor down five lines
<ESC>[12;40H Moves the cursor to line l2, column 40
<ESC>[;;13w Adds a carriage return to all TCS reports
<ESC>[?7h Turns on Auto Wrap-Around Mode (a DEC-private command)
<ESC>[>3n Reads character under the cursor (a TCS-private command)

3-8
&RQWURO6HTXHQFH3DUDPHWHUV
A control sequence parameter is a string of the codes representing 0 through 9. The TCS
interprets the string of digits as a decimal number. Leading zeros are ignored.
If a control sequence contains more than one parameter, the parameters must be separated by
semicolons (;) (decimal 59). A semicolon is not required before the first parameter or after the
last parameter.
A control sequence can contain a maximum of 10 parameters. If more than 10 parameters are
contained in an otherwise valid control sequence, the right-most additional parameters are
ignored.
There are two types of parameters: numeric and selective. Each is described below.

1XPHULF3DUDPHWHUV
A numeric parameter is an optional parameter in a control sequence that passes a numeric value
to the TCS. This value controls the scope or range of a command.
If a control sequence uses multiple numeric parameters, the parameters must be separated by
semicolons (decimal 59). Any one of the parameters can be omitted from a control sequence, in
which case the parameter assumes its default value.
For example, consider the Scrolling Region command. The Scrolling Region command (which is
fully documented in Chapter 5) is a control sequence containing numeric parameters that define
the portion of the display which will be designated as the scrolling region. The Scrolling Region
command is issued by the host in the following format:
<ESC>[<Pt>;<Pb>r
Note that the Scrolling Region command uses two numeric parameters. The first numeric
parameter, <Pt>, designates the top line of the scrolling region; the second numeric parameter,
<Pb>, designates the bottom line of the scrolling region.
The following examples of the Scrolling Region command show how numeric parameters
determine the size of the scrolling region:
<ESC>[r
Both numeric parameters are omitted and assume their default values. Therefore <Pt>
defaults to line 1 and <Pb> defaults to line 24. The entire display, lines 1 through 24, is
defined as the scrolling region. Note that r is the Final code for this control sequence.
<ESC>[;;30r
Same as above; the extra parameter (30) is ignored.
<ESC>[;18r
Lines 1 through 18 become the scrolling region.
<ESC>[4;r
Lines 4 through 24 become the scrolling region.
<ESC>[22;4r

3-9
The command is ignored because the parameter designating the bottom line of the scrolling
region (4) is less than or equal to the parameter designating the top line (22).
Numeric parameters outside the valid range are ignored or limited within a reasonable range, as
specified in the detailed description of each command.

6HOHFWLYH3DUDPHWHUV
A selective parameter is an optional parameter in a control sequence that selects a particular
effect from a list of possible effects.
Each effect is associated with a specific numeric value. When the value is passed to the TCS and
the command is executed, the effect specified by that value is produced. The list of selective
parameters (together with the numeric parameters) can vary in length from zero to 10 parameters
(inclusive).
Some control sequences allow multiple selective parameters to be combined in a single control
sequence to select a combination of effects. (When this is possible, it is noted in the detailed
command description.) For these commands, the selective parameters can be combined in any
order. If the selective parameters within a control sequence conflict with each other, the latest
(rightmost) parameter is used. Invalid selective parameters are ignored.
For example, consider the Set Character Attributes command. The Set Character Attributes
command is a control sequence containing selective parameters that select the visual attributes
(highlight, underline, blink) for displayed characters. The Set Character Attributes command is
issued by the host in the following format:
<ESC>[<Ps>;...;<Ps>m
Each <Ps> represents one of 11 possible selective parameters.
The following examples of the Set Character Attributes command show how selective
parameters control the visible attributes of displayed characters:
<ESC>[m All video attributes are turned off. The Final code is m.
<ESC>[4;1;5m Selects underline (parameter 4), highlight (parameter l), and blink
(parameter 5) attributes. The Final code is m.
<ESC>[1;4;5m Same as above. The parameters can appear in any order.
<ESC>[1;4;5;25m Selects highlight (parameter l) and underline (parameter 4) attributes,
and turns blinking off (parameter 25). Parameter 5 (select blinking) is
overridden by parameter 25.

+RZWKH7&6,QWHUSUHWV&RQWURO6HTXHQFHV
The TCS does the following two steps when it interprets a control sequence:
1. Control Sequence Parsing
During parsing, all codes in the control string are stored for use as a TCS command. If the
control sequence is not in a valid format, the TCS quits parsing the control sequence at the
code that caused the format to be invalid. If the sequence is properly formatted, the TCS does
step 2.

3-10
2. Command Lookup
The TCS looks up a command using the combination of the control sequence’s private
command code, the Final code, and possibly the first parameter. The TCS does not have a
command for every possible control sequence combination. If the TCS has a corresponding
command, the TCS accepts the parameters and performs the command. If the TCS does not
have a corresponding command, the TCS ignores the control sequence.
For example, the sequence
<ESC>[12;5F
is in the correct format, and can be parsed by the TCS. However, when it is looked up, no
corresponding command is found. Therefore, the sequence is ignored by the TCS.
The parsing step assumes that all parameters are omitted from the command. If a parameter is
found, its value is stored with the control sequence. When the command is executed, the list of
parameters is provided. If more parameters are specified in the sequence than expected for the
command, the TCS ignores the additional parameters. If fewer parameters are specified than
expected, the omitted parameters assume default values.
&DQFHOLQJ&RQWURO6WULQJV
A control string can be canceled before the entire string is sent by sending either a <CAN> or
<SUB> code to the TCS. Either code causes the TCS to ignore all previously received codes up
to and including the previous <ESC> or <CSI> code.

(UURUVLQ&RQWURO6WULQJV
Generally, the codes <SP> through ~ (32 through 7E hex) are valid within control strings. Codes
within this range do not cause a control string to be aborted, even if the TCS does not recognize
the resulting control string. Codes outside this range cause the interpretation of the control string
to be aborted immediately. The portion of the control string received prior to the invalid code is
ignored and re-interpretation of the input begins with the invalid code. If the invalid code is a
graphic code (representing a character in the Extended Character Set), it will be displayed. If the
invalid code is a control code, it will be interpreted normally.
Under certain conditions, some control codes do not cause the interpretation of a control string to
be aborted. Table 3-3 lists these control codes and the conditions under which they can be
received within a control string without affecting interpretation of the string. Note that if the
stated conditions for a code are not met, the code aborts interpretation of any control string
within which it is found.

3-11
+2:72*(1(5$7(5(027(&200$1'6
How remote commands are sent from the host computer to the TCS depends entirely on the
specific host computer and application software. Different computers and application programs
can handle RS-232-E, I/O (input/output) communication differently.
The following examples of code fragments show how the BASIC and C programming languages
could be used to generate a control string. Both examples send the control string
<ESC>[2J
which clears the TCS display.
• Example using BASIC:
ES$ = CHR$(27)
PRINT #1, ES$;”[2J”;
• Example using C:
printf( “\033[2J” );
7DEOH&RQGLWLRQIRU$FFHSWDQFHRI&HUWDLQ&RQWURO&RGHVZLWKLQ&RQWURO6WULQJV
&21',7,2165(48,5('
01(021,& +(;9$/8( 1$0( )25&2'(72%(
$&&(37('
62+!  6WDUWRI+HDGHU $OZD\V
67;!  6WDUWRI7H[W $OZD\V
'/(!  'DWD/LQN(VFDSH $OZD\V
'&!  'HYLFH&RQWURO ;21 $OZD\V
'&!  'HYLFH&RQWURO ;2)) $OZD\V
6<1!  6\QFKURQL]H $OZD\V
(7%!  (QGRI7H[W%ORFN $OZD\V
(27!  (QGRI7UDQVPLVVLRQ 0XOWLGURSDGGUHVVLVEHWZHHQ
DQGLQFOXVLYH
(14!  (QTXLU\ $VDERYH

For specific information about sending data to the TCS, check the documentation for the host
computer or application software in use.

3-12
67$7865(32576800$5<
The host can query the TCS for a wide range of status reports. The status reports allow the host
to read the contents and attributes of the TCS display, sense touch call closures, and verify that
the TCS is operating properly.

6XPPDU\RI6WDWXV4XHULHVDQG5HVSRQVHV
The host can query the TCS for the following information:

• The cursor position

• The character under the cursor

• The character attributes under the cursor

• Touch cell closures (when the Polled Touch Mode is set)

• Touch cell status (when the Polled Touch Mode is set)

• The existence of a stored screen

• The amount of screen memory remaining

• TCS type

• Operational status

• The type of error, if any

• Power-loss history

• Self-test results
Table 3-4 summarizes the commands the host can send to query the status of the TCS. Table 3-4
also shows the status reports sent by the TCS in response to the host’s queries.

7\SHVRI6WDWXV4XHULHVDQG5HVSRQVHV
The commands that query the status of the TCS (and the responses of the TCS) are of two types:

• ANSI-specified commands, which have the form:


<ESC>[...n
• ANSI-compatible TCS-private commands, which have the form:
<ESC>[>...n
The TCS responses to these commands follow the same format as the respective commands
except for the cursor position report, which has a terminator of R instead of n.
The Reporting Format command can be used to cause the TCS to append a common terminating
code to all TCS status responses. The Reporting Format command can also be used to specify
different introducer codes. (This command is described in detail in Chapter 4.)

3-13
7DEOH6XPPDU\RI6WDWXV4XHULHVDQG5HSRUWV
+267&200$1' 7&65(63216( 0($1,1*
(6&!>F 5HTXHVW7&67\SH&RPPDQG
(6&!>3W!3Y! 7&6W\SHUHSRUW3W!LVIRUIRU3Y!LVILUPZDUH
3P!3G!3Z! YHUVLRQ PQQ YHUVLRQPQQ 3P!LVWKHDPRXQWLQE\WHVRI
3R!F ([SDQVLRQ0HPRU\3G! 3Z! DQG3R!LVUHVHUYHG
IRUODWHUXVH
(6&!>Q 5HTXHVW7&66WDWXVFRPPDQG
5HTXHVWVRSHUDWLRQDOVWDWXVRI7&6
(6&!>Q 1RPDOIXQFWLRQVLQFHODVWSRZHUXSRUUHVHW
(6&!>Q 0DOIXQFWLRQVLQFHODVWSRZHUXSRUUHVHW 7&6FRQWLQXHVWR
RSHUDWH
(6&!>Q 5HDG&XUVRU3RVLWLRQFRPPDQG5HTXHVWVFXUVRUSRVLWLRQ
(6&!>3O!3F!5 7KHFXUVRULVDWOLQH3O!DQGFROXPQ3F!
(6&!>!Q 5HTXHVW3RZHU6WDWXVFRPPDQG&KHFNVIRUSRZHUORVVVLQFH
ODVWLQTXLU\
(6&!>!Q 1RSRZHUORVVKDVRFFXUUHG
(6&!>!Q 3RZHUORVVKDVRFFXUUHG ,IWKH3RZHU8S,QWHUUXSW0RGHLVVHW
WKLVVHTXHQFHLVVHQWDV\QFKURQRXVO\
(6&!>!3N!Q 5HDG7RXFKNH\6WDWXVFRPPDQG5HTXHVWVVWDWXVRIDVSHFLILF
WRXFKNH\RUWKHODVWWRXFKNH\WRXFKHGEXWQRW\HWUHSRUWHG
(6&!>!3N!Q ([WHQGHG5HSRUW0RGHUHVHW 7RXFKVWDWXVRIUHTXHVWHG
WRXFKNH\RUODVWWRXFKNH\WRXFKHGEXWQRW\HWUHSRUWHG,I3ROOHG
7RXFK0RGHLVUHVHWWKLVVHTXHQFHFDQEHJHQHUDWHG
DV\QFKURQRXVO\
(6&!>!3N! ([WHQGHG5HSRUW0RGHVHW 7RJJOHVWDWXVRIUHTXHVWHG
3V!Q WRXFKNH\3N!LV3V!,I3ROOHG7RXFK0RGHLVUHVHWWKLV
VHTXHQFHFDQEHJHQHUDWHGDV\QFKURQRXVO\
(6&!>!Q 5HDG&KDUDFWHU8QGHU&XUVRUFRPPDQG5HTXHVWVFKDUDFWHUDW
WKHFXUUHQWFXUVRUSRVLWLRQ
(6&!>!3F!Q 7KHGHFLPDOYDOXHRIWKHFKDUDFWHULV3F!

3-14
7DEOH6XPPDU\RI6WDWXV4XHULHVDQG5HSRUWVFRQWLQXHG
+267&200$1' 7&65(63216( 0($1,1*
(6&!>!Q 5HDG$WWULEXWHV8QGHU&XUVRUFRPPDQG5HTXHVWVFKDUDFWHU
DWWULEXWHVDWFXUUHQWFXUVRUSRVLWLRQ
(6&!>!3KL! 3KL! KLJKOLJKW  RQ RII 3XO! XQGHUOLQH  RQ
3XO!3EOLQN!3UY! RII 3EOLQN! EOLQN  RQ RII 3UY! UHYHUVHYLGHR 
3F!Q RQ RII 3F! FRQFHDOHG  RQ RII
&RORU7&6
(6&!>!3KL! 3IJ! IRUHJURXQGFRORU 
3XO!3EOLQN!3UY! 3FF! FRQFHDOFRORU 
3F!3IJ!3EJ! 3EJ! EDFNJURXQGFRORU 
3FF!Q
(6&!>!Q 5HTXHVW5207HVW5HVXOWVFRPPDQG7HVWVUHVXOWVRI520
FKHFNVXPWHVWV
(6& >!3ORRSV! 520WHVWHG3ORRSV!WLPHVDQGIDLOHG3IDLO!WLPHV7KHPRVW
3IDLO!3VXP!Q UHFHQWVXPLQHUURULV3VXP!
(6&!>!Q 5HTXHVW1RQYRODWLOH0HPRU\7HVW5HSRUWFRPPDQG5HTXHVWV
UHVXOWVRIQRQYRODWLOHPHPRU\WHVWV
(6&!>!3ORRSV! 1RQYRODWLOHPHPRU\WHVWHG3ORRSV!WLPHVDQGIDLOHG3IDLO!
3IDLO!3VXP!Q WLPHV7KHPRVWUHFHQWVXPLQHUURULV3VXP!
(6&!>!Q 5HTXHVW5$07HVW5HSRUWFRPPDQG5HTXHVWV5$0WHVW
UHVXOWV
(6&!>!3ORRSV! 5$0WHVWHG3ORRSV!WLPHVDQGIDLOHG3IDLO!WLPHV7KHODVW
3IDLO!3DGGU! IDLOXUHRFFXUUHGDWDGGUHVV3DGGU!DQGUHVXOWHGLQGDWDELW
3HUURU!3KLVWRU\!Q HUURUVDVVKRZQLQ3HUURU!7KHKLVWRU\RIDOOGDWDELWHUURUVLV
LQ3KLVWRU\!

(6&!>!Q 5HTXHVW7RXFK3DQHO7HVW5HSRUW5HTXHVWVWRXFKSDQHOWHVW
UHVXOWV
(6&!>!3ORRSV! 7RXFKSDQHOWHVWHG3ORRSV!WLPHVDQGIDLOHG3IDLO!WLPHV7KH
3IDLO!3HUURU!Q PRVWUHFHQWHUURURFFXUUHGDWWRXFKFHOO3HUURU!
(6&!>!Q 5HDG6FUHHQ0HPRU\5HPDLQLQJ&RPPDQG
(6&!>!3VX! 6FUHHQPHPRU\UHPDLQLQJUHSRUW3VX!LVWKHQXPEHURIVWRUHG
3EX!3VU!3EU!Q VFUHHQVLQXVH3EX!LVWKHQXPEHURIE\WHVLQXVH3VU!LV
WKHQXPEHURIVFUHHQVUHPDLQLQJ DQDYHUDJHRIWKHQXPEHUWKDW
FRXOGVWLOOEHVWRUHG 3EU!LVWKHQXPEHURIE\WHVRIVFUHHQ
PHPRU\UHPDLQLQJ
(6&!>!Q 5HTXHVW(UURU6WDWXV&RPPDQG
(6&!>!Q 1RHUURUKDVRFFXUUHG
(6&!>!3H!Q $QHUURURIW\SH3H!KDVRFFXUUHG

3-15
7DEOH6XPPDU\RI6WDWXV4XHULHVDQG5HSRUWVFRQWLQXHG
+267&200$1' 7&65(63216( 0($1,1*
(6&!>! 5HDG6FUHHQ([LVWHQFH&RPPDQG
3VFU!Q

(6&!>!Q 6FUHHQ3VFU!GRHVQRWH[LVW
(6&!>!Q 6FUHHQ3VFU!GRHVH[LVW

3-16
6800$5<2)6(/(&7$%/(02'(6
A TCS mode is a state that can be set or reset by the host or user to control TCS operation. The
TCS supports several modes specified by the ANSI standard. In addition, the TCS supports
several DEC-private and TCS-private modes. Table 3-4 provides a summary of these modes.

NOTE
All TCS modes are fully compatible with the ANSI standard, which provides for the use of private modes.

Each mode has two states: set or reset. As Table 3-5 indicates, some modes can be set or reset by
the host, some by the user, and some by both the host and the user.
The host can set or reset TCS modes one at a time (using individual mode commands) or in
combination (using the Set Mode command or the Reset Mode command). For example, the
Send-Receive Mode and the New Line Mode (both of which are ANSI-specified modes) can be
set using two separate commands:
<ESC> [1 2 h (a form of the Send-Receive Mode command)
<ESC> [2 0 h (a form of the New Line Mode command)
Or they can be set with a single command, as follows:
<ESC> [1 2 ; 2 0 h (a form of the Set Mode command)
NOTE
Only modes of the same type can be set or reset within a single control string. For example, the ANSI-
specified New Line Mode and the TCS-private Touch Panel Lockout Mode cannot be set with a single
control string.

A detailed description of each TCS mode is provided in this manual, with the description of the
respective mode command. The Set Mode and Reset Mode commands are described under the
next heading.

3-17
7DEOH6XPPDU\RI6HOHFWDEOH0RGHV
02'( 01(021,& 6285&( 3V!
$16,6SHFLILHG0RGHV 
.H\ERDUG/RFNRXW .$0 5HPRWH 
0RGH
6HQG5HFHLYH0RGH 650 /RFDO  5HPRWH 
1HZ/LQH0RGH /10 /RFDO5HPRWH 
'(&3ULYDWH0RGHV 
6FUHHQ%DFNJURXQG '(&6&10 /RFDO5HPRWH 
0RGH
$XWR:UDS$URXQG '(&$:0 /RFDO5HPRWH 
0RGH
2ULJLQ0RGH '(&20 5HPRWH 
.H\SDG0RGH  '(&.3$0 5HPRWH QRQH
7&63ULYDWH0RGHV 
3ROOHG7RXFK0RGH )370 5HPRWH 
7RXFK3DQHO/RFNRXW )7/0 5HPRWH 
0RGH
12&+$1*( )1&$0 5HPRWH 
$WWULEXWH0RGH
3RZHU8S,QWHUUXSW )38,0 5HPRWH 
0RGH
6HWXS/RFNRXW0RGH )68/0 5HPRWH 
([WHQGHG5HSRUW )(50 5HPRWH 
0RGH
(UURU,QWHUUXSW0RGH )(,0 5HPRWH 
)227127(6
 $16,VSHFLILHGPRGHVDUHVHWDQGUHVHWE\WKHIROORZLQJFRPPDQGV
(6&!>3V!3V!O WRUHVHW
(6&!>3V!3V!K WRVHW
 '(&SULYDWHPRGHVDUHVHWDQGUHVHWE\WKHIROORZLQJFRPPDQGV
(6&!>"3V!3V!O WRUHVHW
(6&!>"3V!3V!K WRVHW
 7&6SULYDWHPRGHVDUHVHWDQGUHVHWE\WKHIROORZLQJFRPPDQGV
(6&!>!3V!3V!O WRUHVHW
(6&!>!3V!3V!K WRVHW
 7KH6HQG5HFHLYHPRGHLVFRQWUROOHGORFDOO\E\WKH/RFDO(FKRSDUDPHWHULQWKH6HWXS6FUHHQ
 7KH.H\SDGPRGHLVVHWWRDSSOLFDWLRQPRGHE\(6&! DQGLVVHWWRQXPHULFPRGHE\(6&!!

3-18
7&602'(&200$1'6
TCS Mode commands set or reset one or more TCS modes. The TCS Mode commands are:

• Reset Mode (Remote)

• Set Mode (Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begin on a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC- private commands.

3-19
5HVHW0RGH&RPPDQG>50@ 5HPRWH
The Reset Mode command allows the host to reset one or more TCS modes of the same type
(ANSI-specified, DEC-private or TCS-private).
A detailed description of each TCS mode is provided with the description of the respective mode
command in Chapter 4.

'()$8/7
Each mode has its own default value.

23(5$72586$*(
The user can set four modes by changing parameters in the Setup Screen (Table 3-5).

+26786$*(
<ESC>[<Ps>; ... ; <Ps> l (for ANSI-specified modes)
<ESC>[?<Ps>;... ; <Ps> l (for DEC-private modes)
<ESC>[> <Ps>; ... ; <Ps> l (for TCS-private modes)
<Ps> is a selective parameter that determines which mode or modes are to be reset. Table 3-5
shows the value of this parameter for each mode.
NOTE
The Final code for this command is a lowercase letter “L”, for “low” (ASCII 6c hex). Note that the Control
Sequence Introducer alone introduces ANSI- specified mode commands, while the optional private
command code specifies the type of mode.

• For ANSI-specified modes: <ESC>[

• For DEC-private modes: <ESC>[?

• For TCS-private modes: <ESC>[>

3266,%/((55256
If <Ps> is omitted or has the value 0, then that parameter is ignored.
If <Ps> is not a legal value (for the type of mode defined by the Control Sequence Introducer),
that parameter is ignored.

3-20
(;$03/(6
<ESC>[2;12l
Resets the ANSI-specified modes, Keyboard Lockout Mode [KAM] and Send-Receive Mode
[SRM].
<ESC> [? 5 l
Resets the DEC-private mode, Screen Background Mode (DECSCNM).
<ESC> [> 3;1l
Resets the TCS-private modes, NOCHANGE Attribute Mode {FNCAM} and Polled Touch
Mode {FPTM}.

3-21
6HW0RGH&RPPDQG>60@ 5HPRWH
The Set Mode command allows the host to set one or more TCS modes of the same type (ANSI-
specified, DEC-private or TCS-private).
A detailed description of each TCS mode is provided with the description of the respective mode
in Chapter 4.

'()$8/7
Each mode has its own default value.

23(5$72586$*(
The user can set four modes by changing parameters in the Setup Screen (see Table 3-5).

+26786$*(
<ESC> [<Ps>;... ; <Ps> h (for ANSI-specified modes)
<ESC> [? <Ps>.... ; <Ps> h (for DEC-private modes)
<ESC> [> <Ps>;... ; <Ps> h (for TCS-private modes)
<Ps> is a selective parameter that determines which mode or modes are to be set. Table 3-5
shows the value of this parameter for each mode.
The Final code for this command is h (for “high”).
Notice that the Control Sequence Introducer alone introduces ANSI-specified mode commands,
while the optional private command code specifies the type of mode.

• For ANSI-specified modes: <ESC> [

• For DEC-private modes: <ESC> [?

• For TCS-private modes: <ESC> [>

3266,%/((55256
If <Ps> is omitted or has the value 0, then that parameter is ignored.
If <Ps> is not a legal value (for the type of mode defined by the Control Sequence Introducer),
that parameter is ignored.

3-22
(;$03/(6
<ESC>[20h
Sets the ANSI-specified mode, New Line Mode [LNM].
<ESC>[?7h
Sets the DEC-private mode, Auto Wrap-Around Mode (DECAWM).
<ESC>[>4;5h
Sets the TCS-private modes, Power-Up Interrupt Mode (FPUIM) and Setup Lockout Mode
(FSULM).

3-23
&2/257&66800$5<2)&2/25352*5$00,1*
The color TCS has eight basic colors programmed in Read-Only Memory (ROM): black, red,
green, yellow, blue, magenta, cyan, and white.
For each character on the display, the foreground color and background color can be
programmed independently. The character colors are handled like any other character attributes,
except they can be selected locally from the Setup Screen, as well as remotely with the Set
Command Attributes command. For details see Character Interpretation Commands, Chapter 5.

'LVSOD\LQJDQG(UDVLQJ&RORU&KDUDFWHULVWLFV
Many TCS commands cause characters to be displayed or erased. Normally, the color TCS
displays each character’s foreground and background in the currently selected colors. When
characters are erased, each erased character is replaced by a space character in the current
background color. However, the color TCS has several controls that provide much flexibility
over when and how foreground and background colors are actually used. These capabilities are
summarized in the following paragraphs.

+LJKOLJKWLQJ&RORU&KDUDFWHUV
Each of the eight basic colors has an associated highlight color which is generally a lighter or
brighter version of the basic color. When the highlight attribute is selected, using the Set
Character Attributes command, the highlight color is sustained for the currently programmed
foreground color.

5HYHUVLQJ)RUHJURXQGDQG%DFNJURXQG&RORUV
The TCS has two controls that cause the selected foreground and background colors to reverse
positions: Screen Background Mode and the reverse-video character attribute.

• The Screen Background Mode command controls the foreground/background color


relationship for the entire TCS display. While this mode is reset, normal video is in effect,
while it is set, reverse-video is in effect. The Screen Background Mode command can be
issued locally or remotely. Refer to Screen Appearance Commands in Section 5.

• The reverse-video character attribute is a parameter of the Set Character Attributes


command. For each character with this attribute selected, the foreground color replaces the
background color and the background color replaces the foreground color.
These two controls interact such that when the Screen Background Mode is set and the reverse-
video attribute is selected for a given character, the character is displayed with normal
foreground/background color relationship.

3-24
&RQFHDOLQJ&RORU&KDUDFWHUV
Colors can be concealed using the Set Character Attributes command to do two functions:

• select a conceal color

• select the concealed attribute for any characters you wish to temporarily conceal
Any of the eight basic colors can be selected as the conceal color. Normally, the conceal color
should be the same as the background color used for most of the screen. When the concealed
attribute is selected for any area of the screen , the currently programmed conceal color is used to
fill the foreground and background of each character of that area.
Concealed characters can be made visible again by sending the Reverse Character Attributes in a
Region command to turn off the conceal attribute. See Region Commands in Section 6.

5HDGLQJD&KDUDFWHU·V$WWULEXWHV
An application program that runs on the host computer can determine which character attributes
are in effect at any given time. The Read Character Attributes Under Cursor command (see
Section 5) can read the character attributes of a character under the cursor for any cursor position
on the display.

&RORU&RQWUROVRQWKH6HWXS6FUHHQ
Three TCS features pertaining to color can be controlled locally:

• Screen Background Mode command

• Foreground Color

• Background Color
Refer to Color TCS Setup Screen Programming Considerations in Section 4 for more
information.

3-25
&+$37(5&21752//,1*7+(6(7836&5((1$1'
6(5,$/,17(5)$&(
,1752'8&7,21
This chapter describes the commands that control the Setup Screen and serial interface in the
Touch Control Screen (TCS). Topics include:

• An overview of the volatility of TCS functions

• Setup Screen programming considerations

• Setup Screen commands

• Communication commands
The Setup Screen commands control the user’s access to the Setup Screen. They can also be used
to save, recall, or reset Setup Screen parameters remotely.
The Communication commands have three functions:

• configuring the serial interface to meet the host communication requirements

• selecting whether the TCS accepts remote commands from the host computer or keyboard

• clearing user inputs

7&6)81&7,21$/92/$7,/,7<
Table 4-1 provides an overview of the volatility of TCS functions. This table shows the state of
the TCS immediately after the following events:

• First power-up or hard reset

• Subsequent power-ups or soft reset

• Execution of the Recall Setup command


A soft reset is executed on remote command from the host or when the user touches RESET or
types Shift/Setup on the optional keyboard from within the Setup Screen. A hard reset is
executed only on remote command from the host. Soft and hard resets are described in more
detail later in this chapter, under Reset Command.
The Recall Setup command is described later under its own heading.

4-1
7DEOH2YHUYLHZRI)XQFWLRQDO9RODWLOLW\
)81&7,21 ),56732:(583 /$7(532:(583 5(&$//6(783
25+$5'5(6(7 2562)75(6(7
&RPPXQLFDWLRQ
$GGUHVV6WDWH $GGUHVVHG  8QDGGUHVVHG  &RQGLWLRQDO 
$GGUHVV 56  /DVWVDYHG /DVWVDYHG
%DXG5DWH   /DVWVDYHG /DVWVDYHG
'DWD%LWV   /DVWVDYHG /DVWVDYHG
3DULW\(QDEOH 2II  /DVWVDYHG /DVWVDYHG
3DULW\6HQVH 2GG  /DVWVDYHG /DVWVDYHG
6WRS%LWV   /DVWVDYHG /DVWVDYHG
;21;2))0RGH 2Q  /DVWVDYHG /DVWVDYHG
/RFDO(FKR0RGH 2II  /DVWVDYHG /DVWVDYHG
6HQG5HFHLYH0RGH 6HW  /DVWVDYHG /DVWVDYHG
/RFDO5HPRWH0RGH 5HPRWH 5HPRWH 8QFKDQJHG
+DUGZDUH+DQGVKDNH 1RQH  /DVWVDYHG /DVWVDYHG
7UDQVPLW0RGH 1RUPDO /DVWVDYHG /DVWVDYHG
6WDOO8QVWDOO 8QVWDOOHG 8QVWDOOHG 8QFKDQJHG
(UURU,QWHUUXSW0RGH 2II 2II 8QFKDQJHG
3RZHU8S,QWHUUXSW0RGH 2II 8QFKDQJHG 8QFKDQJHG
5HSRUWLQJ)RUPDW 'HIDXOW 8QFKDQJHG 8QFKDQJHG
,QSXW%XIIHU &OHDUHG &OHDUHG 8QFKDQJHG
2XWSXW%XIIHU &OHDUHG &OHDUHG 8QFKDQJHG
576 2II2Q 2II2Q 8QFKDQJHG
'75 2II2Q 2II2Q 8QFKDQJHG
6576 2II2Q 2II2Q 8QFKDQJHG
7UDQVPLW/LQHV 'ULYHQ  8QGULYHQ  &RQGLWLRQDO 
'LVSOD\HG6FUHHQ
&RQWHQWV &OHDUHG &OHDUHG 8QFKDQJHG
6WDQGDUG&KDUDFWHU6HW $6&,, $6&,, 8QFKDQJHG
([WHQGHG&KDUDFWHU6HW 6SHFLDO 6SHFLDO 8QFKDQJHG
&KDUDFWHU$WWULEXWHV6HOHFWHG 1RUPDO 1RUPDO 8QFKDQJHG
12&+$1*($WWULEXWH0RGH 2II 2II 8QFKDQJHG
2ULJLQ0RGH 5HVHW 5HVHW 8QFKDQJHG
6FUROOLQJ5HJLRQ )XOOGLVSOD\ )XOOGLVSOD\ 8QFKDQJHG

4-2
7DEOH2YHUYLHZRI)XQFWLRQDO9RODWLOLW\&RQWLQXHG
)81&7,21 ),56732:(583 /$7(532:(583 5(&$//6(783
25+$5'5(6(7 2562)75(6(7
'LVSOD\HG6FUHHQ
&RORU&RQWUDVW 'HIDXOW /DVWVDYHG /DVWVDYHG
&XUVRU3RVLWLRQ +RPH +RPH 8QFKDQJHG
&XUVRU7\SH 6ORZEOLQNLQJEORFN /DVWVDYHG /DVWVDYHG
6FUHHQ%DFNJURXQG 1RUPDO /DVWVDYHG /DVWVDYHG
)RUHJURXQG&RORU  ZKLWH /DVWVDYHG /DVWVDYHG
%DFNJURXQG&RORU  EODFN /DVWVDYHG /DVWVDYHG
&RQFHDO&RORU  EODFN /DVWVDYHG /DVWVDYHG
'LVSOD\$FWLYLW\ 2Q /DVWVDYHG /DVWVDYHG
6WRUHG6FUHHQV 'HOHWHG 8QFKDQJHG 8QFKDQJHG
0LVFHOODQHRXV
6FUHHQ6HOHFWHG  'LVSOD\HG  'LVSOD\HG 8QFKDQJHG
&KDUDFWHU6HW6HOHFWHG 6WDQGDUG 6WDQGDUG 8QFKDQJHG
'\QDPLF&KDU)RQW $6&,, 8QFKDQJHG 8QFKDQJHG
'\QDPLF&KDU)RQW 6SHFLDO 8QFKDQJHG 8QFKDQJHG
2S6WDWXV:LQGRZ &OHDUHG &OHDUHG 8QFKDQJHG 
$XWR:UDS0RGH 2II /DVWVDYHG /DVWVDYHG
1HZ/LQH0RGH 2II /DVWVDYHG /DVWVDYHG
15& 2II /DVW6DYHG /DVWVDYHG
7RXFK3DQHO
7RXFK3DQHO/RFNRXW0RGH 8QORFNHG 8QORFNHG 8QFKDQJHG
3ROOHG7RXFK0RGH 2II 2II 8QFKDQJHG
$XWR5HSHDW5DWH 2II 2II 8QFKDQJHG
7RXFK$XGLEOH$WWULEXWH0RGH %HHS %HHS 8QFKDQJHG
([WHQGHG5HSRUW0RGH 2II 2II 8QFKDQJHG
7RXFKNH\V &OHDUHG &OHDUHG 8QFKDQJHG
7RXFKNH\7\SHV $XWR5HSHDW $XWR5HSHDW 8QFKDQJHG
7RXFKNH\9LVXDO([WHQW 1RQH 1RQH 8QFKDQJHG
7RXFKNH\7RJJOH6WDWH 2II 2II 8QFKDQJHG

4-3
7DEOH2YHUYLHZRI)XQFWLRQDO9RODWLOLW\&RQWLQXHG
)81&7,21 ),56732:(583 /$7(532:(583 5(&$//6(783
25+$5'5(6(7 2562)75(6(7
.H\ERDUG
6HW8S/RFNRXW0RGH 8QORFNHG 8QORFNHG 8QFKDQJHG
.H\ERDUG/RFNRXW0RGH 8QORFNHG 8QORFNHG 8QFKDQJHG
&DSV/RFN 8QORFNHG 8QORFNHG 8QFKDQJHG
6FUROO/RFN 8QORFNHG 8QORFNHG 8QFKDQJHG
.H\SDG0RGH 1XPHULF 1XPHULF 8QFKDQJHG
+DUGZDUH
6HOI7HVWV 3HUIRUPHG 3HUIRUPHG 1RQH
%HHSHU 6RXQGHG 6RXQGHG 6LOHQW
1RWHV
 7KHVHLWHPVDUHXQFKDQJHGGXULQJKDUGUHVHWWRDYRLGGLVWXUELQJFRPPXQLFDWLRQZLWKWKHKRVW
 7UXHRQO\LIDQRQYRODWLOHPHPRU\FKHFNVXPHUURUGRHVQRWRFFXUGXULQJWKHRSHUDWLRQ

4-4
6(7836&5((1352*5$00,1*&216,'(5$7,216
The following paragraphs explain how the host can interact with the Setup Screen. For Setup
Screen operating instructions, refer to the Installation Guide. For additional information about
particular modes, refer to the table "Summary of TCS Commands" in Chapter 3 of the
Application Developer’s Guide.

.H\ERDUG/RFNRXW
The external keyboard can be locked out during normal operation, however, it is never locked out
while the Setup Screen is displayed, even if the Keyboard Lockout Mode is set. The Keyboard
Lockout Mode setting takes effect again as soon as the Setup Screen is exited or the
Communication Monitor is entered.

7RXFK3DQHO/RFNRXW
Touch panel input is never locked out while the Setup Screen is displayed, even if the Touch
Panel Lockout Mode is set. The Touch Panel Lockout Mode setting takes effect again as soon as
the Setup Screen is exited or the Communication Monitor is entered.

'LVSOD\$FWLYLW\
Entering the Setup Screen is the only operation that temporarily overrides a Display Activity
parameter setting of "off." (The Display Activity parameter controls whether the screen is light
or dark.)
If the display is dark because the Display Activity parameter is set to "off" (or because the
display has timed out), the display relights when the Setup Screen is called up.
If the Display Activity parameter is set to "off" while the Setup Screen is displayed, the display
remains lit until the Setup Screen is exited and then the display darkens.

'LVSOD\&RQWHQWV
When the Setup Screen is entered, the characters previously shown on the display are saved in
memory with their attributes. When the Setup Screen is exited, the previous screen is restored.
Changes to the Setup parameters can be initiated by the user or the host, while the Setup Screen
is displayed or when it is not. While the Setup Screen is displayed, changes to the Setup
parameters take effect immediately if they are initiated by the user. The changes can be viewed
on the display as they are made, with the exception of changes to the Display Activity parameter,
which take effect only after the Setup Screen has been exited. Changes to the Setup parameters
initiated by the host while the Setup Screen is being displayed are buffered and have no effect
until the Setup Screen is exited. If the Setup Screen is not displayed, changes to the Setup
parameters initiated by the host take effect immediately.

NOTE
A change to the NRC affects only the characters received after the NRC has been changed.

4-5
+RVW&RPPXQLFDWLRQGXULQJ6HWXS6HVVLRQ
While the Setup Screen is displayed, the TCS continues to receive codes from the host but does
not display or otherwise act on them. The TCS stores the codes until its input buffer is 75% full,
at which time the TCS stalls the host.
When the Setup Screen is exited, the TCS interprets the codes received from the host during the
Setup session and unstalls the host.

0HWKRGVRI&KDQJLQJ6HWXS3DUDPHWHUV
On power-up, the TCS checks the nonvolatile Setup memory for valid Setup parameter
initialization data. If the data in the memory is valid, it is used. If the data in nonvolatile memory
is invalid, the default values contained in factory-programmed ROM are used as the initial values
for the parameters. Parameter values, after being initialized by powering on the TCS, can be
changed by any of the following three methods:
1. Changing individual parameters using local commands or (where allowed) remote commands.
The user can change any Setup parameter by using local commands (using the Setup Screen).
The host can change only certain Setup parameters by sending remote commands. The source
of control over individual Setup parameters is summarized in Table 4-2

7DEOH&RQWURORYHU,QGLYLGXDO6HWXS3DUDPHWHUV
6(7833$5$0(7(5 6285&(2)&21752/
%DFNJURXQG /RFDO5HPRWH
)RUHJURXQG&RORU /RFDO5HPRWH
%DFNJURXQG&RORU /RFDO5HPRWH
'LVSOD\$FWLYLW\ /RFDO5HPRWH
&XUVRU7\SH /RFDO5HPRWH
15& /RFDO5HPRWH
$GGUHVV /RFDO
%DXG5DWH /RFDO
'DWD%LWV /RFDO
3DULW\(QDEOH /RFDO
3DULW\6HQVH /RFDO
6WRS%LWV /RFDO
;21;2)) /RFDO
/RFDO(FKR /RFDO5HPRWH
/RFDO5HPRWH /RFDO
1HZ/LQH /RFDO5HPRWH
$XWR:UDS /RFDO5HPRWH
+DUGZDUH+DQGVKDNH /RFDO
7UDQVPLW0RGH /RFDO
* For the color TCS only.
** The Local echo feature is controlled remotely by the Send-Receive Mode command.

2. Recalling all parameter values using the Recall Setup command.

4-6
The Recall Setup command replaces all the Setup parameters with the values stored by the
last Save Setup command. Recall Setup is executed when the user presses RECALL on the
Setup Screen (or types Shift/R on the keyboard), or when the host sends the remote
command Recall Setup. (See Recall Setup Command, later in this chapter.)
3. Resetting or recalling parameters by doing either a hard or soft reset with the Reset
command.
The host can do either a hard or soft reset. The user can do a soft reset only (by pressing
RESET on the Setup Screen or by typing Shift/Setup on the keyboard). For more information
on hard and soft resets, see Reset Command, later in this chapter.

&RORU7&66HWXS6FUHHQ3URJUDPPLQJ&RQVLGHUDWLRQV
Color attributes for characters displayed on the TCS are controlled with the Set Character
Attributes command. Full control of this command is available by sending a control string from
the host or by the keyboard in local mode. Refer to Character Interpretation Commands in
Section 5 for details.
7KHIRUHJURXQGDQGEDFNJURXQGFRORUSDUDPHWHUVRIWKH6HW&KDUDFWHU$WWULEXWHVFRPPDQGFDQEH
FRQWUROOHGORFDOO\DQGUHPRWHO\7KHVHSDUDPHWHUVHQDEOHWKHKRVWXVHUWRVHOHFWDQ\RIHLJKWFRORUV
WRGLVSOD\FKDUDFWHUFHOOIRUHJURXQGDQGEDFNJURXQGDQGDUHOLVWHGLQWKHXSSHUULJKWSRUWLRQRIWKH
6HWXS6FUHHQ7DEOHGHILQHVWKHQXPHULFYDOXHVIRUWKHIRUHJURXQGDQGEDFNJURXQGFRORU
SDUDPHWHUV
7DEOH1XPHULF9DOXHVIRU)RUHJURXQGDQG%DFNJURXQG&RORU3DUDPHWHUV

&2/25 )25(*5281' %$&.*5281'


%ODFN   GHIDXOW
5HG  
*UHHQ  
<HOORZ  
%OXH  
0DJHQWD  
&\DQ  
:KLWH  GHIDXOW 

4-7
&RORUV8VHGWR'LVSOD\WKH6HWXS6FUHHQDQG,WV6XEVFUHHQV
The Setup Screen and its subscreens are displayed using the white foreground and blue
background whenever the Setup Screen is entered. The numeric values shown in the above table
indicate the colors last set by the Set Character Attributes Command for the screen that was
displayed before entering the Setup Screen.
While in the Setup screen, if either the foreground or background color is selected, the Setup
Screen immediately displays in the foreground and background colors that match the numeric
values in the parameter list but the numeric value does not change. After the initial selection of
colors, any subsequent selection of colors will change the numeric value and be displayed
immediately.
If the foreground and background are set to the same color, the selected numeric values are
shown in the parameter list but the Setup Screen and its subscreens are displayed in default
colors to ensure setup information is always visible.

(IIHFWVRI6FUHHQ%DFNJURXQG0RGHRQ&RORU$WWULEXWHV
The Screen Background Mode can be controlled locally with the Background parameter on the
Setup Screen and remotely by the control string from the host. Changes in the Screen
Background Mode take effect immediately.
Assuming the reverse-video attribute is not in effect for any given character, the Screen
Background Mode has the following effect on foreground and background colors:
• When Screen Background Mode is reset (normal), each character’s foreground is displayed
in the selected foreground color and the background in the selected background color.

• When Screen Background Mode is set (reverse), each character’s foreground is displayed in
the selected background color and the background in the selected foreground color.

NOTE
Characters with the reverse-video attribute selected are displayed with a foreground/background color
relationship opposite to that described above. For details, see Set Character Attributes Command in
Section 5.

8VHU+RVW&RQIOLFW5HVROXWLRQ
Several of the Setup parameters that can be controlled locally by the user from within the Setup
Screen can also be programmed by the host with remote commands. (See Table 4-2.) Therefore,
conflict between the actions of the user and the host can occur. Conflicts are resolved as follows:
1. Both the user and the host can change local/remote Setup parameters with equal priority. The
value of a Setup parameter remains unchanged until the value is changed by either the user or
host. (A value will also change if the TCS is turned off before a previous change is saved.)
2. Where the host must have absolute control over the configuration of the TCS, the Setup
Lockout Mode should be set. This prevents the user from entering the Setup Screen and
changing the configuration of the TCS in any way, yet still allows the user to enter
information through the touch panel and optional keyboard. (To set the Setup Lockout Mode,
see Setup Lockout Mode Command, later in this chapter.)

4-8
3HUPDQHQFHRI&KDQJHVWR6HWXS3DUDPHWHUV
To ensure that the Setup parameter values currently in use are saved while the TCS is turned off,
a Save Setup command must be executed. The Save Setup command causes the TCS to store the
Setup parameters in nonvolatile Setup memory for automatic recall at the next power-up. (The
Save Setup command is described in detail later in this chapter.)
The programmer should be aware of three special cases regarding the permanence of changes to
operating parameters:
1. The setting of the Local/Remote Mode is never saved and is always restored as "remote."

This is a safety device that ensures the TCS never powers up or resets into the Local Mode,
which could confuse the user or, in installations where the user is barred from the Setup
Screen, trap the TCS in the Local Mode.
2. The reporting format is preserved during power losses.

This ensures that the TCS uses the correct reporting format when it sends a power-up
interrupt to the host. (The TCS sends a power-up interrupt only if the Power-Up Interrupt
Mode is set.)
3. A hard reset, available only to the host, does not affect the communication-related
parameters (Address, XON/XOFF Mode, Baud Rate, Data Bits, Parity Enable, Parity Sense,
Stop Bits, Hardware Handshake, and Transmit Mode). The host cannot, therefore,
inadvertently disrupt communication.

NOTE
A remote soft reset is not recommended because it could change communication parameters. However, if
the host is to perform a soft reset, the soft reset should be preceded by a Save Setup command to ensure
that communication parameters currently in use are not changed.
If display activity is set to "off" and saved with a Save Setup command, the next time power is applied to
the TCS, the TCS starts up with the screen off.

4-9
6(7836&5((1&200$1'6
The Setup Screen commands are used to control the user’s access to the Setup Screen, and to
save, recall, or reset Setup parameters remotely.
The Setup Screen commands are:

• Setup Lockout Mode (Remote)

• Save Setup (Local/Remote)

• Recall Setup (Local/Remote)

• Reset (Local/Remote)
Setup Screen commands cannot be used to set Setup Screen parameters individually. The
command to set an individual parameter is grouped with commands functionally related to that
parameter. For example, to set the Baud Rate parameter, see Communication Commands, later in
this chapter.
The Setup Screen commands are described in detail in the following pages. For ease of reference,
each command description begins on a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC-private commands.

4-10
6HWXS/RFNRXW0RGH&RPPDQG^)68/0` 5HPRWH
The Setup Lockout Mode command allows the host to lock the user out of the Setup Screen.
This command is useful when the other methods of preventing the user from changing Setup
Screen parameters (locking the entire keyboard or making the SET UP switch inaccessible) are
inappropriate. This feature gives the host complete control of the TCS.
The host controls the Setup Lockout Mode using the Set Mode and Reset Mode commands.
When the Setup Lockout Mode is reset (the default), the user can enter the Setup Screen by
pressing the SET UP switch on the optional keyboard, allowing the user to change the Setup
Screen parameters. When the Setup Lockout Mode is set, the SET UP switch on the keyboard
has no effect on TCS operation.
The state of the Setup Lockout Mode is not preserved during loss of power. If a secure system is
required, the host must immediately set the Setup Lockout Mode on reapplication of power. This
can be done by programming the host to respond to a power-up interrupt from the TCS. (For
more information about power-up interrupts, see Power-Up Interrupt Command, in this chapter.)

'()$8/7
Reset. (This setting allows user access to the Setup Screen.)

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>5h
Sets the Setup Lockout Mode.
<ESC>[>5l
Resets the Setup Lockout Mode. (The terminator for the reset command is the letter "l",
ASCII 6C hex.)

4-11
6DYH6HWXS&RPPDQG^)668` /RFDO5HPRWH
The Save Setup command saves the current values of the Setup parameters in nonvolatile
Setup memory.
The saved Setup parameter values are automatically recalled when the TCS is turned on or when
a Recall Setup command or Soft Reset command is issued by the user or host.

23(5$72586$*(
The user issues the Save Setup command by entering the Setup Screen and pressing the SAVE
touchkey or typing Shift/S on the optional keyboard.

+26786$*(
<ESC>[1z

3266,%/((55256
When this command is given, the TCS always attempts to save the Setup parameters, even if the
nonvolatile Setup memory is malfunctioning. A checksum is calculated and stored with the Setup
parameters in nonvolatile memory. During power-up or execution of a Recall Setup command,
the TCS reads back the parameter data and verifies its integrity with the checksum. If the
checksum is in error, the parameter values are not changed and an error is reported in the
Operational Status Window of the Setup Screen.

4-12
5HFDOO6HWXS&RPPDQG^)568` /RFDO5HPRWH
The Recall Setup command allows the user or host to recall the Setup parameters that were in
effect when the Save Setup command was last executed.
When the Recall Setup command is issued, the Setup parameters in effect at the time are
overwritten by the most recently saved Setup parameters. This allows a program to temporarily
modify the TCS Setup parameters, then restore the Setup parameters to their original values.
The effects of the Recall Setup command are summarized in Table 4-l.

23(5$72586$*(
The user issues the Recall Setup command by entering the Setup Screen and pressing the
RECALL touchkey or typing Shift/R on the optional keyboard.

+26786$*(
<ESC>[2z

3266,%/((55256
When previously saved Setup parameter values are recalled from nonvolatile Setup memory by
the Recall Setup command, the TCS verifies the checksum of the parameter data. If the checksum
is in error, the nonvolatile memory has malfunctioned. The Setup parameter values are not
changed and an error is reported in the Operational Status Window of the Setup Screen.

4-13
5HVHW&RPPDQG>5,6@ /RFDO5HPRWH
The Reset command allows the user or host to reset the TCS. The host can perform a soft or
hard reset.
CAUTION
A hard reset deletes stored screens and reinitializes the dynamic character fonts.

The user can perform the soft reset only. Table 4-1 summarizes the effects of the hard and
soft resets.
The soft reset is the type of reset most frequently used. It is, in effect, the equivalent of turning
the power off and then on again. The soft reset returns the TCS to the operational state it was in
immediately following the last power-up, unless new Setup parameters have been saved since the
last power-up. (The soft reset recalls the Setup parameters most recently saved in nonvolatile
Setup memory.)
The hard reset returns the TCS to its factory-programmed default setup state. This is useful when
the host must guarantee that all parameters are in a known state without having to account for
parameter values that may have been saved in nonvolatile Setup memory by a Save Setup
command. The message “WAIT - INITIALIZING EXPANSION MEMORY” is displayed when
the unit resets.
While the TCS executes a soft or hard reset, the host serial interface is temporarily disabled. On
completion of the reset, the TCS sends an XON to the host. The host can use the XON as notice
to resume transmission to the TCS. Alternatively, the host can wait for a specified amount of
time after issuing a Reset command in order to guarantee that the reset has been completed. The
amount of time required for the reset to complete depends on the type of reset.

23(5$72586$*(
The user can perform a soft reset by touching RESET on the Setup Screen or by typing
Shift/Setup on the optional keyboard. The user can perform a hard reset only when Local/Remote
Mode is set to local. See Local/Remote Mode-Command for details.

+26786$*(
<ESC><Ps>c
<Ps> is a selective parameter.
If <Ps> is omitted or 0, a soft reset is performed.
If <Ps> is l, a hard reset is performed.

4-14
3266,%/((55256
When performing a soft reset remotely, use caution to avoid accidentally disrupting the
communication between the TCS and the host. A soft reset reinitializes the host interface
communication parameters such as Baud Rate, Data Bits, or Parity Sense, using the values saved
by the most recent Save Setup command.

NOTE
Generally, a remote soft reset is not recommended. However if the host must do a soft reset, it should be
preceded by a Save Setup command to ensure that current communication parameters are not changed.

4-15
&20081,&$7,21&200$1'6
The Communication commands have three functions:

• configuring the serial interface to meet the communication requirements of the host

• selecting whether the TCS accepts remote commands from the host computer or from the
keyboard

• clearing user inputs


For a description of the serial interface, refer to Chapter 2, Interfacing to the Host Computer.
The Communication commands are:

• Address command (Local)

• Baud Rate command (Local)

• Data Bits command (Local)

• Parity Enable command (Local)

• Parity Sense command (Local)

• Stop Bits command (Local)

• XON/XOFF Mode command (Local)

• Local/Remote Mode command (Local)

• Hardware Handshake command (Local)

• Transmit Mode command (Local)

• Reporting Format command (Remote)

• Clear User Inputs command (Remote)


Many of the communication commands are local (that is, accessible only through the Setup
Screen). This prevents the host from accidentally disrupting communication by setting a
parameter incorrectly.
The Communication commands are described in detail in the following pages. For ease of
reference, each command description begins at the top of a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC-private commands.

4-16
$GGUHVV&RPPDQG /RFDO
The Address command is used to specify the interface or when connected to the host in a
multidrop configuration to set the address to which the TCS responds.
In RS-485, the address determines when and if the TCS is allowed to transmit over the
communication link. It also determines whether commands sent by the host take effect on a given
TCS. The address is encoded to avoid confusion with other codes crossing the communication
link. The numeric address as designated in the Setup Screen is added to the ASCII code
representing the character zero. The result forms the address code as it should be transmitted by
the host. Multidrop addresses and their resulting codes are as follows:
7DEOH0XOWLGURS$GGUHVVHVDQG&RGHV
,IWKH$GGUHVVLV 7&65HVSRQGVWR$GGUHVV&RGH +(;$6&,,9DOXH
³56´ 7&6GRHVQRWXVHPXOWLGURSSURWRFRO BB
³56´ 7&6GRHVQRWXVHPXOWLGURSSURWRFRO BB
  
  
  
  
  
  
  
  
  
  $
  %
  &
 '
 ! (
 " )
 # 
 $ 
 % 
 & 
 ' 
 ( 
 ) 

4-17
7DEOH0XOWLGURS$GGUHVVHVDQG&RGHVFRQWLQXHG
,IWKH$GGUHVVLV 7&65HVSRQGVWR$GGUHVV&RGH +(;$6&,,9DOXH
 * 
 + 
 , 
 - $
 . %
 / &
 0 '
 1 (
 2 )
 3 

If the address is set to “RS232” or “RS-422” the TCS and host communicate as if they were the
only devices on the communication link. The TCS leaves its transmitter connected to the
communication link at all times, except during power-down and reset.
If the address is set to any value 1 through 32, the TCS operates using multidrop protocol and
responds to the address chosen. Address codes sent by the host with a value greater than P
(greater than address 32) are ignored. When the host addresses a TCS individually, only the
addressed TCS connects its transmitter to the communication link. Regardless of the address
setting, the TCS receiver is always connected.
The effects of multidrop address on control codes received by the TCS are as follows:
7DEOH(IIHFWVRI0XOWLGURS$GGUHVVHVRQ&RQWURO&RGHV
$6&,,+(; $6&,,01(021,& 0HDQLQJ:KHQ$GGUHVV 0HDQLQJ:KHQ$GGUHVV
´56µRU´56µ 
 (27! QRQH LJQRUHG (QGRI7UDQVPLVVLRQ
 (14! QRQH LJQRUHG (QTXLUHLI7&6LV
DGGUHVVHG
 $&.! QRQH LJQRUHG QRQH LJQRUHG
 '/(! QRQH LJQRUHG 'DWD/LQN(VFDSH
 1$.! QRQH LJQRUHG QRQH LJQRUHG
*This code is used in multidrop protocol, but is only transmitted by the TCS and is ignored if received.

The TCS at address 1 plays a special role during broadcast mode. This TCS is the only TCS on
the link to connect its transmitter during broadcast. The TCS at address 1 sends flow control
codes only. It does not send keystrokes or reports (except Ctrl/S and Ctrl/Q keystrokes when
XON/XOFF mode is on). Broadcasting is further described in Chapter 2, Message Transfer
Procedure.

4-18
Refer to Chapter 2, Multidrop Communication Protocol for a complete description of the
purpose, implementation, and implications of multidrop protocol.

'()$8/7
“RS232”

23(5$72586$*(
The user sets the address by entering the Setup Screen and setting the Address parameter to the
desired value using touchkeys or the optional keyboard.

+26786$*(
None. (This is a local command only.)

3266,%/((55256
If a multidrop address is set between 1 and 32 and the host attempts to communicate without first
addressing the TCS, the TCS will not respond.
If the multidrop address is set to “RS232” or “RS-422” and the host attempts to communicate
using multidrop, the TCS will display the address portion of the communication establishment
request, and will not acknowledge the request.

4-19
%DXG5DWH&RPPDQG /RFDO
The Baud Rate command sets the transmission and reception speed to one of eight baud rates.
The baud rate is selected by setting the Baud Rate parameter on the Setup Screen to one of the
following values: 110, 300, 600, 1200, 2400, 4800, 9600, and 19200.
The baud rate setting selects both transmit and receive rates. The TCS cannot transmit at one rate
and receive at another.

'()$8/7
9600 baud

23(5$72586$*(
The user selects the baud rate by entering the Setup Screen and setting the Baud Rate parameter
to the desired value using touchkeys or the optional keyboard.

+26786$*(
None. (This is a local command only.)

4-20
'DWD%LWV&RPPDQG /RFDO
The Data Bits command selects either seven or eight data bits per ASCII code. The number of
data bits is selected by the user, who sets the Data Bits parameter on the Setup Screen to either 7
or 8.
If the Data Bits parameter is set to 7, the next seven bits (following the start bit) received over
the host serial interface are interpreted as data. All codes sent from the TCS to the host when the
Data Bits is set to 7 use only seven data bits. Start, Stop, and Parity bits frame the Data bits and
ensure the data is received by the host. (See Chapter 2 for more information about data formats.)
Operation with seven data bits allows the host to send codes representing the lower 128
characters (the Standard Character Set). This precludes sending codes which represent the upper
128 characters (the Extended Character Set) from the host and requires the use of the Select
Character Set command to display Extended Characters. (See Chapter 5 for complete information
about the Select Character Set command.)
If the Data Bits parameter is set to 8, the next eight bits following the start bit are interpreted as
data. This allows the host to send codes that represent the entire character set (128 Standard and
128 Extended Characters).

NOTE
Only those characters within the Standard and Extended Character Sets that are represented by graphic
codes can be directly accessed for display. Characters that are represented by control codes are not
directly displayable, as described in Chapter 3.

'()$8/7
Eight (8) data bits

23(5$72586$*(
The user selects the number of data bits by entering the Setup Screen and then setting the Data
Bits parameter to the desired value using touchkeys or the optional keyboard.

+26786$*(
None. (This is a local command only.)

4-21
3DULW\(QDEOH&RPPDQG /RFDO
The Parity Enable command enables or disables parity checking and generation. (For an
explanation of parity checking, see Parity Bit, in Chapter 2.)
Parity checking and generation are enabled or disabled by setting the Parity Enable parameter on
the Setup Screen to one of the following values:

• off

• on

• ignore
When Parity Enable is set to "on," parity checking and generating are enabled. If the Parity Sense
setting is "even," the TCS transmits even-parity data by appending a parity bit and expects
received data to have even parity. If the TCS receives data that has odd parity, the data is
displayed as a parity error (PE). If the Parity Sense setting is "odd," the TCS transmits odd-parity
data by appending a parity bit and expects received data to have odd parity. If the TCS receives
data that has even parity, the data is displayed as a parity error (PE).
When Parity Enable is set to "ignore," parity checking is disabled, but even or odd parity
generation is enabled. If the Parity Sense setting is "even," the TCS transmits even-parity data by
appending a parity bit and expects received data to have a parity bit. However, the TCS does not
check the parity of the received data. If the Parity Sense setting is "odd," the TCS transmits odd-
parity data by appending a parity bit and expects received data to have a parity bit. However, the
TCS does not check the parity of the received data.
When Parity Enable is set to "off," parity checking and generation are disabled. The TCS does
not transmit a parity bit and does not expect parity bits in the data it receives. A received code
with an appended parity bit is displayed as a framing error (FE).

'()$8/7
Off. (Parity checking and generation are disabled.)

23(5$72586$*(
The user issues the Parity Enable command by entering the Setup Screen and setting the Parity
Enable parameter to the desired value using touchkeys or the optional keyboard.

+26786$*(
None. (This is a local command only.)

4-22
3DULW\6HQVH&RPPDQG /RFDO
The Parity Sense command determines whether the TCS uses odd or even parity checking and
generation for communication with the host. (For an explanation of parity checking, see Parity
Bit, in Chapter 2.)
Parity checking is only active when Parity Enable is set to "on." Parity generation is active only
when Parity Enable is set to "on’’ or "ignore." (See the Parity Enable command in this chapter.)
Parity is selected by setting the Parity Sense parameter on the Setup Screen to one of the
following values:

• odd

• even
If the parity of the received data does not match that specified by the Parity Sense parameter (and
Parity Enable is set to "on,") the received data is assumed to be in error.
Whenever a parity error is detected (even within a control sequence) the special character PE is
displayed at the cursor position and the cursor is advanced. In addition, the error message,
"Communication parity error," is placed in the Operational Status Window of the Setup Screen.
If the error occurs within a control sequence, the control sequence is ignored. The remainder of
the control sequence (beyond the error) is interpreted as a string of graphic codes and is,
therefore, displayed.

'()$8/7
Odd parity

23(5$72586$*(
The user selects the parity sense by entering the Setup Screen and setting the Parity Sense
parameter to the desired value using touchkeys or the optional keyboard.

+26786$*(
None. (This is a local command only.)

4-23
6WRS%LWV&RPPDQG /RFDO
The Stop Bits command sets the TCS to send and receive codes with either one or two stop bits.
The number of stop bits is selected by setting the Stop Bits parameter on the Setup Screen to
either 1 or 2. If the Stop Bits parameter is set to l, then only one stop bit per code is used for both
transmitting and receiving over the host serial interface. If the Stop Bits parameter is set to 2,
then two stop bits are used for transmitting and only one stop bit is used for receiving.

'()$8/7
One (1) Stop Bit

23(5$72586$*(
The user selects the number of stop bits by entering the Setup Screen and setting the Stop Bits
parameter to the desired value using touchkeys or the optional keyboard.

+26786$*(
None. (This is a local command only.)

4-24
;21;2))0RGH&RPPDQG /RFDO
The XON/XOFF Mode command sets or resets the TCS XON/XOFF Mode. On the Setup
Screen, the user can select one of the following parameters:

• on

• off
The XON/XOFF Mode determines whether the TCS uses XON and XOFF codes for
communication flow control. Regardless of the XON/XOFF Mode setting, the TCS always uses
the SRTS and CTS control lines for flow control, if they are connected to the host.

7DEOH)ORZ&RQWURO
)/2:&21752/86,1*6576 &76
;21;2))02'( 86,1*;21;2)) &21752//,1(6
2Q <HV <HV
2II 1R 1R

While the XON/XOFF Mode is set (on), the TCS automatically sends an XOFF or XON code
when it needs to stall or unstall the host. The TCS treats XON and XOFF codes specially while
operating in this mode. When sending these codes to the host, the TCS assigns priority and
transmits them immediately, ahead of any other codes that may be in the output buffer.
When the user types Ctrl/S or Ctrl/Q on the optional keyboard, the TCS handles these keystrokes
as commands to stall or unstall the host. The TCS sends an XOFF or XON immediately to the
host and exercises the SRTS control line.
When an XON or XOFF is received from the host, the TCS always processes it immediately,
even if the input buffer is full.
While XON/XOFF Mode is reset (off), the TCS does not automatically send XOFF or XON
codes to stall or unstall the host. XON and XOFF codes can be sent while this mode is reset, but
only when the user types Ctrl/Q or Ctrl/S respectively on the optional keyboard. In this case, the
XON and XOFF codes, are not assigned priority and are handled like any other codes in the
output buffer.
The TCS handles the Ctrl/S and Ctrl/Q keystrokes as though they were not intended to stall and
unstall the host. The TCS sends the keystrokes in the order they are typed and does not exercise
the SRTS control line. When an XON or XOFF is received from the host, the TCS ignores it.
The code is not treated as a communication control code, and it cannot be received when the TCS
input buffer is full.
The only time XON/XOFF Mode should be reset is when flow control is either not needed, or is
handled exclusively by control lines.
For further information on flow control, see Buffer Overflow Control, in Chapter 2.

4-25
'()$8/7
On. (XON/XOFF Mode is enabled.)

23(5$72586$*(
The user selects the XON/XOFF Mode by entering the Setup Screen and setting the XON/XOFF
Mode parameter to the desired value using touchkeys or the optional keyboard.

+26786$*(
None. (This is a local command only.)

4-26
/RFDO5HPRWH0RGH&RPPDQG /RFDO
The Local/Remote Mode command controls whether the TCS accepts remote commands from
the host computer or from the optional keyboard.
The Local/Remote command sets the TCS either to the Remote Mode (in which the TCS accepts
remote commands from the host) or to the Local Mode (in which the TCS accepts remote
commands from the keyboard).
The TCS is in the Remote Mode for normal operation. In the Remote Mode, the TCS interprets
commands received from the host over the serial interface as remote commands. Inputs received
from the keyboard are passed on to the host.
When the TCS is in the Local Mode, the TCS temporarily ignores commands received from the
host. Instead, it interprets input received from the keyboard as if the input had come from the
host, with the following exceptions:

• The Setup key, which still calls up the Setup Screen

• User input within the Setup, Test, and Alignment Screens


The user can generate remote commands locally from the keyboard while the TCS is in the Local
Mode. It is as if the keyboard were connected in place of the host. Any invalid remote commands
that are entered through the keyboard are ignored (just as if the commands had come from the
host). Input that arrives from the host is queued up in the input buffer and is not interpreted until
the TCS is returned to the Remote Mode.

NOTE
If a stored screen is selected when Local Mode is entered, any test or command typed at the keyboard will
go to the selected screen and will not be displayed.

'()$8/7
Remote Mode. (This is the setting when the TCS is in normal use.)

23(5$72586$*(
The user selects the Local or Remote Mode by entering the Setup Screen and, using touchkeys or
the optional keyboard, setting the Local/Remote parameter to one of the following values:

• remote

• local

+26786$*(
None. (This is a local command only.)

NOTE
The Local/Remote Mode value is not stored and recalled by the Save Setup and Recall Setup commands.

4-27
+DUGZDUH+DQGVKDNH /RFDO
The Hardware Handshake command determines which RS-232 handshake signals must be
asserted before the TCS will transmit. In RS-232 systems, both CTS and DSR must be asserted
before the terminal can transmit. This causes problems in three-wire systems (RX, TX, and
GND) where CTS and DSR are not supported. In these situations, the Hardware Handshake
parameter must be set to “none” or the TCS will not transmit.
The handshake signals are selected by setting the Hardware Handshake parameter on the Setup
Screen to one of the following values:

• none
• CTS
• DSR
• CTS/DSR
When Hardware Handshake is set to “none”, the TCS will not check any RS-232 signals before
transmitting.
When Hardware Handshake is set to “CTS”, the TCS will only transmit while CTS is asserted.
When Hardware Handshake is set to “DSR”, the TCS will only transmit while DSR is asserted.
When Hardware Handshake is set to “CTS/DSR”, the TCS will only transmit while both CTS
and DSR are asserted.

'()$8/7
None

23(5$72586$*(
The user selects the hardware handshake signals that are checked by TCS before transmitting by
entering the Setup Screen and setting the Hardware Handshake parameter to the desired value
using touchkeys or the optional keyboard.

+26786$*(
None. (This is a local command only.)

4-28
7UDQVPLW0RGH&RPPDQG /RFDO
The Transmit Mode command set the transmit buffer mode of the TCS. The UART in the TCS
has a two character transmit buffer. When the host stalls the TCS, the terminal will terminate
transmission after the transmit buffer is emptied. In some systems, the host is not capable of
buffering 2 characters after it has stalled the host. In this situation, the Transmit Mode must be
set to “Single” to force the TCS to use a 1 character transmit buffer. The “Single” transmit mode
is not as efficient as the “Normal” transmit mode and should only be used in situations where the
host cannot buffer the second character in the transmit buffer.
The transmit buffer mode is selected by setting the Transmit Mode parameter on the Setup
Screen to one of the following values:

• Normal
• Single
When Transmit Mode is set to Normal, the TCS will double-buffer characters. As a result, up to
2 characters can be sent to the Host after the Host has stalled the TCS.
When Transmit Mode is set to Single, the TCS will single-buffer the transmit characters. As a
result, no more than one character will be sent to the Host after the Host has stalled the TCS.

'()$8/7
Normal

23(5$72586$*(
The user selects the transmit buffer mode by entering the Setup Screen and setting the Transmit
Mode parameter to the desired value using touchkeys or the optional keyboard.

+26786$*(
None. (This is a local command only.)

4-29
5HSRUWLQJ)RUPDW&RPPDQG^)5)` 5HPRWH
The Reporting Format command allows the host to specify non-standard introducing codes and a
terminating code for all report sequences generated by the TCS.
This command allows the programmer to tailor TCS reports to match the format required by a
particular host computer. The Reporting Format command has no effect on the codes generated
by pressing keys on the optional keyboard (including multi-code sequences, such as those
generated by pressing the function keys).
The default format of a report from the TCS to the host is:
<ESC>[...<F>
The default introducer codes are <ESC> and [. The default final code <F>, is a single ASCII
code that varies with the type of report. (TCS report sequences are summarized in Chapter 3.)
The Reporting Format command allows the host to reassign the two introducer codes to be any
two codes (including control codes). In addition, the Reporting Format command allows the host
to specify an additional terminating code (such as <CR>) to be appended to the normal report
sequence. Once specified, the reporting format is the same for all TCS-to-host reports.
The reporting format is stored in nonvolatile memory. This allows the TCS to send a power-up
interrupt to the host using the reporting format programmed before the power was turned off.
(The TCS sends a power-up interrupt only if the Power-Up Interrupt Mode is set.)

'()$8/7
The default reporting format for TCS reports is:
<ESC>[...<F>

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[<P1>;<P2>;<P3>w
<P1> is the decimal value of the ASCII code that is to be used as the first introducer code.
If <P1> is omitted, the TCS assigns the default decimal value 27 (the <ESC> code) to the first
introducer code.
<P2> is the decimal value of the ASCII code that is to be used as the second introducer code.
If <P2> is omitted, the TCS assigns the default decimal value 91 (the [ code) as the second
introducer code.
<P3> is the decimal value of the ASCII code that is to be appended to the normal final code.
If <P3> is omitted, no terminating code is appended to the normal final code.

4-30
NOTE
If <P1> or <P2> are omitted, their places must be held with semicolons. For example, to select the default
value for <P2>, use the command <ESC>[<P1>;;<P3>w.
<P1> and <P2> substitute for previous introducer codes; <P3> does not. <P3> is appended after the
existing final code.

3266,%/((55256
When the Data Bits parameter is set to 7, parameters larger than 127 (decimal), select the <DEL>
control code (127 decimal, 7F hex). When the Data Bits parameter is set to 8, parameters larger
than 255 select the code 255 decimal (FF hex).

(;$03/(6
<ESC>[032;40;13w
Sets the introducer codes to <SP> and the appended terminator to <CR>.
<ESC>[w
Resets the introducer codes to their default values (<ESC>[) and specifies that no terminator
be appended to the final code in the report sequence.
<ESC>[;;43w
Resets the introducer codes to their default values (<ESC>[) and sets the appended terminator
to +.

4-31
&OHDU8VHU,QSXWV&RPPDQG^)&8,` 5HPRWH
The Clear User Inputs command allows the host to clear the output buffer of the TCS.
The TCS output buffer contains user input not yet transmitted to the host, and any untransmitted
responses to the host’s queries for status information. This command is useful when the host
wants to ensure that the user’s input stays in step with data the host is displaying, even if the host
becomes busy for a moment and lags in reading input from the user.
If the user is pressing a touchkey when the Clear User Inputs command is received, and
continuously presses the touchkey after the TCS output buffer is cleared, a new touch report is
generated as if the user had released the touchkey and pressed it again.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[7z

4-32
&20081,&$7,21021,725
The Communication Monitor provides easy troubleshooting of communications between the host
and TCS. Once the Communication Monitor is entered, the TCS translates all codes that cross
the communications link directly into their equivalent characters for display. While the
Communication Monitor is active, codes sent from the host do not affect TCS programming and
host report requests are ignored.

(QWHULQJDQG([LWLQJWKH&RPPXQLFDWLRQ0RQLWRU
To enter the Communication Monitor, first enter the Setup Screen, then either press the
COMMUNICATION MONITOR touchkey or type Shift/C on the optional keyboard.
While the Communication Monitor is active, the TCS operates as described below. For ideas on
using Communication Monitor capabilities to best advantage, see the last heading in this chapter,
Using the Communication Monitor.
To exit the Communication Monitor, press the SETUP switch, or press the Set Up key on the
optional keyboard. Because one of the purposes of the Communication Monitor is to monitor the
control sequences generated by touching touchkeys, it is not possible to exit the Communication
Monitor using the touch panel.
When the Communication Monitor is exited, the Setup Screen reappears. Subsequent codes
received from the host are once again buffered and are not processed. For more information
about how the TCS handles codes while the Setup Screen is active, refer to Host Communication
During Setup Session, earlier in this chapter.

+RZWKH&RPPXQLFDWLRQ0RQLWRU'LVSOD\V&KDUDFWHUV
On entering the Communication Monitor, the TCS display is cleared. Then, each 7- or 8-bit code
received or sent by the TCS is directly mapped into its equivalent position within the Standard or
Extended Character Set and the resulting character is displayed. This includes all codes received
from the host from the time the Setup Screen was entered until the Communication Monitor is
exited, and all codes generated either by touching the TCS touch panel or typing on the optional
keyboard.
Figure 4-1 shows the Communication Monitor in operation. While it is active, the
Communication Monitor displays characters across the entire TCS display, in the order received
and sent. If the TCS and host are transmitting simultaneously, the resulting character strings may
be interleaved on the display. To identify the source of each code, characters representing TCS-
generated codes are highlighted, whereas characters representing host-generated codes are
displayed normally (not highlighted). However, there is no visual distinction between TCS touch
panel input and keyboard input.
The specific character displayed for each code crossing the communication link depends on the
character font mapping in effect for the Displayed Screen. If the default mapping is in use (the
Static ASCII Character Font is mapped into the Standard Character Set and the Static Special
Character Font is mapped into the Extended Character Set), the characters shown in Appendix C,
Character Fonts, are displayed.

4-33
If the default mapping is not in effect for the Displayed Screen, the TCS displays whatever
character corresponds to the code crossing the communication link, according to the character
font mapping in effect. See Chapter 5 for details about character font mapping.

)LJXUH6DPSOH&RPPXQLFDWLRQ0RQLWRU6FUHHQ
When characters have filled a line to the right margin of the TCS display, the TCS auto-wraps
subsequent characters to the next line. When it has filled with characters, the display scrolls. The
Scroll Lock key on the optional keyboard can be used to stop and restart the display of new
characters.

7&62SHUDWLRQ:KLOHWKH&RPPXQLFDWLRQ0RQLWRULV$FWLYH
While the Communication Monitor is active, the TCS displays a character for each code crossing
the communication link with the host. All TCS-generated codes (codes resulting from touching
the TCS touch panel or typing on the optional keyboard) are sent to the host as well as displayed.
If multidrop operation is in effect while the Communication Monitor is active, the TCS displays
characters for all codes received from the host, even if that particular TCS is not addressed. See
Chapter 2 for details of Multidrop operation.
Control codes, which do not usually cause characters to be displayed (ASCII 00 through 32 hex,
80 through 9F hex, 7F hex and FF hex), can be seen and verified with the Communication
Monitor. With two exceptions noted below, these codes are displayed as characters but are not
acted on in a control fashion. That is, codes sent from the host while the Communication Monitor
is active do not affect the programming of the TCS in any way.

4-34
For example, if a <BEL> code (ASCII 07 hex) is received from the host, and default character
font mapping is in effect, the Communication Monitor displays L, but the beeper is not sounded.
Two types of control codes are both displayed and acted on:

• Stall and unstall codes continue to control the data flow between the host and the TCS. See
Chapter 2 for details.

• Multidrop communications protocol codes continue to establish and disconnect the


communication link.
With these two exceptions, the functional state of the TCS remains as when the Setup Screen is
initially entered.
If a command sequence is only partially received when the Setup Screen is entered, the TCS does
not act on the command upon entering the Communication Monitor. Instead, when the
Communication Monitor is entered, the partial command sequence is canceled and does not
affect TCS functionality
When Local Echo Mode is in effect, codes that would normally cause characters to be echoed to
the display are shown as they cross the communication link, but are not locally echoed.
Therefore, the resulting character is shown only once on the Communication Monitor.
When Local/Remote Mode is set to local, communication with the host is suspended and no
codes are translated for display within the Communication Monitor. If this happens, a special
message is displayed as follows:

LOCAL MODE - Communication Suspended

If this message is displayed, press the Setup key and change Local/Remote Mode to Remote.
When the Communication Monitor is entered, the Standard Character Set is automatically
selected, regardless of the state of the Select Character Set command. Within the Communication
Monitor, characters representing the codes corresponding to the Standard Character Set are
displayed as received and are never shifted out to the Extended Character Set. Exiting the
Communication Monitor restores the previous state of the Select Character Set command, and
codes can once again be shifted out to the Extended Character Set.
While the Communication Monitor is active, all codes pass through the TCS input buffer,
whether they are generated by the TCS or received from the host. As the input buffer fills, the
TCS may stall the host as described in Chapter 2. While the host is stalled, keyboard and touch
panel entries continue to generate codes, so the input buffer may fill to overflowing. In this case,
the TCS continues to send codes to the host, but is unable to display their character
representations on the Communication Monitor. Instead, the Communication Monitor displays a
Buffer Overflow error character (BO). Normally only the host can cause such a buffer overflow
error; the TCS sends codes into its own input buffer only during Communication Monitor
operation.
The cursor appears as a slow-blinking block during the Communication Monitor session. Exiting
the Communication Monitor to the Setup Screen restores the cursor to its previous characteristics.

4-35
If the keyboard or touch panel were locked out before entering the Setup Screen, they will remain
locked while in the Communication Monitor. Exiting the Communication Monitor to the Setup
Screen will cause the keyboard or touch panel to be temporarily unlocked if either one was
locked.

8VLQJWKH&RPPXQLFDWLRQ0RQLWRU
The Communication Monitor can be a powerful visual aid in configuring the TCS for data
communications. The following paragraphs present ideas on how to use this tool to best
advantage.
1. An application program running on the host is supposed to set Polled Touch Mode then go
into a loop, polling the TCS every 1.5 seconds. However touch reports are never received by
the host. Use the Communication Monitor to see if the Read Touchkey Status command is
being received by the TCS.
2. TCS XON/XOFF Mode is set to on, yet Buffer Overflow errors occur. Use the
Communication Monitor to verify that the TCS sends XOFF to the host.
3. The TCS address is set for Multidrop operation (a value from 1 through 32). Use the
Communication Monitor to verify that the TCS is receiving the correct address sequence
<address> <ENQ> from the host. The TCS should respond by sending <address> <ACK>. If
the TCS does not respond, or responds by sending any other string, there may be a problem.
Check the Address setting in the Setup Screen.
4. When the user presses the touch panel, the application program does not detect the touch.
Use the Communication Monitor to check that a touch report is sent by the TCS whenever
the touch panel is pressed. If not, check whether the application program has set Polled
Touch Mode or Touch Lockout Mode. If the TCS is sending a touch report, check to see
whether the reporting format of the report matches that expected by the application program.
5. When the numeric keypad on the optional keyboard is used, the application program does not
respond. Use the Communication Monitor to ensure that the TCS is sending codes to the host
when a key on the numeric keypad is pressed. If not, check whether the application program
has set the Keyboard Lockout Mode. If the TCS is sending codes, check to see if the
application program is placing the numeric keypad into Application Mode rather than
Numeric Mode.

4-36
&+$37(5',63/$<,1*&+$5$&7(56
,1752'8&7,21
This chapter explains how to display characters on the Touch Control Screen (TCS) and alter the
appearance of the screen. Topics include a description of the available character sets and related
commands.
For clarity of organization and ease of reference, the command descriptions are organized into
six functional groups:

• Screen Memory Commands

• Character Set and Character Font Commands

• Character Displaying Commands

• Character Interpretation Commands

• Cursor Commands

• Screen Appearance Commands

NOTE
In addition to these commands, Region commands can be used to outline and erase rectangular areas of
the screen and modify the character attributes within rectangular areas. Region commands are fully
documented in Chapter 6.

Before continuing in this chapter, the reader should be familiar with the information about
Communication Codes in Chapter 3.

'LVSOD\LQJ&KDUDFWHUV
The TCS contains two 128-position character sets known as the Standard and Extended
Character Sets. These two character sets are used by the TCS when converting the incoming-
graphic codes sent by the host into displayable characters. For each code value received from the
host, a corresponding character is located within one of the two character sets. If the code sent by
the host is a graphic code (and not part of a control string), the character at the location
corresponding to the graphic code is displayed. For example, and using Figure C-1 as a reference,
if the host sends a graphic code with value 48 hexadecimal, it specifies that the character from
column 4, row 8 of the Standard Character Set (normally an “H”) be displayed.

5-1
Because each character set contains 128 characters, graphic codes with values less than 128
decimal (80 hexadecimal) display characters from within the Standard Character Set. Graphic
codes with values greater than or equal to 128 decimal (80 hexadecimal) display characters from
within the Extended Character Set. Refer to Figure 5-1.
Only those characters within the character sets that correspond to graphic codes can be directly
displayed. Characters within the character sets that are stored at locations corresponding to
control codes are only displayable indirectly (not by sending the corresponding code). This
restriction occurs because codes that correspond to these locations within the character sets are
defined by ANSI to be control codes that cause special actions. See the Control Codes heading in
Chapter 3 for a description of how and when such characters can be displayed.
Since code values below 128 decimal can be represented using only 7 data bits, whereas code
values of 128 decimal and above require 8 data bits, the Standard Character Set can be accessed
using only 7 data bits, but the Extended Character Set cannot. The Select Character Set
Command described later in this chapter must be used to gain access to the Extended Character
Set when communicating using only 7 data bits.
The characters within the Standard and Extended Character Sets can be changed by the host
program as described later in this chapter. The default contents of the Standard and Extended
Character Sets are shown in Appendix C.

7KH&XUVRU
Each screen within the TCS contains a cursor. The cursor is a visual marker that identifies the
location on the screen where the next character is to be displayed. Normally, the next graphic
code received by the TCS designates a corresponding character from either the Standard or
Extended Character Set that is displayed at the cursor location, and the cursor is advanced to the
next location.
The cursor plays a key role in the display of characters on a screen because it determines the
location where the next character will normally appear. The movement of the cursor during the
display of characters is controlled by two modes: the Auto Wrap Mode and the New Line Mode.
Both modes are described in detail under the heading Character Interpretation Commands further
on in this chapter. In addition, certain control codes, known as format effectors, are generally
sent by the host to control cursor movement while characters are being displayed.

5-2
$&&(66(' %< &2'(6 $&&(66(' %< &2'(6
) KH[  ) KH[
 GHFLPDO  GHFLPDO

67$1'$5' (;7(1'('
&+$5$&7(5 &+$5$&7(5
6(7 6(7

)LJXUH&RGHV$FFHVVWKH&KDUDFWHU6HWV
An area within each screen is defined to be a scrolling region. This is so characters can continue
to be displayed without running off the bottom of the screen. When new characters are to be
displayed and the cursor has advanced to the bottom line within the scrolling region, the area of
the screen known as the scrolling region “scrolls.” In the case just described, the top line of the
scrolling region disappears from the screen, each line within the scrolling region moves up one
line in position in the screen, and a new blank line is placed at the bottom of the scrolling region.
Although scrolling usually occurs in the upward direction just described, it can also occur in a
downward direction during certain situations when the cursor is moving upward in the screen.

)RUPDW(IIHFWRUV
Some of the control codes reserved by ANSI affect the format of displayed characters. These
control codes do not cause the display of any characters, but they affect the placement of the
printable characters that follow by moving the cursor.
Remember the following points when interspersing format effectors and graphic codes.

• If the cursor is on the bottom line of the scrolling region and the format effector causes the
cursor to move downward, the screen scrolls upward, and the cursor remains on the same
line.

• If the cursor is on the top line of the scrolling region and the format effector causes the
cursor to move upward, the screen scrolls downward, and the cursor remains on the same
line.

• If the cursor is outside the scrolling region and the format effector attempts to move the
cursor above the top of the screen or below the bottom of the screen, the screen does not
scroll, and the cursor remains on the same line.

5-3
7DEOH)RUPDW(IIHFWRUV
01(021O& +(;9$/8( 1$0( 029(0(172)&85625 )227127(
%6!  %DFNVSDFH %DFNZDUGRQHFROXPQ
+7!  +RUL]RQWDO7DE )RUZDUGWRQH[WWDE
/)! $ /LQH)HHG 'RZQRQHOLQH 
97! % 9HUWLFDO7DE 'RZQRQHOLQH 
))! & )RUP)HHG 'RZQRQHOLQH 
&5! ' &DUULDJH5HWXUQ %DFNWRILUVWFROXPQ 
,1'!  ,QGH[ 'RZQRQHOLQHVDPHFROXPQ
1(/!  1H[W/LQH 'RZQRQHOLQHILUVWFROXPQ
5,! ' 5HYHUVH,QGH[ 8SRQHOLQHVDPHFROXPQ
)227127(6
 $OVRPRYHVWRWKHILUVWFROXPQZKHQ1HZ/LQH0RGHLVVHW
 $OVRPRYHVWRWKHQH[WOLQHGRZQZKHQ1HZ/LQH0RGHLVVHW

The following example shows how format effectors are typically used during the display of
characters.
If the host sends:
<CR>Display a string<CR><LF><HT>here!
Assuming the cursor does not attempt to move below the bottom of the scrolling region or screen
(and that New Line Mode is reset), the TCS displays:
Display a string
here!

5-4
29(59,(:2)6&5((10(025<
,QWURGXFWLRQ
The TCS can locally store multiple screens of information for later display upon host command.
Each screen contains a complete set of display data and touch-panel programming representing a
stand-alone user interface. This advanced capability allows the host to dynamically change the
entire user interface quickly, a capability that has many uses:

• In menu-based systems, the host can rapidly call up entirely new menus as the user makes
new selections.

• In applications where the host computer has limited capabilities or is extremely busy, screens
that were developed beforehand can be permanently stored within the TCS. The host running
the application can then display these screens using a minimal amount of communication
with the TCS.

• In an electrically noisy setting or anywhere a danger exists that a display will be corrupted,
the host can quickly redisplay any screen from memory.

• In an environment where the data in the display is likely to change frequently, the user can
view information on the display while the host edits another stored screen invisibly to the
user. When the newly edited information is needed, the host can change the display very
swiftly to show the edited information.

5HIHUULQJWR6FUHHQV
Each screen is assigned a number from 0 through 256 so the host is able to indicate which of
several screens are to be affected by a given command. Once a screen has been created and
assigned a screen number, the host can use the screen number to manipulate the screen or its
contents at will. Although the TCS can store up to 256 screens, the actual number stored depends
upon the complexity of the screens.
Although the TCS can store many screens, only one screen is visible to the user; all other screens
are invisible. This visible screen is the one the TCS is always displaying, and is referred to by the
special screen number of zero (0). To display any other screen, the host must first copy it into the
Displayed Screen, screen number 0.

6HOHFWLQJD6FUHHQIRU(GLWLQJ
All screen editing commands operate upon what is known as the Selected Screen, enabling the
TCS to support standardized ANSI commands yet remain easy to use when storing many screens.
Using the Select Screen command, the host program can designate which of several screens are
to be affected by upcoming editing commands. Once the program selects a particular screen, all
commands that affect the display data or touch programming of a screen are directed toward the
Selected Screen. If the host program never selects a screen, the Displayed Screen is automatically
selected and the TCS directs all screen editing commands to the Displayed Screen.

5-5
Displayed
Screen

Screen 0 CRT

Host Selected
Screen

Screen 0

Screen 0 Stored
Screens
(Invisible)

Screen 0

)LJXUH6HOHFWLQJD6FUHHQIRU(GLWLQJ
Figure 5-2 shows how the multiple screens within the TCS are arranged. Notice that the host is
always editing the Selected Screen, which can be the Displayed Screen (Screen 0) or any of the
stored screens.

6FUHHQ0HPRU\$OORFDWLRQ
Because the complexity of each screen determines how many screens can be stored, only general
guidelines can be given concerning screen memory allocation. At most, the TCS can store up to
256 screens, although each one would have to be extremely simple. Table 5-2 shows the
approximate screen storage capacity for "typical" screens. The table indicates how many screens
with display data and touch-programming matching that of the Setup Screen can be stored.

7DEOH7\SLFDO6FUHHQ6WRUDJH&DSDFLW\
122)6&5((16 0(025<86('
 QRQH
 .
 .
 .

5-6
7HUPLQRORJ\6FUHHQYV'LVSOD\
Commands that modify the display data or touch-programming within a screen often use the
terms "screen" and "display" interchangeably. In both cases, the command affects only the screen
that is currently selected for editing by the host. Since in the majority of instances the host sends
such commands when the Displayed Screen is selected, the effects of the command are indeed
visible on the display of the TCS. However, if the host program has selected a stored screen and
is making changes to it, the effects of the command are invisible to the user. Such commands do
not affect what is on the display of the TCS because the Displayed Screen is not affected.
However, whenever the stored screen is displayed by copying it into the Displayed Screen, then
the visual effects of the command become apparent. In this sense, all such commands do change
the display when and if the screen being operated upon appears on the display of the TCS by
being copied into the Displayed Screen.
When reading about these commands, it may be helpful to substitute "screen" whenever the word
"display" is in the command description, keeping in mind that the effects of the command do not
become apparent until the screen becomes visible.

5-7
6&5((10(025<&200$1'6
Seven commands create, modify, delete, and indicate the status of screens stored in memory. All
screen commands are Remote; the host can issue them but the user normally cannot. Remote
commands can be issued by the user at the TCS only by first setting Local Mode. The screen
memory commands are:

• Initialize Screen command (Remote)

• Select Screen command (Remote)

• Copy Screen command (Remote)

• Delete Screen command (Remote)

• Delete All Screens command (Remote)

• Read Screen Memory Remaining command (Remote)

• Read Screen Existence command (Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begins at the top of a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC- private commands.

5-8
,QLWLDOL]H6FUHHQ&RPPDQG^),6` 5HPRWH
The Initialize Screen command returns a screen to the default state. When changes have been
made to a screen, the Initialize Screen command prevents the host from having to send all the
individual commands needed to return the screen to its default state.
The Initialize Screen command loads all screen-dependent items within a screen with their
default values shown in Table .

7DEOH'HIDXOW9DOXHVRI6FUHHQ'HSHQGHQW,WHPV
6&5((1'(3(1'(17,7(0 '()$8/79$/8(
&RQWHQWV FKDUDFWHUVDQGDWWULEXWHV FOHDUHG
&XUVRU3RVLWLRQ KRPH
&XUVRU7\SH VORZEOLQNLQJEORFN
&KDUDFWHU$WWULEXWHV6HOHFWHG QRUPDO
12&+$1*($WWULEXWH0RGH RII
6FUHHQ%DFNJURXQG QRUPDO
2ULJLQ0RGH UHVHW
6FUROOLQJ5HJLRQ IXOOGLVSOD\
)RUHJURXQG&RORU ZKLWH 
%DFNJURXQG&RORU EODFN 
&RQFHDO&RORU EODFN 
&KDUDFWHU)RQW0DSSLQJ 6WDWLF$6&,,&KDUDFWHU)RQWLVPDSSHGLQWRWKH6WDQGDUG
&KDUDFWHU6HW6WDWLF6SHFLDO&KDUDFWHU)RQWLVPDSSHG
LQWRWKH([WHQGHG&KDUDFWHU6HW
7RXFKNH\V FOHDUHG
7RXFKNH\7\SHV DXWRUHSHDW
7RXFKNH\9LVXDO([WHQW QRQH
7RXFKNH\$XGLEOH$WWULEXWH EHHS
)RUHJURXQG%DFNJURXQGDQG&RQFHDO&RORUDSSO\WRWKHFRORU7&6RQO\

To initialize several screens to values slightly different from their default values, use the
Initialize Screen command to initialize one screen, change the appropriate value, and replicate
the screen using the Copy Screen command. For example, this method could be used to initialize
several screens to a non-default cursor type.
If a screen is being initialized by the Initialize Screen command before being involved in a copy
operation, then the Initialize Screen command can be omitted, because copying to or from a
screen that does not yet exist automatically creates (and initializes) it.

5-9
23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[3s

3266,%/((55256
None.

(;$03/(
<ESC>[2;20s
<ESC>[3s
These commands first select, then initialize Stored Screen 20 with the default values. If screen 20
existed before being selected, the initialization command reinitializes it with the default values. If
screen 20 did not exist, the Select Screen command creates it and initializes it, so there is no need
to send a separate Initialize Screen command. See the Select Screen command later in this
chapter for more details.

5-10
6HOHFW6FUHHQ&RPPDQG^)66` 5HPRWH
The Select Screen command provides a way for the host to edit a screen without necessarily
changing the Displayed Screen. After this command is issued, all screen-dependent commands
have an effect only on the selected screen; other screens are not affected. The screen-dependent
commands are:

Screen Appearance Commands


Screen Background Mode {DECSCNM}
Character Set and Character Font Commands
Map Character Font {FMCF}
Character Interpretation Commands
Set Character Attributes [SGR]
NOCHANGE Attribute Mode {FNCAM}
Scrolling Region Command (DECSTBM)
Origin Mode Command (DECOM)
Cursor Commands
Cursor Type {FCT}
Read Cursor Position [CPR]
Read Character Under Cursor {FRCUC}
Read Attributes Under Cursor {FRAUC}
Move Cursor Up [CUU]
Move Cursor Down [CUD]
Move Cursor Forward [CUF]
Move Cursor Backward [CUB]
Move Cursor to Absolute Position [CUP][HVP]
Move Cursor to Touchkey {FMCTTK}
Index [IND]
Reverse Index [RI]
Next Line [NEL]
Touch Panel Commands
Build Touchkey {FBTK}
Clear Touchkey {FCTK}
Touchkey Type {FTKT}

5-11
Touchkey Visual Extent {FTKVE}
Touchkey Audible Attribute {FTKAA}
Character Displaying Commands
Display Double-Width Line {DECDWL}
Display Double-Size Line {DECDHL}
Display Normal Line {DECSWL}
Place Double-Size Line {FDSL}
Erase Character [ECH]
Erase in Line [EL]
Erase in Display [ED]
Draw Bar for Bar Chart {FDBB}
Region Commands
Outline a Touchkey {FOTK}
Outline a Region {FOR}
Custom Outline a Touchkey {FCOTK}
Custom Outline a Region {FCOR}
Modify Character Attributes in a Touchkey {FMCAITK}
Modify Character Attributes in a Region {FMCAIR}
Reverse Character Attributes in a Touchkey {FRCAITK}
Reverse Character Attributes in a Region {FRCAIR}
Erase a Touchkey {FETK}
Erase a Region {FER}
Fill a Touchkey with a Character {FFTKC}
Fill a Region with a Character {FFRC}
All commands not listed, such as the communication or the status reporting commands, are
global in nature; that is, they affect all screens. Any Setup Screen parameter changes made
locally by the user while the host has selected another screen affect the Displayed Screen only.
When the host sends the Select Screen command with a screen number of zero, subsequent
screen-dependent commands affect the Displayed Screen only. This is the way the TCS operates
if the command has never been issued.
If the screen specified in this command does not exist, a new screen is created and initialized as
described in the Initialize Screen Command chapter. The new screen exists until it is explicitly
deleted with the Delete Screen command or a hard reset is performed.
If the host selects a screen and never puts any information in it, the screen will contain the
default screen-dependent information specified in the Initialize Screen Command chapter.

5-12
When the host selects a stored screen, the Displayed Screen is still available for user input:

• Touch reports sent to the host as a result of touchkey activity or in response to the Read
Touchkey Status command reflect the touchkeys that are part of the Displayed Screen.

• All automatic visual or audible responses associated with user activation of touchkeys still
occur even while the Displayed Screen is not selected.

• Keyboard input that occurs while a stored screen is selected is still sent to the host, as long as
the keyboard is not locked out. If Send-Receive Mode is reset (local echo is on), user input is
echoed to the Displayed Screen, regardless of which screen the host has selected for editing.
If Send-Receive Mode is set (local echo is off), user input cannot appear on the Displayed
Screen unless the host selects the Displayed Screen with the Select Screen command and
explicitly echoes characters to the TCS.

(',7,1*6&5((16
When a stored screen is selected it is always placed into volatile memory and remains there as
long as the display is selected. A side effect is that the screen can be lost if power goes down
while it is selected. In such a case, when power returns, the screen’s contents are restored to their
state immediately prior to being selected. If a stored screen is being selected for the first time, it
is restored with default values as if it had just been initialized by the Initialize Screen command.
To minimize the chances of losing the selected screen due to power loss, leave a stored screen
selected only while editing it. When editing is finished, immediately select the Displayed Screen
or another stored screen to protect the edited screen. Selecting a different screen causes the
currently selected stored screen to be transferred back into nonvolatile memory where it is again
safe from power loss. To avoid the possibility of losing a complex screen that will require a
significant amount of time to rebuild, use the Copy Screen command periodically during editing
to perform intermediate saves to a stored screen of a different number.

'()$8/7
The Displayed Screen is selected.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[2;<Pscr>s
<Pscr> is a numeric parameter from 0 through 256 that specifies the number of the screen to
select. The Displayed Screen is 0 and a stored screen is non-zero.
If <Pscr> is 0 or omitted, the Displayed Screen is selected; this is the way the TCS
operates if the host has never sent a Select Screen command.

5-13
3266,%/((55256
Use care when editing a stored screen if the screen memory is almost full (see the Read Screen
Memory Remaining command). Changing text, attributes, or touch programming may increase
the complexity of the screen and require more memory space. This situation can cause an
Memory Full error when the next screen is selected if there is not enough memory to store the
currently selected screen. If this happens, the new screen is not selected, and the screen being
edited remains selected. The selected screen must then be simplified or deleted before another
screen can be successfully selected.

(;$03/(6
<ESC>[2;87s
Select stored screen 87 so that upcoming screen-dependent commands affect only screen 87.
<ESC>[2s
Cause upcoming screen-dependent commands to affect the Displayed Screen only.

5-14
&RS\6FUHHQ&RPPDQG^)&6` 5HPRWH
The Copy Screen command copies the contents of one screen to one or more other screens. The
command copies all values, modes, display data, and touch programming. The Copy Screen
command is used as follows:

• To display a stored screen, copy it into the Displayed Screen.

• To save the Displayed Screen, copy it into a stored screen.

• To quickly build several screens that differ only slightly from each other, copy from one
stored screen to several others, then make any modifications.
If the source or a destination screen specified in the command does not exist, the TCS
automatically creates a new screen before performing the copy and initializes it with the default
values listed under the heading Initialize Screen Command.
If the screen already exists before the issuance of the Copy Screen command, all screen-
dependent items (values and modes) are copied to the destination screen using the current values
from the source screen, specifically:

• Contents (characters and attributes)

• Cursor Position

• Cursor Type

• Character Attributes Selected

• NOCHANGE Attribute Mode

• Screen Background

• Origin Mode

• Scrolling Region

• Character Font Mapping

• Touchkeys

• Touchkey Types

• Touchkey Visual Extent

• Touchkey Audible Attribute


The new screen exists until it is explicitly deleted with the Delete Screen command or a hard
reset is performed.
When a screen is copied into Screen 0 (the Displayed Screen), some Set-Up parameters may
change because some screen-dependent items within the Displayed Screen are also Set-Up
parameters.

5-15
23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[1;<Psrc>;<Pdest>;... ; <Pdest> s
<Psrc> is a numeric parameter from 0 through 256 that specifies the number of the source
screen. The Displayed Screen is 0 and stored screens are non-zero.
If <Psrc> is omitted, 0 is used, and the Displayed Screen is the source.
<Pdest> is a numeric parameter from 0 through 256 that specifies the number of the
destination screen. The Displayed Screen is 0 and stored screens are non-zero.
If <Pdest> is omitted, 0 is used, and the Displayed Screen is the destination.

3266,%/((55256
Possible sources of errors include:
1. Modifying a dynamic character font between two successive Copy Screen commands may
result in the screen appearing differently than it originally did. For example, if you modify
the dynamic character font that a stored screen uses, and then copy the stored screen into the
Displayed Screen, the appearance of characters on the display will reflect the modified
character font, rather than having the appearance they did before modification.
2. Other programming considerations involve how the host program handles touch reports
during the transition between screens. The TCS behaves predictably, but the host program
may not. For example, if the touch panel is pressed continuously during a copy operation and
an automatic visual response is occurring, the automatic visual response is terminated. For
complete details about such considerations, refer to Appendix D.

(;$03/(6
<ESC>[1;103s
Copy stored screen 103 into Screen 0 (the Displayed Screen). This recalls a stored screen for
display.
<ESC>[1;;94s
Copy Screen 0 (the Displayed Screen) into Stored Screen 94. This saves the Displayed
Screen as a stored screen.
<ESC>[1;12;23;243;3s
Copy Stored Screen 12 into Stored Screens 23, 243, and 3.

5-16
'HOHWH6FUHHQ&RPPDQG^)'6` 5HPRWH
The Delete Screen command deletes one or more stored screens. When a screen is deleted, the
memory used to store it becomes available for storing other screens. It is not possible to delete
the Displayed Screen because it always exists.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[4 ;<Pscr>;...;<Pscr>s
<Pscr> is a numeric parameter from 1 through 256 that specifies the number of a screen to
delete.
If <Pscr> is 0 or omitted, no screens are deleted.

3266,%/((55256
If the screen currently selected by the host for editing is deleted, the Displayed Screen becomes
automatically selected.

(;$03/(6
<ESC>[4;40s
Delete stored screen 40.
<ESC>[4;1;2;3;4;5;6;7s
Delete stored screens 1 through 7. If one of the screens was selected, the Displayed Screen
will be automatically selected.
<ESC>[4s
The command is ignored because the Displayed Screen cannot be deleted.

5-17
'HOHWH$OO6FUHHQV&RPPDQG^)'$6` 5HPRWH
The Delete All Screens command deletes all the stored screens.
CAUTION
Use the Delete All Screens command with care because all stored screens will be lost.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[5s

(;$03/(
<ESC>[5s
Delete all existing stored screens.

5-18
5HDG6FUHHQ0HPRU\5HPDLQLQJ&RPPDQG^)5605` 5HPRWH
The Read Screen Memory Remaining command provides a way for the host to determine how
much space is available for creating new screens. Since memory can become too full for any
more screens to be created, it is sometimes helpful to know how close the TCS is getting to its
screen memory limits.
Memory is shared between dynamic character fonts and stored screens. Screen memory is that
portion of memory available solely for storing screens and is always less than the total amount of
memory available.
The Read Screen Memory Remaining command returns several pieces of information to the host:
the amount of screen memory in use in number of screens and number of bytes, and the amount
of screen memory available in number of estimated screens and number of bytes.
The number of screens available is calculated from the average size of all the currently stored
screens. When few screens are stored, this value may not be an accurate reflection of how many
screens really could still fit into memory.
If all of the screen memory is available, the number of screens available indicates the maximum
number that can be stored (256) no matter how much screen memory is installed.
If screen memory is so full that there isn’t enough room to fit a screen of average size (based on
the average screen size currently stored), zero is returned to the host for the number of screens
remaining. Even in this situation, however, it may still be possible to fit one or more screens into
memory if they are less complex than the average stored screen.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>10n
The TCS responds with:
<ESC>[>10;<Psu>;<Pbu>;<Psr>;<Pbr>n
<Psu> is a numeric parameter indicating the number of screens currently used (stored).
<Pbu> is a numeric parameter indicating the number of bytes of screen memory currently in
use.
<Psr> is a numeric parameter indicating the number of screens remaining to be used (based
on the average size of those stored so far).
<Pbr> is a numeric parameter indicating the number of bytes of screen memory remaining
for use.

NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.

5-19
(;$03/(6
<ESC>[> 10n
Host requests a report of screen memory remaining. If no screens have been stored yet, the
TCS responds:
<ESC>[> 10;0;0;94464n
<ESC>[>10n
Host requests a Screen Memory Remaining Report. If almost all of screen memory has been
used up, the TCS responds:
<ESC>[>10;56;93758;0;606n
Even though the TCS reports that there is no room for more screens, the host may still be
able to create a screen as long as it is not too complex to fit within 606 bytes.

5-20
5HDG6FUHHQ([LVWHQFH&RPPDQG^)56(` 5HPRWH
The Read Screen Existence command provides a way for the host to determine if a particular
screen exists. The command inquires about the existence of one screen at a time. The Displayed
Screen always exists; any other screen exists only if it was stored in nonvolatile screen memory
before power-up or if the host created it since power-up by referring to it in one of the following
commands:

• Initialize Screen Command

• Select Screen Command

• Copy Screen Command


An example use of the Read Screen Existence command is in an installation where the host
communicates with a set of TCSs each of which has a different collection of screens. The host
can send a Read Screen Existence command to determine which screens a particular TCS
contains.
This command can also be used to determine if a screen still exists if power was lost just as the
host was manipulating the screen. After power is restored, the host can send a Read Screen
Existence command to determine whether the screen still exists.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>12;<Pscr>n
<Pscr> is a numeric parameter from 0 through 256 that specifies the number of the screen
whose existence is to be reported. Displayed Screen is 0, stored screen is non-zero.
If <Pscr> is omitted or 0, the existence of the Displayed Screen is reported (it always
exists).
The TCS responds:
<ESC>[>12;0n
if the screen does not exist
<ESC>[>12;1n
if the screen exists

NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.

5-21
(;$03/(6
<ESC>[> 12;87n
Host asks if screen 87 exists. If this screen does not currently exist the TCS responds:
<ESC>[>12;0n
<ESC>[>12;1n
Host requests whether screen number 1 exists. If this screen exists, the TCS responds:
<ESC>[>12;1n
<ESC>[>12n
Host is requesting if the Displayed Screen exists. The Displayed Screen always exists, so the
TCS responds:
<ESC>[>12;1n

5-22
29(59,(:2)&+$5$&7(56(76$1'&+$5$&7(5
)2176
Because the contents of the Standard and Extended Character Sets determine how characters
appear when graphic codes are sent by the host, the TCS allows the contents of these two
character sets to be altered by the host program at will. To facilitate changes to the character sets,
the TCS contains four character fonts which, in conjunction with the character sets, can be used
to dynamically alter the appearance of characters displayed by the TCS.
Although both character sets and character fonts contain similar information (the sixel
representations of characters), the TCS uses only the character sets when a graphic code received
from the host is translated into a character for display. The character fonts merely store
information that can be transferred (mapped) into use by the character sets.
Two of the character fonts are stored in ROM and provide the default contents for the Standard
and Extended Character Sets as shown in Appendix C. The other two character fonts are
changeable (dynamic) and are programmable by the host.

6WDWLF$6&,,DQG6WDWLF6SHFLDO&KDUDFWHU)RQWV
The Static ASCII and Static Special Character Fonts are stored in ROM and cannot be changed
by the host program. These two character fonts contain sixel information, which defines the
appearance of characters when either of these fonts is mapped into the Standard or Extended
Character Sets using the Map Character Font command.
The Static ASCII Character Font contains standard ASCII characters and special control code
mnemonic characters, which are used within the Communication Monitor.
The Static Special Character Font contains special box drawing characters, international
characters, graphics characters, and special error characters used by various commands within
the TCS.
Unless the host specifies otherwise, the Static ASCII Character Font is mapped into the Standard
Character Set, and the Static Special Character Font is mapped into the Extended Character Set.
The contents of these Static Character Fonts are shown in Appendix C.

'\QDPLF&KDUDFWHU)RQWV
In addition to the two Static Character Fonts already described, the TCS contains two Dynamic
Character Fonts known as Dynamic Character Font 1 and Dynamic Character Font 2.
Each of these dynamic fonts contains sixel information, which defines the appearance of
characters when either of these fonts is mapped into the Standard or Extended Character Sets
using the Map Character Font command.
The contents of each of these fonts can be modified by the host using the Copy Character Font
command and the Down-Line Load Character Font command. Both of these commands are
described later in this chapter.

5-23
Unless the host specifies otherwise, Dynamic Character Font 1 contains a copy of the Static
ASCII Character Font and Dynamic Character Font 2 contains a copy of the Static Special
Character Font. The default contents of these two fonts are shown in Appendix C.

0DQLSXODWLQJ&KDUDFWHU6HWVDQG)RQWV
To change the appearance of characters on the display, several commands allow manipulating the
contents of the character sets and character fonts. The host program can copy between fonts,
down-line load custom characters into the dynamic character fonts, and map any of the character
fonts into either the Standard or Extended Character Sets as shown in Figure 5-3.

Accessed by Codes Accessed by Codes


00-7F (hex) 80-FF (hex)
(0-127) decimal (128-255) decimal

Standard Extended
Character Character
Set Set

Character Sets

Map Character Font Command

Character Fonts

Copy Character Font Command

Static Static
ASCII Dynamic Dynamic Special
Character Character
Character Character
Font Font 1 Font 2 Font

Down-line Load Character Font Command

)LJXUH0DQLSXODWLQJ&KDUDFWHU6HWVDQG)RQWV
The host program would typically use these commands as follows:
1. Send a Copy Character Font command to initialize one or both of the dynamic character
fonts from the static character fonts. (This may not be necessary because they are
automatically initialized by the TCS.)
2. Send a Down-Line Load Character Font command to load custom characters defined by the
host into either dynamic character font. The host may elect to change only a few of the
characters or the contents of the entire dynamic character font.
3. Now that the dynamic character font contains the custom characters required by the host
application, the dynamic character font may be mapped into operation using the Map
Character Font command. This causes the designated character font to become mapped into

5-24
the designated character set so the contents of the character set match that of the character
font.
4. If the host subsequently changes the contents of a dynamic character font that is mapped into
one of the character sets, the change is reflected immediately in the appropriate character set
and appears on the display.
The following pages describe each of the above commands. When manipulating character sets or
character fonts, remember the these points:

• The TCS uses only the Standard and Extended Character Sets to form the characters on the
display. Changes to either dynamic character font do not become visible until the dynamic
character font is mapped into a character set using the Map Character Font command. Once
the dynamic character font is mapped into either character set by the Displayed Screen,
subsequent changes to the dynamic character font are automatically reflected in the display
contents.

• To change the contents of a dynamic character font without affecting the appearance of the
display, that dynamic font must not be mapped into either character set by the Displayed
Screen while it is being changed.

• The Static Character Fonts cannot be changed by the host program. They are stored in ROM
and can only be mapped into the character sets or copied into the dynamic character fonts.

• Although the TCS can store many screens, there are only two character sets and four
character fonts within the entire TCS. Each screen must share these resources. However, the
Character Set Mapping that determines which of the four character fonts is mapped into the
two character sets is screen-dependent. That is, each screen may specify a different mapping,
which is automatically used whenever that screen is copied into the Displayed Screen. See
Screen Memory Commands further on in this chapter for details.

'HIDXOW&RQGLWLRQV
The host can successfully operate the TCS without using the available features of the character
sets and fonts because the TCS ensures that the character set mapping and the contents of the
dynamic character fonts are initialized in such a way that the programmer need not worry about
it.
Unless changed by the host, the TCS automatically:

• Maps the Static ASCII Character Font into the Standard Character Set.

• Maps the Static Special Character Font into the Extended Character Set.

• Copies the Static ASCII Character Font into Dynamic Character Font 1.

• Copies the Static Special Character Font into Dynamic Character Font 2.

5-25
9RODWLOLW\RIWKH'\QDPLF&KDUDFWHU)RQWV
The dynamic character fonts are automatically stored in non-volatile memory. This ensures that
the dynamic character fonts have the same volatility characteristics as the stored screens that use
them.

&KDUDFWHU6HW$QG&KDUDFWHU)RQW&RPPDQGV
The following pages describe the commands that operate on the Character Sets and Character
Fonts:

• Select Character Set command (Remote)

• Map Character Font command (Remote)

• Copy Character Font command (Remote)

• Down-Line Load Character Font command (Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begins at the top of a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC-private commands.

5-26
6HOHFW&KDUDFWHU6HW&RPPDQG>6&6@ 5HPRWH
The Select Character Set command provides the mechanism for addressing the Extended
Character Set when the serial interface is set to operate with seven data bits.
When seven data bits are used, the Standard Character Set and the Extended Character Set are
both represented by the codes 0 through 127, decimal (0 though 7F, hex). The host shifts
(selects) between the two character sets by sending the Select Character Set command.
To address the Extended Character Set with a 7-bit code, the host:
1. Sends the Shift Out code <SO> (14 decimal, E hex) to select the Extended Character Set.
2. Sends the 7-bit graphic code corresponding to each desired character. The TCS converts each
7-bit code to an 8-bit code by adding a "l" as the most significant bit, selecting a character in
the Extended Character Set.
3. Sends the Shift In character <SI> (15 decimal, F hex) to return to the Standard Character Set.
The TCS interprets any subsequent 7-bit graphic codes as selecting corresponding characters
within the Standard Character set.
Once the TCS has received <SO>, the TCS interprets subsequent graphic codes as selecting
Extended Characters until the TCS receives <SI>.
For compatibility, <SO> selects the Extended Character Set even when communicating with
eight data bits. That is, 8-bit graphic codes that fall within the Standard Character Set also select
corresponding characters from within the Extended Character Set.

NOTE
Control codes are not affected by this command.

Once the TCS has received <SO> from the host, additional <SO> codes are ignored until <SI> is
received. That is, it is permissible to send several <SO> codes without an intervening <SI>, or
several <SI> codes without an intervening <SO>. In either case, the host is merely reselecting the
character set already in use. When the Extended Character set is selected, the National
Replacement Code command has no effect.

'()$8/7
The Standard Character set is selected.

23(5$72586$*(
None. (This is a remote command only.)

5-27
+26786$*(
<SO> (Shift Out, 14 decimal, E hex)

Selects the Extended Character Set.

<SI> (Shift In, 15 decimal, F hex)

Selects the Standard Character Set.

3266,%/((55256
When the Extended Character Set is selected, this command has priority over any National
Replacement Code (NRC) that may be in effect. Codes are shifted out to the Extended Character
Set and are not affected by the NRC.
When <SO> is in effect and 8-bit codes are received, the most-significant bit is replaced with a
"l". This has the effect of mapping codes representing 8-bit Standard Characters into representing
8-bit Extended Characters, while leaving codes representing 8-bit Extended Characters
effectively unchanged.

(;$03/(6
<SI>123A45<SO>123A45<SI>
This sequence displays the following characters from the Standard Character Set:
31, 32, 33,41, 34 and 35 (hex)
and then displays the following characters from the Extended Character set:
B1, B2, B3, C1, B4, and B5 (hex).
If the Static Special Character Font is mapped into the Extended Character Set (the default
condition), the characters seen on the display would be:
123A45èéêiíî

5-28
0DS&KDUDFWHU)RQW&RPPDQG^)0&)` 5HPRWH

Standard Extended
Character Character
Set Set

Default Default

Static Dynamic Dynamic Static


ASCII Character Character Special
Character Font 1 Font 2 Character
Font Font

)LJXUH&KDUDFWHU)RQW0DS2SHUDWLRQV
The Map Character Font command allows the host to map any of the four character fonts into
either of the two character sets. This allows the contents of the Standard and Extended Character
Sets to be dynamically altered. All the possible character font mapping operations are shown in
Figure 5-4.
The Map Character Font command can be used to display custom characters instead of the
default characters provided by the TCS. By changing the contents of a dynamic character font
(using the Copy Character Font or Down-Line Load Character Font commands) and then
mapping the dynamic font into the Standard or Extended Character Sets, the host can cause
normal graphic codes to display the newly defined custom characters.
When a character font is mapped into a character set, all 128 characters in the character set are
replaced by the corresponding characters from the character font. This affects the appearance of
all the characters in the character set, does not affect interpretation of any control codes which
correspond to locations within the character set, because control codes are interpreted
independently of the corresponding characters stored within the character set. Except for special
circumstances when characters corresponding to control code locations are displayed, mapping
new characters into these locations in the character set has no affect upon TCS operation. See
Control Codes in Chapter 3 for details.
When the TCS contains stored screens, each of the screens may specify a different character font
mapping. Even though the same four character fonts and two character sets are used by all
screens, the TCS automatically changes the character font mapping to match that specified by the
stored screen when it is copied into the Displayed Screen. The character font mapping of a stored
screen can be changed by a number of methods, but the usual method is to send a Map Character
Font command while the stored screen is selected for editing. Refer to the Select Screen
Command for details.

5-29
When a character font is mapped into a character set, it is as if the contents of the character set
have been temporarily replaced with those of the character font. However, it is more than just a
copy operation because subsequent changes to the character font are immediately reflected in the
character set. Since the Standard and Extended Character Sets are used by the TCS to translate
incoming graphic codes into displayable characters, changes to a character font that is mapped
into a character set by the Displayed Screen have immediate visual effect. Changes to a character
font that is mapped into a character set by a stored screen have no visual effect until the stored
screen becomes visible by being copied into the Displayed Screen.
Unless the host uses this command to change the default character font mapping, the Static
ASCII and Static Special Character Fonts will be mapped into the Standard and Extended
Character Sets, respectively, by every screen.
Character positions within each character font are numbered from 1 through 128 (decimal);
communications codes that access the Standard Character Set range from 0 through 127
(decimal); and those which access the Extended Character Set range from 128 through 255
(decimal). Programmers should use care when determining the code value that must be sent to
access a given character. Table 5-4 shows the necessary relationships between a character’s
position in the font and its corresponding communication code once the character font has been
mapped into a character set.

7DEOH&RGH9DOXHV&RUUHVSRQGLQJWR&KDUDFWHU3RVLWLRQV
326,7,212)&+$5$&7(5,1 &+$5$&7(56(7,172:+,&+ &255(6321',1*
&+$5$&7(5)217 7+(&+$5$&7(5)217,6 &20081,&$7,21&2'(9$/8(
0$33('
1 6WDQGDUG&KDUDFWHU6HW 1
1 ([WHQGHG&KDUDFWHU6HW 1
RU
62!1

Before mapping a dynamic character font into either of the character sets, the programmer should
become familiar with the default characters in the Standard and Extended character set that have
special use within the TCS. Table 5-5 and Table 5-6 indicate the consequences of replacing
certain default characters within the Standard and Extended Character Sets with custom
characters when a dynamic character font is mapped into one of the character sets. It is
recommended that characters in these locations not be changed from their default values except
with care.

5-30
7DEOH6WDQGDUG&KDUDFWHUV8VHG)RU6SHFLDO3XUSRVHV
'(6&5,37,21 &255(6321',1*'<1$0,& &216(48(1&(,)&+$1*('%<+26786,1*'2:1
&+$5$&7(5)217 /,1(/2$'$1'0$3&+$5$&7(5)217&200$1'6
326,7,21 6  '(&,0$/
&RQWUROFRGH WKURXJK 6HYHQELWFRQWUROFRGHVZLOOEHGLVSOD\HGXVLQJFXVWRP
PQHPRQLFV FKDUDFWHUVZLWKLQWKH&RPPXQLFDWLRQ0RQLWRU
6SDFHFKDUDFWHU  6SDFHFRGHVDQGHUDVXUHRSHUDWLRQVZLOOGLVSOD\WKHFXVWRP
FKDUDFWHU
&KDUDFWHUSRVLWLRQVZLWKLQFKDUDFWHUIRQWVDUHQXPEHUHGIURPWKURXJK:KHQDFKDUDFWHUIRQWLVPDSSHGLQWRWKH6WDQGDUG
&KDUDFWHU6HWWKHKRVWVHQGVFRPPXQLFDWLRQFRGHVUDQJLQJIURPWKURXJK)RUH[DPSOHDFRPPXQLFDWLRQFRGHZLWKYDOXH
GHFLPDO ZRXOGDFFHVVWKHVSDFHFKDUDFWHUDWSRVLWLRQLQWKH6WDQGDUG&KDUDFWHU6HW

7DEOH([WHQGHG&KDUDFWHUV8VHGIRU6SHFLDO3XUSRVHV
'(6&5,37,21 &255(6321',1*'<1$0,& &216(48(1&(,)&+$1*('%<+26786,1*'2:1
&+$5$&7(5)217 /,1(/2$'$1'0$3&+$5$&7(5)217&200$1'6
326,7,21 6  '(&,0$/
%R[W\SHFKDUDFWHUV WKURXJK 7RXFKNH\DQGUHJLRQRXWOLQHFRPPDQGVXVHFXVWRP
FKDUDFWHUVIRU%R[W\SH
%R[W\SH WKURXJK 7RXFKNH\DQGUHJLRQRXWOLQHFRPPDQGV
FKDUDFWHUVXVHFXVWRPFKDUDFWHUVIRU%R[W\SH
%R[W\SHFKDUDFWHUV WKURXJK 7RXFKNH\DQGUHJLRQRXWOLQHFRPPDQGVXVHFXVWRP
FKDUDFWHUVIRU%R[W\SH
%R[W\SHFKDUDFWHUV WKURXJK 7RXFKNH\DQGUHJLRQRXWOLQHFRPPDQGVXVHFXVWRP
FKDUDFWHUVIRU%R[W\SH
6SDFHFKDUDFWHU  6SDFHFRGHV ZKHQWKH([WHQGHG&KDUDFWHU6HWLVVHOHFWHG
GLVSOD\WKHFXVWRPFKDUDFWHU
2YHUUXQHUURU  &RPPXQLFDWLRQVRYHUUXQHUURUVGLVSOD\WKHFXVWRP
FKDUDFWHU FKDUDFWHU
%XIIHURYHUIORZHUURU  &RPPXQLFDWLRQVEXIIHURYHUIORZHUURUVGLVSOD\WKHFXVWRP
FKDUDFWHU FKDUDFWHU
,QWHUQDWLRQDO15& WKURXJK 7KH1DWLRQDO5HSODFHPHQW&RGHFRPPDQGGLVSOD\VWKH
FKDUDFWHUV FXVWRPFKDUDFWHUV
%DUFKDUWFKDUDFWHUV WKURXJK 7KH'UDZ%DUIRU%DU&KDUWFRPPDQGGLVSOD\VWKHFXVWRP
FKDUDFWHUV
*UD\EORFNFKDUDFWHU  &XVWRPRXWOLQHDQGILOOFRPPDQGVGLVSOD\WKHFXVWRP
FKDUDFWHULIQRQHRWKHULVVSHFLILHG

5-31
7DEOH([WHQGHG&KDUDFWHUV8VHGIRU6SHFLDO3XUSRVHVFRQWLQXHG
'(6&5,37,21 &255(6321',1*'<1$0,& &216(48(1&(,)&+$1*('%<+26786,1*'2:1
&+$5$&7(5)217 /,1(/2$'$1'0$3&+$5$&7(5)217&200$1'6
326,7,21 6  '(&,0$/
)UDPLQJHUURU  &RPPXQLFDWLRQVIUDPLQJHUURUVGLVSOD\WKHFXVWRPFKDUDFWHU
FKDUDFWHU
3DULW\HUURUFKDUDFWHU  &RPPXQLFDWLRQVSDULW\HUURUVGLVSOD\WKHFXVWRPFKDUDFWHU

&KDUDFWHUSRVLWLRQVZLWKLQFKDUDFWHUIRQWVDUHQXPEHUHGIURPWKURXJK:KHQDFKDUDFWHUIRQWLVPDSSHGLQWRWKH([WHQGHG
&KDUDFWHU6HWWKHKRVWVHQGVFRPPXQLFDWLRQFRGHVUDQJLQJIURPWKURXJK)RUH[DPSOHDFRPPXQLFDWLRQFRGHZLWKYDOXH
GHFLPDO DFFHVVHVWKHVSDFHFKDUDFWHUDWSRVLWLRQLQWKH([WHQGHG&KDUDFWHU6HW   

'()$8/76
The Static ASCII Character Font is mapped into the Standard Character Set.
The Static Special Character Font is mapped into the Extended Character Set.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC> (0 map the Static ASCII Character Font into the Standard Character Set (default)
<ESC> (1 map Dynamic Character Font 1 into the Standard Character Set
<ESC> (2 map Dynamic Character Font 2 into the Standard Character Set
<ESC> (3 map the Static Special Character Font into the Standard Character Set
<ESC> )0 map the Static ASCII Character Font into the Extended Character Set
<ESC> )1 map Dynamic Character Font 1 into the Extended Character Set
<ESC> )2 map Dynamic Character Font 2 into the Extended Character Set
<ESC> )3 map the Static Special Character Font into the Extended Character Set (default)

(;$03/(6
<ESC>(0
Map the Static ASCII Character Font into the Standard Character Set. This is the default
condition.
<ESC>)0
Map the Static ASCII Character Font into the Extended Character Set. Note that this
condition will change the appearance of the characters used for drawing outlines and for

5-32
indicating communication errors. Because of the possible confusion this could cause, this
command is not recommended..
<ESC>)3
Map the Static Special Character Font into the Extended Character Set. This is the default
condition.
<ESC>)2
Map Dynamic Character Font 2 into the Extended Character Set. Mapping a user-defined
character font into the Extended Character Set is a convenient way to customize the
appearance of the box characters used by the Outline a Region and Outline a Touchkey
commands.

5-33
&RS\&KDUDFWHU)RQW&RPPDQG^)&&)` 5HPRWH
The Copy Character Font command allows the host to initialize the contents of the dynamic
character fonts. This command might be issued as the first step in creating a new dynamic
character font.
The Copy Character Font command allows the contents of any of the four character fonts to be
copied into either of the two dynamic character fonts as shown in Figure 5-5. The two static
character fonts cannot be copied into because they are contained in ROM and cannot be changed.
If the contents of either dynamic character font are changed by the Copy Character Font
command while the dynamic character font is mapped into either the Standard or Extended
character sets by the Displayed Screen the changes made by this command will immediately
become visible on the display.

'()$8/76
The Static ASCII Character Font is copied into the Dynamic Character Font 1.
The Static Special Character Font is copied into the Dynamic Character Font 2.

23(5$72586$*(
None. (This is a remote command only.)

Default
Default

Static Dynamic Dynamic Static


ASCII Character Character Special
Character Font 1 Font 2 Character
Font Font


)LJXUH&KDUDFWHU)RQW&RS\2SHUDWLRQV

+26786$*(
<ESC> [<Psrc>; <Pdest> }
<Psrc> = Numeric parameter that specifies the source character font.
<Psrc> = omitted or 0: The Static ASCII Character Font
1: Dynamic Character Font 1
2: Dynamic Character Font 2
3: The Static Special Character Font
<Pdest> = Numeric parameter that specifies the destination character font. Since fonts 0 and
3 are static fonts, the command is ignored if any attempt is made to copy into these fonts.

5-34
<Pdest> = omitted or 0: Not a valid destination font
1: Dynamic Character Font 1
2: Dynamic Character Font 2
3: Not a valid destination font

3266,%/((55256
The Copy Character Font command is ignored if an attempt is made to copy into one of the static
character fonts, which cannot be changed.
The Copy Character Font command is ignored if the source and destination character fonts are
the same.

(;$03/(6
The following table shows all valid combinations of source and destination fonts. Other
combinations are ignored.
&200$1' &23,(6)520 72
(6&!>` 6WDWLF$6&,,&KDUDFWHU)RQW '\QDPLF&KDUDFWHU)RQW
(6&!>` 6WDWLF$6&,,&KDUDFWHU)RQW '\QDPLF&KDUDFWHU)RQW
(6&!>` '\QDPLF&KDUDFWHU)RQW '\QDPLF&KDUDFWHU)RQW
(6&!>` '\QDPLF&KDUDFWHU)RQW '\QDPLF&KDUDFWHU)RQW
(6&!>` 6WDWLF6SHFLDO&KDUDFWHU)RQW '\QDPLF&KDUDFWHU)RQW
(6&!>` 6WDWLF6SHFLDO&KDUDFWHU)RQW '\QDPLF&KDUDFWHU)RQW

5-35
'RZQ/LQH/RDG&KDUDFWHU)RQW&RPPDQG^)'/&)` 5HPRWH
The Down-Line Load Character Font Command allows the host to place custom characters into
Dynamic Character Fonts 1 and 2. Then, when the dynamic character font is mapped into the
Standard or Extended character set, the custom characters can be displayed.
For example, to create a dynamic character font that is only slightly different from the Static
ASCII Character Font, one method is to use the Down-Line Load Character Font command to
down-line load an entire new font of 128 characters into the Dynamic Character Font. This can
be somewhat tedious because all 128 characters, including characters which match those already
stored in the Static ASCII Character Font, first have to be developed by the host application. A
simpler method is as follows:

• Using the Copy Character Font command, the host program copies the Static ASCII
Character Font into the dynamic character font of interest.

• Using the Down-Line Load Character Font command, the host program replaces only those
characters in the dynamic character font that differ from the contents of the Static ASCII
Character Font.

• Using the Map Character Font command, the host program maps the custom dynamic
character font into the appropriate character set (in this example, the Standard Character Set).
If the contents of either Dynamic Character Font is changed by the Down-Line Load Character
Font command while the Dynamic Character Font is mapped into either the Standard or
Extended character sets by the Displayed Screen, the changes immediately become visible on the
display.
Before down-line loading into a dynamic character font, the programmer should be aware of the
effects that the dynamic character font may have if its default contents are changed and then
mapped into one of the character sets.
Character positions within each character font are numbered from 1 through 128 (decimal);
communications codes that access the Standard Character Set range from 0 through 127
(decimal); and those which access the Extended Character Set range from 128 through 255
(decimal). Programmers should use care when determining the code value that must be sent to
access a given character. Table 5-4 shows the relationships needed between a character’s position
in the font and its corresponding communication code once the character font has been mapped
into a character set.

(1&2',1*&86720&+$5$&7(56)25'2:1/2$',1*
The character fonts store sixel data in cells 8 dots wide by 10 dots high. Each dot in the cell is
represented by a bit with a binary value of 1 or 0. A one (1) specifies that the dot becomes the
foreground color and a zero (0) specifies that the dot becomes the background color.
For example, to place the character A into a dynamic character font, the first step is to design the
character as shown in Figure 5-6.

5-36
)LJXUH([DPSOH&XVWRP&KDUDFWHU'HVLJQ
It might seem that the simplest way to encode this character for transmission is to send 10 bytes
with each of the 8 bits in the byte representing a dot. There are two reasons why this method is
not acceptable:
1. The host and TCS may be communicating using only 7 data bits.
2. Some bit sequences would be interpreted as control codes.
Therefore, it is necessary to encode the character in some other way. The encoding method
described in the following discussion is compatible with the DEC down-line load character
format.
Organize the character cell into columns of six bits each as shown in Figure 5-7. Each column is
represented as a vertical 1 x 6 pattern of dots called a sixel. The columns are numbered in the
order they are to be sent to the TCS. The most significant bit is at the bottom and the least
significant bit is at the top of each column. The 10-dot character height is not a multiple of six, so
the columns on the bottom of the character cell consist of only four bits each. In these sixels, bits
4 and 5 are ignored.

5-37
)LJXUH'LYLGLQJWKH&KDUDFWHULQWR6L[HOV
Convert the binary values of each column to ASCII characters. Column codes are restricted to the
range of 63 through 126 decimal (? to ~), so add an offset of decimal 63 (binary 111111) to each
column value. Thus, the lowest binary value (000000) becomes decimal 63 (0 + 63); the highest
binary value (111111) converts to decimal 126 (63 + 63).
Convert the value resulting from adding the decimal 63 offset to the code representing its
equivalent character in the table in Appendix C. For example, the first column is binary 110000.
Adding the offset yields:

110000
+11111

1101111 = 6F hexadecimal

or row 6, column 15 of the table. The character at that location is the ASCII character "o".
Figure 5-8 shows the complete conversion of the example character "A".
After the desired characters have been designed and converted as described, they can then be sent
from the host to the TCS using the Down-Line Load Character Font command.

5-38
6800$5<
To down-line load a custom character font, do the following:
1. Design the characters in a matrix 8 dots wide by 10 dots high.
2. Divide the characters into 2 sets of 8 sixels each sixes having 6-bit positions. The upper set is
complete (6-bit sixels) and the lower one is made up of 4-bit sixels. The unused bits in each
of the 4-bit sixels should be zero in the conversions that follow.

3. Convert each sixes to a code representing an ASCII character in the range ? through ~ (63
through 126 decimal) by adding an offset of binary 11111 (decimal 63).
4. Use the resulting codes as the sixel bit patterns in the Down-Line Load Character Font
command. Sixteen such sixel bit patterns are sent for each character thus encoded.
Several shortcuts are possible. Graph paper ruled into rectangles having 80 squares can greatly
simplify designing the custom characters particularly if they are custom borders or other
characters that extend to the edges of the character cell.

5-39

)LJXUH(QFRGLQJWKH6L[HOV

5-40
6$03/(352*5$0)256,;(/&219(56,21
A second shortcut might be to use a program to convert the bit patterns into the sixel codes. The
following example program asks for 8 upper sixels, then for 8 lower sixels. The resulting codes
are stored as characters in a string, and then displayed. The program could be enhanced by using
the character string directly in a properly formatted Down-Line Load Character Font command.
This sample program runs on the IBM PC.
‘ ===================================================
110 ‘ Program to encode a TCS character into sixels.
120 ‘
130 ‘ The following DATA statements represent the
140 ‘ letter “A”. Periods represent background pixels.
150 ‘ Asterisks represent foreground pixels.
160 ‘ ========================================================
170 DATA “........”
180 DATA “...*....”
190 DATA “..*.*...”
200 DATA “.*...*..”
210 DATA “*.....*.”
220 DATA “*******.”
230 DATA “*.....*.”
240 DATA “*.....*.”
250 DATA “........”
260 DATA “........”
270 ‘
280 DIM pixrow$(9) ‘ Array to hold rows of pixels.
290 DIM binval%(9) ‘ Array to hold powers of two.
300 ‘
310 FOR row% = 0 to 9 ‘ For each row in the character.
320 READ pixrow$(row%) ‘ Read in pixel row.
330 binval%(row%) = 2 ^ row% ‘ Compute powers of two.
340 NEXT row% ‘ Enfor.
350
360 PRINT “For this character, send the string: “;
370 ‘ ________________________________________________________
380 ‘ Compute sixels for the top six rows
390 ‘ (in each column, the top six pixels form one sixel).
400 ‘ _______________________________________________________
410 FOR column% = 1 TO 8 ‘ For each column in the character.
420 sixel% = 63 ‘ Start with the sixel value
430 ‘ for no pixels lit.
440 FOR row% = 0 to 5 ‘ For the top rows in the column.

450 pixelon% = 0 ‘ Assume pixel is off.

5-41
460 ‘
470 IF MID$(pixrow$(row%),column%,1)= “*” THEN pixelon%= 1
480 ‘
490 ‘ Adjust value if pixel is on.
500 ‘
510 IF pixelon% = 1 THEN sixel% = sixel% + binval%(row%)
520 ‘
530 ‘ Add correct binary value if
540 ‘ the pixel is on (if the pixel
550 ‘ is off nothing is added).
560 NEXT row% ‘ Endfor.
570 PRINT CHR$(sixel%); ‘ Print the sixel.
580 NEXT column% ‘ Endfor.
590 ‘
600 PRINT “/”; ‘ End of top sixels.
610 ‘ ________________________________________________________
620 ‘ Compute sixels for the bottom four rows
630 ‘ (in each column, the bottom four pixels form one sixel).
640 ‘ ________________________________________________________
650 FOR column% = 1 TO 8 ‘ For each column in the character.
660 sixel% = 63 ‘ Start with the sixel value
670 ‘ for no pixels lit.
680 FOR row% = 6 TO 9 ‘ For the top rows in the column.
690 pixelon% = 0 ‘ Assume pixel is off.
700 ‘
710 IF MID$(pixrow$(row%),column%,1) = “*” THEN pixelon% = 1
720 ‘
730 ‘ Adjust value if pixel is on.
740 ‘
750 IF pixelon% = 1 THEN sixel% + binval%(row% - 6)
760 ‘
770 ‘ Add correct binary value if
780 ‘ the pixel is on (if the pixel
790 ‘ is off nothing is added).
800 NEXT row% ‘ Endfor.
810 PRINT CHR$(sixel%); ‘ Print the sixel.
820 NEXT column% ‘ Endfor.
830 ‘
840 PRINT
850 END

5-42
23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC> P <Pfn>;<Pcn>;<Pe>{<Sxbpl>;<Sxbp2>;... ; <Sxbpn> <ESC> \
<DCS> can be used in place of <ESC> P and <ST> can be used in place of <ESC> \ when the
TCS is communicating using 8 data bits.
<Pfn> is a numeric parameter that specifies which dynamic character font is to be loaded.
When <Pfn> is:
0 or omitted: load Dynamic Character Font 1
1: load Dynamic Character Font 1
2: load Dynamic Character Font 2
<Pcn> is a numeric parameter that specifies the position within the dynamic character font to
start loading characters.
When <Pcn> is:
0 or omitted: start loading at 33rd position
1: start loading at start of dynamic character font
2: start loading at 2nd position
n: start loading at nth position
> 128: do not load any characters
<Pe> is a numeric parameter that specifies which characters to erase in the dynamic
character font before loading characters.
When <Pe> is:
0 or omitted: erase all characters in the dynamic character font before loading new
characters
1: erase only where new characters are to be loaded
<Sxbpl> is the sixel bit pattern for first character.
<Sxbp2> is the sixel bit pattern for second character.
<Sxbpn> is the sixel bit pattern for last character.
Each sixel bit pattern has the form:
S...S/ S...S where the first S...S represents the upper columns of sixels, the slash
(2/5) advances to the lower half of the character, and the second S . . . S
represents the lower columns of sixels. Columns are sent starting with
the leftmost sixel of the appropriate half of the character cell. Each S
must be a code from 3F through 7E hex (corresponding to characters ?
through~).

5-43
3266,%/((55256
If no sixel bit patterns are specified and <Pe> is 1, none of the characters in the dynamic font
buffer are changed.
If incomplete sixel patterns are given for a character, the incomplete portions of the character cell
will be blank (matching the screen background). If extra sixel patterns are given for a character,
they will be ignored.
If the command contains codes that are acceptable within any Device Control String (code values
20 through 7E hex) but are not valid for this command, the command is ignored once it is
completed.
If the command contains codes outside the range for any Device Control String the command is
ignored and the TCS displays the remainder of the characters in the command.
All sixel bit patterns for characters beyond the 128th character are ignored.
The dynamic character font is only loaded when the TCS receives a proper terminator sequence
(<ESC> \ or <ST>).

(;$03/(6
<ESC>P;;{<ESC> \
This sequence causes the contents of the entire Dynamic Character Font 1 to be erased.
<ESC>P1;53;{ogcacgo?/B?????B?<ESC> \
This sequence causes the character A (as shown in the preceding figures) to be loaded into
the 53rd position of the Dynamic Character Font 1. If the Dynamic Character Font 1 is
mapped into the Standard Character Set, to display the custom character "A", the host would
send the code 52 decimal, (representing the character "4" normally in position 53 of the
Standard Character Set).

5-44
&+$5$&7(5',63/$<,1*&200$1'6
The Character Displaying commands display and erase characters on the screen and modify their
appearance. These commands affect the characters already on the screen when the command is
executed.
The Character Displaying commands are:

• Display Double-Width Line command (Remote)

• Display Double-Size Line command (Remote)

• Place Double-Size Line command (Remote)

• Display Normal Line command (Remote)

• Draw Bar for Bar Chart command (Remote)

• Erase Character command (Remote)

• Erase in Line command (Remote)

• Erase in Display command (Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begins on a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC- private commands.

&RORU)HDWXUHV
For the color TCS, these features affect the Character Displaying commands:

• Commands that cause characters to be displayed normally use the current foreground,
background, and conceal color attributes. However, there are several controls that can affect
how and when these attributes are used. For details, refer to Set Character Attributes
Command in this chapter.

• Commands that cause characters to be erased use a space character in the current background
color and turn off the highlight, underline, blink, reverse-video, and concealed attributes for
each erased character.

5-45
'LVSOD\'RXEOH:LGWK/LQH&RPPDQG^'(&':/` 5HPRWH
The Display Double-Width Line command displays the line occupied by the cursor (and only that
line) using double-width characters.
Since each double-width character occupies twice the normal character width, all characters
occupying the right half of the normal line disappear from the screen. The right half that
disappears from the screen is preserved in memory and can be retrieved using the Display
Normal Line command.
When a line is changed to double-width, the cursor may move horizontally across the screen in
order to remain in the same character column position. If the line was originally a normal line
and the cursor was past the midpoint of the line, then the cursor is repositioned to the end of the
double-width line.

NOTE
This command affects both characters that were previously on the line, and those on the line that arrive
after the command is issued.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>#6
Changes the line occupied by the cursor to appear in double-width.

5-46
'LVSOD\'RXEOH6L]H/LQH&RPPDQG^'(&'+/` 5HPRWH
The Display Double-Size Line command changes the line occupied by the cursor to appear as a
double-size line. Double-size lines are both double-height and double-width.
Each of the two lines that make up the double-size line is also double-width, so the characters
that appeared on the right half of the screen disappear when a normal line is converted to double-
size. The characters in the right half can be made to reappear when the line is restored to normal
size with the Display Normal Line command.
When a line is changed to double-size, the cursor may move horizontally across the screen in
order to remain in the same character column position. If the line was originally a normal line
and the cursor was past the midpoint of the line, then the cursor is repositioned to the end of the
double-size line.

NOTE
This command affects both the characters that were previously on the line, and those on the line that arrive
after the command is issued.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>#3
Changes the line that the cursor is on to display the top half of double-size characters
currently in the line. Changes the line below the cursor to display the bottom half of double-
size characters currently in the line that the cursor is on.

3266,%/((55256
If only one line is changed to double-sized, then the line contains only half (top or bottom,
according to the command) of the double-sized characters that appear in the line.

5-47
3ODFH'RXEOH6L]H/LQH&RPPDQG^)'6/` 5HPRWH
The Place Double-Size Line command creates a double-size line with a single command,
providing a simpler alternative to the Display Double-Size Line command for making a double-
size line.
When this command is processed, the text and attributes on the line occupied by the cursor are
duplicated on the line below. The line the cursor is on becomes the top half of a double-size line
while the line below the cursor becomes the bottom half of a double-size line. This command
makes a single normal size line both double-high and double-wide. For example, assume the
following lines are being displayed before the Place Double-Size Line command is received:
This is the line the cursor is on.
... this is the next line...
... and this is the third line.
When the host sends the Place Double-Size Line command, the TCS displays:

This is the line the cursor is on


...
... and this is the third line.
As with double-wide lines, the characters on the right half of a normal size line disappear when
the line is converted to double-size. The characters in the right half of both the top and bottom
lines reappear when the lines are restored to normal with the Display Normal Line command.
When a double-size line is placed, the cursor may move horizontally across the screen in order to
remain in the same character column position. If the line was originally a normal line and the
cursor was past the midpoint of the line, then the cursor is repositioned to the end of the double-
size line.
The Place Double-Size Line command never causes any scrolling. The region of the display
affected by this command is restricted to the scrolling region when Origin Mode is set. When this
command is issued, only the top half of the double-size line will be displayed if the cursor is at
the bottom of the screen (or of the scrolling region with Origin Mode set).
To change any characters in the double size line that this command has created, there are two
alternatives: the host can change the characters in the top line and then issue the command a
second time, or else change the characters in both the top and bottom halves of the double-size
line.
Any characters this command replicates retain their original NRC translation (if any).

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>#2

5-48
(;$03/(6
<ESC>#2
Change the line that the cursor is on to display the top half of double-size characters currently in
the line. Change the line below the cursor to display the bottom half of double-size characters
currently in the line the cursor is on.

5-49
'LVSOD\1RUPDO/LQH&RPPDQG '(&6:/  5HPRWH
The Display Normal Line command displays the line occupied by the cursor (and only that line)
using normal characters.
To normalize a double-size line, the host must send the Display Normal Line command for both
of the lines that make up the double-size line; (the top and bottom halves must both be
normalized). In many cases, after both lines have been normalized, the host should send a
command to delete one of the lines, as one line usually contains exactly the same characters as
the other.
If the host normalizes a double-width or double-size line, the hidden normal-sized characters that
originally occupied the right-half of the line are restored. The cursor position remains in the same
character column positionthe cursor follows the character it resides on across the screen when
the line is normalized.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>#5
Changes the line occupied by the cursor to appear normal sized.

5-50
'UDZ%DUIRU%DU&KDUW&RPPDQG^)'%%` 5HPRWH
The Draw Bar for Bar Chart command provides a convenient way to display and update a bar
chart. The command supports both horizontal or vertical bar charts. To use the command, the
host specifies:

• The maximum length or height of the bar

• The amount of the bar to be filled in one-tenth of one percent precision (.0% through
100.0%)
The bar is drawn using block characters. If necessary, the TCS uses partial characters at the edge
of the bar to represent the proper fill percentage. The part of the bar beyond the portion filled
with block characters is automatically erased.
The bar starts at the current cursor position and extends upward for a vertical bar, or to the right
for a horizontal bar. The host can also specify how thick the bar is to be drawn. If a bar is being
drawn and a thickness greater than 1 is specified, the thickness extends to the right of the cursor
for a vertical bar or below the cursor for a horizontal bar.
Figure 5-9, which represents bars that are two characters in thickness, shows how a bar is drawn
relative to the cursor position.
The bar chart command automatically takes into account the line type of the area in which the
bar is drawn, as long as the line types in the area are not mixed (all normal, all double-wide, or
all alternating double-size). Note that the resolution of partial characters placed on a double-size
line is reduced when a vertical bar is drawn. In this situation, the resolution of the partial fill
character is reduced from 1/10th of a line to 1/5th of a line. Unless double-size lines are required
for text that shares the same lines as the vertical bar (such as labels), it is recommended that
double-wide lines be used instead. This provides a vertical bar of the same physical size, but with
partial characters of twice the resolution.

)LJXUH9HUWLFDODQG+RUL]RQWDO%DUV

The Draw Bar for Bar Chart command does not change the cursor position.

5-51
The area of the display this command affects is restricted to the scrolling region when Origin
Mode is set.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[1;<Ps>;<Pr>;<Pd> ;<Pt>x
<Ps> is a numeric parameter specifying the maximum size in lines (vertical bar) or characters
(horizontal bar) of the bar when it is 100% filled.
When <Ps> is:
0 or omitted: Ps = 24 lines (vertical bar)
Ps = 80 characters (horizontal bar)
> 24 (vertical bar): Ps = 24 lines
> 80 (horizontal bar): Ps = 80 characters
<Pr> is a numeric parameter specifying the percentage amount to fill the bar. The parameter
must be in the range of 0 through 1000 and represents .0% through 100.0% fill.
If <Pr> is greater than 1000, 1000 is used, and the entire bar is filled.
If <Pr> is omitted, 0 is used, and the bar is not filled.
<Pd> is a selective parameter specifying the direction the bar is to be drawn.
If <Pd> is 0 or omitted, a vertical bar is drawn. If <Pd> is 1, a horizontal bar is drawn.
<Pt> is a numeric parameter specifying the thickness of the bar in lines (horizontal bar)
number of characters (vertical bar).
When <Pt> is:
0 or omitted: Pt = 1
> 24 (horizontal bar): Pt = 24
>80 (vertical bar): Pt = 80

3266,%/((55256
If the size specified for the full 100% length or height of the bar is greater than the area available
between the cursor and the edge of the screen, the bar is automatically scaled so the amount of
room remaining becomes the full length (100%).
If the thickness specified for the bar is greater than the area available between the cursor and the
edge of the screen, the thickness of the bar is truncated at the screen edge.
When Origin Mode is set, the edges of the scrolling region are treated as if they were the edges
of the screen.

5-52
The bar may appear jagged if it crosses a mixture of line types.
If the extended character set does not have the appropriate characters (for example, Default
Dynamic Font 1 copied to extended set) the bar will not appear correctly.

(;$03/(6
<ESC>[1;20;665x
Draws a vertical bar 66.5% of 20 lines high and one character wide (thick). The filled portion
of the bar would be about 13 and 1/3rd lines tall.
<ESC>[1;75;916;1;2x
Draws a horizontal bar 91.6% of 75 characters wide and two lines high (thick) starting at the
current cursor position. The filled portion of the bar would be about 68 and 3/4 characters
wide.

5-53
(UDVH&KDUDFWHU&RPPDQG>(&+@ 5HPRWH
The Erase Character command erases the character under the cursor and as many characters as
desired following it up to the end of the line.
Each character erased is replaced by a blank (the ASCII Space character) with character
attributes "off." The cursor does not move when the TCS executes this command.

NOTE
If the NOCHANGE Attribute Mode is set, erased characters are replaced with blanks, but their character
attributes remain unchanged. This makes it easier to erase within a field of attributes.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[<Pn>X
<Pn> is a numeric parameter, specifying the total number of characters to be erased.
If <Pn> is 0 or omitted, only the character under the cursor is erased.
If <Pn> is n (where n is a number of characters other than zero), the character under the
cursor and n-1 characters following it are erased.

3266,%/((55256
If (<Pn>) exceeds the number of characters remaining on the line to the right of the cursor,
erasure does not continue beyond the end of the line (regardless of the state of the Auto Wrap-
around Mode).

(;$03/(6
<ESC>[X
Erases the character at the cursor.
<ESC>[24X
Erases the character at the cursor and the 23 characters that follow it. The cursor is not
moved.

5-54
(UDVHLQ/LQH&RPPDQG>(/@ 5HPRWH
The Erase in Line command erases a specified chapter of the line occupied by the cursor.
Each character erased is replaced by a blank (the ASCII Space character) with character
attributes "off." The cursor does not move when the TCS executes this command.

NOTE
If the NOCHANGE Attribute Mode is set, erased characters are replaced with blanks, but their character
attributes remain unchanged. This makes it easier to erase within a field of attributes. The line type
remains unchanged regardless of the state of the NOCHANGE Attribute Mode.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC> [<Ps>K
<Ps> is a selective parameter, specifying the portion of the current line to be erased.
If <Ps> is 0 or is omitted, characters from the cursor through the end of the line are
erased.

5-55
If <Ps> is 1, characters from the start of the line through the cursor are erased.

If <Ps> is 2, the entire line is erased.

(;$03/(6
<ESC>[K
Erases from the cursor through the end of the line. The cursor is not moved.
<ESC>[2K
Erases the entire line. The cursor is not moved.

5-56
(UDVHLQ'LVSOD\&RPPDQG>('@ 5HPRWH
The Erase in Display command erases all or part of the display.
This command can be used to erase the area preceding the cursor, the area following the cursor,
or the entire screen. Each erased character is replaced by a blank (the ASCII Space character, 20
Hex) with character attributes "off." The cursor does not move when this command is executed.
If the entire screen is erased, all line types are reset to normal. If a portion of the screen is erased,
all lines except the line occupied by the cursor are reset to normal. In the line occupied by the
cursor, the line type remains unchanged.

NOTE
When the NOCHANGE Attribute Mode is set, erased characters are replaced with blanks, but the
character attributes within the erased area remain unaffected. This makes it easier to erase within a field of
attributes.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC> [<Ps>J
<Ps> is a selective parameter, specifying the portion of the screen to be erased.
If <Ps> is 0 or omitted, characters from the cursor through the end of the screen
(inclusive) are erased.

5-57
If <Ps> is 1, characters from the beginning of the screen through the cursor position
(inclusive) are erased.

If <Ps> is 2, the entire screen is erased.

(;$03/(6
<ESC>[J
Erases from the cursor through the end of the screen. The cursor does not move. The line
containing the cursor retains its line type; all other erased lines are reset to normal.
<ESC>[1J
Erases from the beginning of the screen through the cursor position. The line containing the
cursor retains its line type; all other erased lines are reset to normal.

5-58
&+$5$&7(5,17(535(7$7,21&200$1'6
Character Interpretation commands determine the appearance and placement of characters that
arrive after the command is received. The Character Interpretation commands are:

• Auto Wrap-Around Mode command (Local/Remote)

• Send-Receive Mode command (Local/Remote)

• New Line Mode command (Local/Remote)

• NOCHANGE Attribute Mode command (Local/Remote)

• National Replacement Code command (Local/Remote)

• Set Character Attributes command (Remote)*

• Scrolling Region command (Remote)

• Origin Mode command (Remote)


* For the color TCS, the Set Character Attributes command has two parameters that can be
controlled remotely or locally: foreground color and background color.
Commands are described in detail in the following pages. For ease of reference, each command
description begins on a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC- private commands.

5-59
$XWR:UDS$URXQG0RGH&RPPDQG '(&$:0  /RFDO5HPRWH
The Auto Wrap-Around Mode command sets and resets the Auto Wrap-Around Mode.
The Auto Wrap-Around Mode determines how the cursor responds when the TCS receives
characters that run off the right margin of the display.

• When the Auto Wrap-Around Mode is "off" (reset), a character received when the cursor is
at the right margin replaces the previously displayed character and the cursor remains
stationary.

• When the Auto Wrap-Around Mode is "on" (set), another character received (other than the
tab character <HT>) after a character had already been placed at the right margin is
displayed on the next line at the left margin. This causes the screen to scroll if the new line
would be below the bottom of the scrolling region. The tab character <HT> never moves the
cursor to the next line.

'()$8/7
Off (Reset).

23(5$72586$*(
The user sets the Auto Wrap-Around Mode by entering the Setup Screen and, using touchkeys or
the optional keyboard, setting the Auto-Wrap parameter to one of the following states:

• off (reset)

• on (set)

+26786$*(
<ESC>[?7l
Resets the Auto Wrap-Around Mode to "off." (The terminator for the reset command is the
letter "l", ASCII 6C hex.)
<ESC>[?7h
Sets the Auto Wrap-Around Mode to "on."

5-60
6HQG5HFHLYH0RGH&RPPDQG>650@ /RFDO5HPRWH
The Send-Receive Mode command sets and resets the Send-Receive Mode, which controls the
Local Echo feature of the TCS. The Local Echo feature echoes user input from the optional
keyboard to the TCS. Touch cell reports and other TCS-to-host strings are not affected (and are
never echoed locally).

• When the Send-Receive Mode is reset, the Local Echo feature is turned on. User input from
the keyboard is sent to both the host and the TCS; the TCS interprets the input as if it had
been sent (echoed) by the host. This relieves the host from the burden of echoing characters
to the TCS.

• When the Send-Receive Mode is set, the Local Echo feature is turned off. User input from
the keyboard is sent only to the host; the input is not interpreted by the TCS. The host can, at
its own discretion, echo the input back to the TCS.
The user can set or reset the Send-Receive Mode by setting the Local Echo parameter within the
Setup Screen to "off" or "on", respectively.

NOTES
1. The Send-Receive Mode and the Local Echo parameter both control the Local Echo feature. However,
they operate as opposites. That is, the Local Echo feature is off when the Local Echo parameter is off and
the Send-Receive Mode is set. Likewise, the Local Echo feature is on when the Local Echo parameter is on
and the Send-Receive Mode is reset.
2. Locally echoed information is always echoed to the Displayed Screen, even while the host has selected a
stored screen for editing. This allows the TCS to provide proper visual feedback via the display to the user
even while the host is working with an invisible stored screen.

'()$8/79$/8(
Set. (Local Echo feature is off.)

23(5$72586$*(
The user sets or resets the Send-Receive Mode (and thus the Local Echo feature) by entering the
Setup Screen and setting the Local Echo parameter to one of the following values:

• on (Local Echo feature is on and Send-Receive Mode is reset.)

• off (Local Echo feature is off and Send-Receive Mode is set.)

+26786$*(
<ESC>[12l
Resets the Send-Receive Mode (Local Echo is "on"). (The terminator for the reset command
is the letter "l", ASCII 6C hex.)
<ESC>[12h
Sets the Send-Receive Mode (Local Echo is "off").

5-61
1HZ/LQH0RGH&RPPDQG>/10@ /RFDO5HPRWH
The New Line Mode command determines which control characters are transmitted by the TCS
when the Return key or Enter key is pressed on an optional keyboard. The New Line Mode
command also determines the action taken by the TCS when it receives Line Feed <LF>, Form
Feed <FF>, and Vertical Tab <VT> characters.
The effect of the New Line Mode on the Return and Enter keys is shown in Table 5-7. The effect
of the New Line Mode on cursor movement is shown in Table 5-8.

'()$8/7
Off (reset).

23(5$72586$*(
The user sets or resets the New Line Mode by entering the Setup Screen and, using touchkeys or
the optional keyboard, setting the New Line parameter to one of the following values:

• on (Sets New Line Mode)

• off (Resets New Line Mode.)

+26786$*(
<ESC>[20l
Resets New Line Mode to "off." (The terminator for the reset command is the letter "l",
ASCII 6C hex.)
<ESC>[20h
Sets New Line Mode to "on."

7DEOH(IIHFWVRIWKH/LQH0RGHRQWKH5HWXUQDQG(QWHU.H\V
.(<%2$5' &+$5$&7(566(17727+(+267
,1387 1HZ/LQH0RGHRII 1HZ/LQH0RGHRQ
5HWXUQ 7&6 VHQGV&5!
 7&6VHQGV&5!/)!
(QWHU 7&6VHQGV&5! 7&6VHQGV&5!/)!

:KHQWKHDX[LOLDU\NH\SDGLVLQWKH1XPHULF0RGH

7DEOH(IIHFWVRIWKH1HZ/LQH0RGHRQ&XUVRU0RYHPHQW
+267 &85625029(0(17
287387 1HZ/LQH0RGHRII 1HZ/LQH0RGHRQ
/)!))!RU 0RYHVFXUVRUWRQH[WOLQHVDPH 0RYHVFXUVRUWRQH[WOLQHOHIWPDUJLQ
97! FROXPQ

5-62
12&+$1*($WWULEXWH0RGH&RPPDQG^)1&$0` 5HPRWH
The NOCHANGE Attribute Mode command sets and resets the NOCHANGE Attribute Mode.
The NOCHANGE Attribute Mode allows the host to freeze the visual attributes (character
attributes and line type) of the display.
When the NOCHANGE Attribute Mode is set, the host can modify the character contents within
an area of the display without affecting the visual attributes in use in the area. Commands that
directly call for changes to visual attributes override the NOCHANGE Attribute Mode. These
commands are listed in Table 5-10.
The NOCHANGE Attribute Mode command can prevent all other commands from changing the
visual attributes. The effect of the NOCHANGE Attribute Mode on these commands is shown in
Table 5-9.

NOTE
The NOCHANGE Attribute Mode prevents the Set Character Attributes command from changing the
attributes of characters subsequently placed on the display. To change the character attributes of any
position on the display when the NOCHANGE Attribute Mode is set, the Modify Character Attributes in a
Region command must be used.

'()$8/7
Reset.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>3l
Resets NOCHANGE Attribute Mode. (The terminator for the reset command is the letter "l",
ASCII 6C hex.)
<ESC>[>3h
Sets NOCHANGE Attribute Mode.

5-63
7DEOH&RPPDQGV$IIHFWHGE\12&+$1*($WWULEXWH0RGH
&200$1' 23(5$7,212)&200$1':+(1 23(5$7,212)&200$1':+(1
12&+$1*($775,%87(02'(,65(6(7 12&+$1*($775,%87(02'(,66(7
2)) 21
&KDUDFWHUVVHQWIRU &KDUDFWHUVDUHGLVSOD\HG &KDUDFWHUVDUHGLVSOD\HG
GLVSOD\
&KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH &KDUDFWHU$WWULEXWHVDUHXQDIIHFWHG
6HW&KDUDFWHU$WWULEXWHVFRPPDQG
(UDVH&KDUDFWHU &KDUDFWHUVDUHHUDVHG &KDUDFWHUVDUHHUDVHG
&KDUDFWHUDWWULEXWHVWXUQHGRII &KDUDFWHU$WWULEXWHVDUHXQDIIHFWHG
(UDVHLQ/LQH &KDUDFWHUVDUHHUDVHG &KDUDFWHUVDUHHUDVHG
&KDUDFWHUDWWULEXWHVWXUQHGRII &KDUDFWHU$WWULEXWHVDUHXQDIIHFWHG
(UDVHLQ'LVSOD\ &KDUDFWHUVDUHHUDVHG &KDUDFWHUVDUHHUDVHG
&KDUDFWHUDWWULEXWHVWXUQHGRII &KDUDFWHU$WWULEXWHVDUHXQDIIHFWHG
/LQHVFDQKDYHWKHLUOLQHW\SHVUHVHWWR /LQHW\SHVDUHXQDIIHFWHG
QRUPDO
6FUROOLQJ 1HZOLQHVVFUROOLQJLQWRWKHUHJLRQKDYHDOLQH 1HZOLQHVVFUROOLQJLQWRWKHUHJLRQKDYHWKHLU
W\SHRIQRUPDOWKHLUFKDUDFWHUDWWULEXWHV FKDUDFWHUFRQWHQWVHUDVHGEXWWKHLUOLQHW\SH
WXUQHGRIIDQGWKHLUFKDUDFWHUFRQWHQWV DQGFKDUDFWHUDWWULEXWHVPDWFKWKRVHRIWKH
HUDVHG OLQHWKDWMXVWVFUROOHGRXWRIWKHUHJLRQ
1HZFKDUDFWHUVGLVSOD\HGLQWKHOLQHKDYH
DWWULEXWHVGHWHUPLQHGE\WKH6HW&KDUDFWHU
$WWULEXWHVFRPPDQG
(UDVHD5HJLRQ &KDUDFWHUVDUHHUDVHG &KDUDFWHUVDUHHUDVHG
&KDUDFWHUDWWULEXWHVDUHWXUQHGRII &KDUDFWHU$WWULEXWHVDUHXQDIIHFWHG
(UDVHD7RXFKNH\ &KDUDFWHUVDUHUHSODFHG &KDUDFWHUVDUHUHSODFHG
&KDUDFWHUDWWULEXWHVDUHWXUQHGRII &KDUDFWHUDWWULEXWHVDUHXQDIIHFWHG
2XWOLQHD5HJLRQ &KDUDFWHUVDUHUHSODFHG &KDUDFWHUVDUHUHSODFHG
&KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH &KDUDFWHU$WWULEXWHVDUHXQDIIHFWHG
6HW&KDUDFWHU$WWULEXWHVFRPPDQG
2XWOLQHD &KDUDFWHUVDUHUHSODFHG &KDUDFWHUVDUHUHSODFHG
7RXFKNH\
&KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH &KDUDFWHUDWWULEXWHVDUHXQDIIHFWHG
6HW&KDUDFWHU$WWULEXWHVFRPPDQG
&XVWRP2XWOLQHD &KDUDFWHUVDUHUHSODFHG &KDUDFWHUVDUHUHSODFHG
5HJLRQ
&KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH &KDUDFWHUDWWULEXWHVDUHXQDIIHFWHG
6HW&KDUDFWHU$WWULEXWHVFRPPDQG
&XVWRP2XWOLQHD &KDUDFWHUVDUHUHSODFHG &KDUDFWHUVDUHUHSODFHG
.H\
&KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH &KDUDFWHUDWWULEXWHVDUHXQDIIHFWHG
6HW&KDUDFWHU$WWULEXWHVFRPPDQG

5-64
7DEOH&RPPDQGV$IIHFWHGE\12&+$1*($WWULEXWH0RGHFRQWLQXHG
&200$1' 23(5$7,212)&200$1':+(1 23(5$7,212)&200$1':+(1
12&+$1*($775,%87(02'(,65(6(7 12&+$1*($775,%87(02'(,66(7
2)) 21
)LOO5HJLRQZLWK &KDUDFWHUVDUHUHSODFHG &KDUDFWHUVDUHUHSODFHG
&KDUDFWHU
&KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH &KDUDFWHUDWWULEXWHVDUHXQDIIHFWHG
6HW&KDUDFWHU$WWULEXWHVFRPPDQG
)LOO7RXFKNH\ZLWK &KDUDFWHUVDUHUHSODFHG &KDUDFWHUVDUHUHSODFHG
&KDUDFWHU
&KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH &KDUDFWHUDWWULEXWHVDUHXQDIIHFWHG
6HW&KDUDFWHU$WWULEXWHVFRPPDQG
'UDZ%DUIRU%DU &KDUDFWHUVDUHUHSODFHG &KDUDFWHUVDUHUHSODFHG
&KDUW
&KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH &KDUDFWHUDWWULEXWHVDUHXQDIIHFWHG
6HW&KDUDFWHU$WWULEXWHVFRPPDQG

 For the color TCS, when nochange attribute mode is reset, commands that erase characters turn
off the highlight, underline, blink, reverse-video, and concealed attributes and fill the erased area
using the currently selected color attributes. When nochange attribute mode is set, these
commands function exactly as they do on the monochrome TCS.

(;$03/(6
1) Suppose the operator frequently needs to work some distance from the TCS and could not
easily see normal characters. The following technique could be used to make the display
readable at greater distances.
a) The host sets each line in the scrolling region to be a double-wide line.
b) Then, the host sets the NOCHANGE Attribute Mode.
c) From this point on, the TCS displays all incoming characters in double-wide format with
no further action required by the host. If this technique is used, the host should be sure to
send lines no longer than 40 characters (or set the Auto-Wrap Mode) to ensure that all
characters are visible.
d) The entire scrolling region retains its double-wide line attributes as new characters
arrive, even with the display scrolling
2) The following sequence illustrates another typical use of the NOCHANGE Attribute Mode:
a) The host sends the Set Character Attributes command to select highlighted characters,
then sends the message, "WARNING. . . HEAT RISING." The message is displayed in
highlighted characters.
b) The host sends the Set Character Attributes command to select new character attributes
(for example, normal attributes), then sends a less important message for display
elsewhere on the screen, using the new attributes.
c) The host sets the NOCHANGE Attribute Mode.

5-65
d) The host replaces the earlier warning message with the new message, "DANGER...
OVER LIMIT." The new message is displayed with the same attributes as the previous
warning message (highlighted).
The host can continue to update the various messages on the screen using their previous
character attributes without having to send the Set Character Attributes command each time.
If the host sends a command specifically calling for a change in visual attributes, that command
will be executed regardless of the state of the NOCHANGE Attribute Mode. Commands that are
unaffected by the NOCHANGE Attribute Mode are listed in Table 5-10.

7DEOH&RPPDQGV8QDIIHFWHGE\12&+$1*($WWULEXWH0RGH
&200$1' $&7,216&$86('5(*$5'/(662)7+(12&+$1*($775,%87(
02'(6(77,1*
6FUHHQ%DFNJURXQG0RGH 7KHFKDUDFWHUIRUHJURXQGDQGEDFNJURXQGDSSHDUUHYHUVHGIURPSUHYLRXV
VWDWH
'LVSOD\1RUPDO/LQH 7KHOLQHW\SHLVFKDQJHGWRQRUPDO
'LVSOD\'RXEOH:LGWK/LQH 7KHOLQHW\SHLVFKDQJHGWRGRXEOHZLGWK
'LVSOD\'RXEOH6L]H/LQH 7KHOLQHW\SHLVFKDQJHGWRGRXEOHVL]H
3ODFH'RXEOH6L]H/LQH 7KHOLQHW\SHLVFKDQJHGWRGRXEOHVL]H
6HW&KDUDFWHU$WWULEXWHV &KDQJHVFXUUHQWDWWULEXWHVVHOHFWHG 1RWHWKDWDOWKRXJKFXUUHQWDWWULEXWHV
DUHFKDQJHGWKHQHZDWWULEXWHVDUHQRWXVHGZKLOH12&+$1*($WWULEXWH
0RGHLVVHW6HH&KDUDFWHUVVHQWIRUGLVSOD\LQ7DEOH
6HW&KDUDFWHU$WWULEXWHV &KDQJHVFXUUHQWDWWULEXWHVVHOHFWHG
0RGLI\&KDUDFWHU$WWULEXWHVLQD &KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH6HW&KDUDFWHU$WWULEXWHV
5HJLRQ FRPPDQG
5HYHUVH&KDUDFWHU$WWULEXWHVLQD &KDUDFWHUDWWULEXWHVDUHUHYHUVHG
5HJLRQ
0RGLI\&KDUDFWHU$WWULEXWHVLQD &KDUDFWHUDWWULEXWHVDUHGHWHUPLQHGE\WKH6HW&KDUDFWHU$WWULEXWHV
7RXFKNH\ FRPPDQG
5HYHUVH&KDUDFWHU$WWULEXWHVLQD &KDUDFWHUDWWULEXWHVDUHUHYHUVHG
7RXFKNH\
7RXFKNH\9LVXDO([WHQW 7KHYLVXDOH[WHQWLVDXWRPDWLFDOO\XSGDWHGDVVSHFLILHGZKHQWKHWRXFKNH\
LVSUHVVHG

*For the color TCS, when the foreground and background color parameters of the Set Character
Attributes command are changed locally, the Setup Screen and the screen displayed before
entering the Setup Screen are repainted with the new colors.

5-66
1DWLRQDO5HSODFHPHQW&RGH&RPPDQG^)15&` /RFDO5HPRWH
The National Replacement Code (NRC) command lets the user or host substitute a designated set
of international characters in place of some standard ASCII characters on the display.
This command allows text containing characters unique to one of 11 languages to be displayed
and manipulated without a special keyboard or 8-bit codes. Table 5-11 shows the default contents
of the character sets and the characters that are replaced.
The NRC command selects a value for the NRC parameter.

• When the NRC parameter is “off,” 7-bit graphic codes sent from the host are directly mapped
to the Standard Character Set.

• When the NRC parameter is set to a country designator, some 7-bit graphic codes sent from
the host for display are remapped using the National Replacement Code specified by the
NRC value.
The NRC selection affects the TCS display only, not the communication between the TCS and
host. International characters are substituted on the display only, not in the codes transmitted
between the TCS and host.
For example, after setting the NRC value to “German,” the user can create a text file that
contains standard ASCII characters. When this text file is displayed, the appropriate German
characters are displayed. However, if the same file is viewed with the NRC set to “off,” the
displayed international characters which were peculiar to the German NRC appear as standard
ASCII symbolic characters; for example, an “a umlaut” (ä) is displayed as a left-brace ({).

NOTE
1. A change to the NRC affects only the codes received after the NRC is changed.
2. Which characters the TCS displays depends on the contents of the Extended Character Set. It is
recommended that the Static Special Character Font be mapped into the Extended Character Set whenever
any National Replacement Code is in use. This is the default situation unless the host has issued a Map
Character Font command involving the Extended Character Set.

'()$8/7
Off.

23(5$72586$*(
The user selects the National Replacement Code by entering the Setup Screen and using
touchkeys or the optional keyboard, setting the NRC parameter to one of the following values:

• off

• Danish

• Dutch

• French

• Canadian

5-67
• Finnish

• German

• Italian

• Spanish

• Swedish

• Swiss

• UK

+26786$*(
<ESC> [4 ; <Ps> z
<Ps> is the NRC selective parameter.
If <Ps> NRC is
0 off
1 Danish
2 Dutch
3 French
4 Canadian
5 Finnish
6 German
7 Italian
8 Spanish
9 Swedish
10 Swiss
11 UK

3266,%/((55256
If the Extended Character Set is selected by the Select Character Set command, graphic codes
will be shifted-out to the Extended Character Set and will not be affected by the NRC. The NRC
only operates on graphic codes when the Select Character Set command is selecting the Standard
Character Set.

5-68
(;$03/(6
<ESC>[4;7z
Sets the NRC to Italian.
<ESC>[4z
Sets the NRC to "off". (No replacements are made.)
<ESC>[4;11z

Sets the NRC to UK.

5-69
7DEOH1DWLRQDO5HSODFHPHQW&RGH&KDUDFWHUV

1$7,21$/,7< &+$5$&7(5 &+$5$&7(5 '(6&5,37,212)


5(&(,9(' ',63/$<(' ',63/$<('
&+$5$&7(5
'DQLVK # b $XPODXW
@ c $ULQJ
@  $(OLJDWXUH
? ‘ 26ODVK
Ö h 8XPODXW
C l DXPODXW
` n DULQJ
^   DHOLJDWXUH
_ ¡ RVODVK
a  XXPODXW
'XWFK  … SRXQGV\PERO
# ô IUDFWLRQ
> LM LMOLJDWXUH
? ò IUDFWLRQ
@ _ YHUWLFDOEDU
^ Ž XPODXW EDUH
_ ¦ VFULSWI
` ó IUDFWLRQ
a ¶ VLQJOHTXRWH
)UHQFK  … SRXQGV\PERO
@ † VHFWLRQVLJQ
> ƒ GHJUHHVLJQ
# j DJUDYH
? o FFHGLOOD
` q HJUDYH
^ p HDFXWH
_  XJUDYH
a Ž XPODXW EDUH
&DQDGLDQ # j DJUDYH
> k DFLUFXPIOH[
? o FFHGLOOD
` q HJUDYH
^ p HDFXWH
@ r HFLUFXPIOH[
Ö v LFLUFXPIOH[
C { RFLUFXPIOH[
_  XJUDYH
a € XFLUFXPIOH[

5-70
7DEOH1DWLRQDO5HSODFHPHQW&RGH&KDUDFWHUVFRQWLQXHG

1$7,21$/,7< &+$5$&7(5 &+$5$&7(5 '(6&5,37,212)


5(&(,9(' ',63/$<(' ',63/$<('
&+$5$&7(5
)LQQLVK > b $XPODXW
@ c $ULQJ
? g 2XPODXW
Ö h 8XPODXW
^ l DXPODXW
` n DULQJ
C q HJUDYH
_ | RXPODXW
a  XXPODXW
*HUPDQ # † VHFWLRQVLJQ
> b $XPODXW
? g 2XPODXW
@ h 8XPODXW
a ‰ *HUPDQ
^ l DXPODXW
_ | RXPODXW
`  XXPODXW
,WDOLDQ   SRXQGV\PERO
# † VHFWLRQVLJQ
> ƒ GHJUHHVLJQ
a u LJUDYH
^ j DJUDYH
? o FFHGLOOD
` q HJUDYH
@ p HDFXWH
_ z RJUDYH
C  XJUDYH
6SDQLVK > £ LQYHUWHG
 … SRXQGV\PERO
# † VHFWLRQVLJQ
^ ƒ GHJUHHVLJQ
@ ¢ LQYHUWHG"
? f 1WLOGH
` o FFHGLOOD
_ x QWLOGH

5-71
7DEOH1DWLRQDO5HSODFHPHQW&RGH&KDUDFWHUVFRQWLQXHG

1$7,21$/,7< &+$5$&7(5 &+$5$&7(5 '(6&5,37,212)


5(&(,9(' ',63/$<(' ',63/$<('
&+$5$&7(5
6ZHGLVK # Ê (JUDYH
> b $XPODXW
@ c $ULQJ
? g 2XPODXW
Ö h 8XPODXW
^ l DXPODXW
` n DULQJ
C q HJUDYH
_ | RXPODXW
a  XXPODXW
6ZLVV # j DJUDYH
^ l DXPODXW
? o FFHGLOOD
± q HJUDYH
> p HDFXWH
@ r HFLUFXPIOH[
Ö v LFLUFXPIOH[
C { RFLUFXPIOH[
_ | RXPODXW
a € XFLUFXPIOH[
`  XXPODXW
8.  … SRXQGV\PERO

5-72
6HW&KDUDFWHU$WWULEXWHV&RPPDQG>6*5@ 0RQRFKURPH5HPRWH
&RORU/RFDO5HPRWH
The Set Character Attributes command selects the visual attributes for displayed characters.
Separate parallel areas within memory store characters and their attributes. A convenient visual
model is to think of the display as being a composite view through translucent planes, as shown
in Figure 5-9. The Set Character Attributes command can be thought of as a way to select which
attributes will be active in the attributes plane when upcoming characters are placed in the
character plane for display.

)LJXUH&RQFHSWXDO0RGHO&KDUDFWHUVDQG7KHLU$WWULEXWHV
After the Set Character Attributes command has been sent, new characters displayed by the TCS
appear with the selected attributes unless the NOCHANGE Attribute Mode is set. If scrolling
causes characters to move, the characters’ attributes move with them, regardless of where the
characters are placed on the screen.
One or more attributes can be changed at a time. Changing an attribute does not turn off the other
attributes already selected. An attribute can be turned on or off individually, or all attributes can
be turned off at once.
The TCS can display characters with the following attributes:

• Highlight
The character is displayed with increased intensity.
Color TCS: Each of the eight basic colors has an associated highlight color which is
substituted for the currently programmed foreground color when the attribute is selected. The
highlight colors are generally a lighter or brighter version of the basic color.

5-73
• Underline
The character is underlined.

• Blink
The character blinks on or off every second with a 50% duty cycle.

NOTE
A 50% duty cycle means the character is "on" half of the time.

• Reverse-Video
The character cell foreground matches the screen background, and the character cell background
matches the screen foreground.
Color TCS: For each character with the reverse-video attribute selected, the foreground color
is replaced with the background color and vice versa.

• Concealed
The character appears blank. Blank means that the character cell foreground is the same as the
character cell background. While the concealed attribute is on, the highlight, underline, blink,
and reverse-video attributes are temporarily suppressed in the concealed area.
Color TCS: The character cell foreground and background are both displayed in the currently
programmed conceal color, causing concealed characters to disappear. When the concealed
attribute is on, the highlight, underline, blink, and reverse-video attributes are temporarily
suppressed in the concealed area.

NOTE
Even concealed, the character and its attribute information is stored in screen memory and can be made
visible again by sending the Reverse Character Attributes in a Region command to "undo" the conceal
attribute.

• Foreground Color (color TCS only)


Any of eight basic colors can be selected for the foreground color attribute. The currently
selected background color is used to display the inactive dot area in each character cell. This
attribute can be controlled remotely or locally.

• Background Color (color TCS only)


Any of the eight basic colors can be selected for the background color attribute. The
currently selected background color is used to display the inactive dot area in each character
cell. This attribute can be controlled remotely or locally.

• Concealed Color (color TCS only)


Any of the eight basic colors can be selected for the conceal color attribute. This single color
is used to fill the foreground and background of all characters that have the conceal attribute
turned on. The conceal color should normally be programmed to match the background color
used on most of the screen.

5-74
'()$8/76
The highlight, underline, blink, reverse-video, and concealed attributes are turned off.
Color TCS: The foreground color is white (37) and the background is black (40). The conceal
color is black (70).

23(5$72586$*(
For the monochrome TCS, this is a remote command only.
Color TCS: Foreground and background color are the only attributes that can be set locally by
the Setup Screen. These attributes are equally controllable by the user and host; each remains set
to the value last specified until changed by either the user or host.

+26786$*(
<ESC>[<PS>;...;<PS>m
<Ps> is a selective parameter, designating the character attribute(s).
If <Ps> is 0 or omitted, turn off all attributes.
If <Ps> is 1, highlight.
If <Ps> is 22, turn off highlight.
If <Ps> is 4, underline.
If <Ps> is 24, turn off underline.
If <Ps> is 5, blink.
If <Ps> is 25, turn off blink.
If <Ps> is 7, reverse-video.
If <Ps> is 27, turn off reverse-video.
If <Ps> is 8, conceal.
If <Ps> is 28, turn off conceal.
NOTE
The parameter values can be combined to select multiple character attributes with a single control string
(see examples, below). Invalid selective parameters are ignored.

Color TCS: Table 5-12 shows additional <Ps> values for the Set Character Attributes command.
These parameters are valid for the color TCS only.

7DEOH&RORU3DUDPHWHUVRIWKH6HW&KDUDFWHU$WWULEXWHV&RPPDQG

&2/25 )25(*5281' %$&.*5281' &21&($/


%ODFN   
5HG   
*UHHQ   

5-75
7DEOH&RORU3DUDPHWHUVRIWKH6HW&KDUDFWHU$WWULEXWHV&RPPDQGFRQWLQXHG

&2/25 )25(*5281' %$&.*5281' &21&($/


<HOORZ   
%OXH   
0DJHQWD   
&\DQ   
:KLWH   

3266,%/((55256
If the host specifies two or more incompatible character attributes in the same control (such as
concealed followed by not concealed), the last character attribute (not concealed) takes effect.
Color TCS: If the user or host sets foreground and background to the same color, textual
information outside the Setup Screen will not be visible when upcoming characters are placed in
the character plane for display.
If the Save Setup command is executed while the foreground and background are set to the same
color, the next the TCS is powered up the display will appear blank.

(;$03/(6
<ESC>[7;5m
Select reverse-video and blink in addition to any attributes previously selected.
<ESC>[m
Turn off all video attributes. New characters displayed after this command appear normally
(all attributes off).
Color TCS:
<ESC>[33;41;5m
Select yellow foreground, red background, and blink attributes.
<ESC>[4;74m
Select the underline attribute and fill all currently existing and upcoming concealed areas
with blue.

5-76
6FUROOLQJ5HJLRQ&RPPDQG '(&67%0  5HPRWH
The Scrolling Region command limits scrolling to a portion of the screen.
This feature is useful when one area of the screen must display immobile objects (such as touch
targets) while another area of the screen displays scrolling information.
A scrolling region is designated by specifying the top and bottom lines of the region. The
minimum size of a scrolling region is two lines. When specifying a scrolling region, the line
number of the top must be less than the line number of the bottom. (Lines on the TCS screen are
consecutively numbered from top to bottom.)
The scrolling region specifies which portion of the screen can scroll and the area within which
relative cursor movements are limited.

NOTE
Once inside the scrolling region, relative cursor commands cannot cause the cursor to leave the scrolling
region. Only the Move Cursor to Absolute Position command can move the cursor out of the scrolling
region (and then only when Origin Mode is reset). When the Origin Mode is set, the cursor can never leave
the scrolling region, even with a Move Cursor to Absolute Position command. See the discussion of the
Origin Mode command in this chapter.

If a scrolling region is specified while the Origin Mode is reset, the cursor moves to the home
position (column 1, line 1) of the screen. If a scrolling region is specified while the Origin Mode
is set, the cursor moves to the home position of the scrolling region (column I of the top line of
the scrolling region).
Normally, when a line scrolls out of a scrolling region, its characters disappear, its line type
reverts to normal, its character attributes are set to "off", and it reappears as the new line on the
other end of the scrolling region. However, if the NOCHANGE Attribute Mode is set, when a
line scrolls out of a scrolling region, only the characters disappear; the line type and character
attributes of the line remain unchanged when the line reappears (as a new line) at the other end of
the scrolling region. This allows character attributes and line types of each line within a scrolling
region to be preserved throughout scrolling operations.

'()$8/7
The scrolling region is the full screen.

23(5$72586$*(
None. (This is a remote command only.)

5-77
+26786$*(
<ESC>[<Pt>;<Pb>r
<Pt> is a numeric parameter, designating the top line of the scrolling region.
If <Pt> is omitted or 0, the top line of the scrolling region is set to line 1.
<Pb> is a numeric parameter, designating the bottom line of the scrolling region.
If <Pb> is omitted or 0, the bottom line of the scrolling region is set to 24.
NOTE
If <Pb> is less than or equal to <Pt>, the command is ignored.

(;$03/(6
<ESC>[5;20r
Changes the scrolling region to be from line 5 through line 20, inclusive.
<ESC>[r
Changes the scrolling region to be the entire screen (line 1 through line 24, inclusive).

5-78
2ULJLQ0RGH&RPPDQG '(&20  5HPRWH
The Origin Mode command sets or resets the Origin Mode. The Origin Mode performs three
functions: it determines whether the lines of the screen are numbered relative to the screen as a
whole or relative only to the scrolling region; whether the cursor can be moved out of the
scrolling region; and whether the Erase in Display and Region commands affects the entire
screen or only the scrolling region. (Also refer to "Scrolling Region Command" in this chapter.)
When Origin Mode is reset (off):

• Line numbering begins with line 1 at the top of the screen and continues through line 24 at
the bottom of the display.

• The cursor can be moved out of the scrolling region, but only by a Move Cursor to Absolute
Position command sent by the host. (Refer to Move Cursor to Absolute Position Command
later in this chapter.)

• The Erase in Display and Region commands affect the entire screen.

• The cursor is moved to the absolute home position of the entire display. The home position is
at the upper-left character position of the screen.

5-79
When the Origin Mode is set (on):

• Line numbering begins with line 1 at the top of the scrolling region and continues through
the bottom of the scrolling region.

• The cursor cannot be moved out of the scrolling region.

• The Erase in Display and Region commands affects the scrolling region.

• The cursor is moved to the home position relative to the scrolling region. The home position
is the upper-left character position within the scrolling region.

When the Origin Mode is set, the scrolling region can, in effect, become a smaller independent
screen within the entire screen. Host software can treat the scrolling region as an independent
screen without regard for those areas outside of the region. This technique is useful when the
host software operating within the scrolling region may not be aware of touch targets drawn
above or below the region. Since erasure and Region commands cannot extend out of the
scrolling region, any data or targets previously placed outside the region cannot be modified
(unless Origin Mode is explicitly reset).

'()$8/7
Reset ("off").

5-80
23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[?6l
Resets the Origin Mode. (The terminator for the reset command is the letter "l", ASCII 6C
hex.)
<ESC>[?6h
Sets the Origin Mode.

5-81
&85625&200$1'6
The Cursor commands determine the appearance and/or location of the cursor. The cursor
commands are:

• Move Cursor to Absolute Position command (Remote)

• Move Cursor to Touchkey command (Remote)

• Move Cursor Forward command (Remote)

• Move Cursor Backward command (Remote)

• Move Cursor Up command (Remote)

• Move Cursor Down command (Remote)

• Next Line command (Remote)

• Index command (Remote)

• Reverse Index command (Remote)

• Read Cursor Position command (Remote)

• Read Character Under Cursor command (Remote)

• Read Attributes Under Cursor command (Remote)

• Cursor Type command (Local/Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begins on a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
bracket [] are ANSI-specified commands. Mnemonics in braces{} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC- private commands.

5-82
0RYH&XUVRUWR$EVROXWH3RVLWLRQ&RPPDQG>&83@>+93@ 5HPRWH
The Move Cursor to Absolute Position command moves the cursor to an absolute character
position on the screen, specified in lines and columns.
The maximum number of lines is 24. On a normal line, the maximum number of columns is 80;
on a double-wide or double-size line, the number of columns is 40.

NOTE
Lines are numbered from top to bottom. Columns are numbered from left to right.

The absolute cursor position can appear at different physical locations on the screen, depending
on whether the Origin Mode is set or reset.
If the Origin Mode is reset:

• The line number specified by this command is relative to the first line of the screen.

• If the Origin Mode is set:

• The line number specified by this command is relative to the first line of the scrolling region.

• The cursor cannot be moved outside the scrolling region with this command. If an attempt is
made to move the cursor to an absolute position outside the scrolling region, the cursor stops
at the edge of the scrolling region.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[<P1>;<Pc>H
<Pl> is a numeric parameter, designating a line number.
If <Pl> is 0 or omitted, the cursor moves to the first line.
If <P1> is n (where n is a number between 1 and 24 inclusive), the cursor moves to line
n.
If <P1> is greater than 24, the cursor moves to the last line.
<Pc> is the numeric parameter, designating a column number.
If <Pc> is 0 or omitted, the cursor moves to the first column.
If <Pc> is n (where n is a number between 1 and 80), the cursor moves to
column n.
If <Pc> is greater than 80, the cursor moves to the last column.
If <Pc> is greater than 40 and the line is double-width or double-size, the cursor moves
to the last column.

5-83
(;$03/(6
<ESC>[H
Moves the cursor home (line 1, column 1).
<ESC>[5;062H
Moves the cursor to line 5, column 62.
<ESC>[24H
Moves the cursor to line 24, column 1.
<ESC>[;30H
Moves the cursor to line 1, column 30.
<ESC>[30H
Moves the cursor to line 24, column 1. (<P1> is greater than 24; therefore, the cursor moves
to the last line on the screen.)

5-84
0RYH&XUVRUWR7RXFKNH\&RPPDQG^)0&7.` 5HPRWH
The Move Cursor to Touchkey command provides a way to easily position the cursor at a
particular touchkey without specifying character coordinates. Then, using relative cursor
movement commands and text display commands, the host can change the visual data at the
touchkey. The command positions the cursor at the upper left character cell within the specified
touchkey.
If a touch cell number that is part of a larger touchkey (but not the master cell) is given in the
command, the cursor goes to the upper left character of the specified touch cell rather than the
upper left character of the touchkey. For more details, refer to the discussion of touchkeys in
Chapter 6.
If the Origin Mode is set, the cursor cannot be moved outside the scrolling region with this
command. If an attempt is made to move the cursor to a touchkey whose upper left character cell
is outside the scrolling region, the cursor stops at the edge of the scrolling region.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[><Pn>H
<Pn> is a numeric parameter specifying the touchkey number in which to position the cursor.
If <Pn> is 0 or omitted, the cursor is placed in the upper left corner of Touchkey 1 (the
home position).

(;$03/(6
<ESC>[>90H
The cursor moves to the upper left corner of Touchkey 90.
<ESC>[>H
The cursor moves to the upper left corner of Touchkey 1 (the home position).

5-85
0RYH&XUVRU)RUZDUG&RPPDQG>&8)@ 5HPRWH
The Move Cursor Forward command is a relative cursor movement command. It moves the
cursor forward (towards the right) without affecting its vertical position.
The cursor cannot be moved beyond the right margin of the screen by this command. The cursor
remains at the right margin and does not move to another line, even if the Auto Wrap-Around
Mode is set ("on").
There are 40 character positions in a double-width or double-size line and 80 in a normal line.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[<Pn>C
<Pn> is a numeric parameter, designating the number of characters to move.
If <Pn> is 0 or omitted, the cursor moves forward (right) one character.
If <Pn> is greater than 0, the cursor moves forward (right) <Pn> characters.

3266,%/((55256
If <Pn> is greater than the number of columns to the right of the cursor position, the cursor is
moved only as far as the right margin of the current line. If an attempt is made to move the cursor
forward past the right margin of the current line, the cursor does not move to another line.

(;$03/(6
<ESC>[C
Moves the cursor forward (right) one character position.
<ESC>[062C
Moves the cursor forward (right) 62 character positions, or to the right margin of the screen
if it is less than 62 characters to the margin.

5-86
0RYH&XUVRU%DFNZDUG&RPPDQG>&8%@ 5HPRWH
The Move Cursor Backward command is a relative cursor movement command. It moves the
cursor backward (left) on the screen without affecting its vertical position.
The cursor cannot be moved beyond the left margin of the current line with this command. The
cursor will not move to the line above it.
There are 40 character positions in a double-width or double-size line and 80 in a normal line.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC> [<Pn>D
<Pn> is a numeric parameter, designating the number of characters to move.
If <Pn> is 0 or omitted, the cursor moves backward (left) one character.
If <Pn> is greater than 0, the cursor moves backward (left) <Pn> characters.

3266,%/((55256
If <Pn> is greater than the number of columns to the left of the cursor position, the cursor is
moved only as far as the left margin of the current line. The cursor does not move to another line
when an attempt is made to move it beyond the left margin of the current line.

(;$03/(6
<ESC>[D
Moves the cursor backward (left) one character position.
<ESC>[029D
Moves the cursor backward (left) 29 character positions. If less than 29 character positions
remain to the left margin of the current line, the cursor moves to the left margin of the screen
and stops.

5-87
0RYH&XUVRU8S&RPPDQG>&88@ 5HPRWH
The Move Cursor Up command is a relative cursor movement command. It moves the cursor up
the screen without affecting its column position.
Once the cursor enters a scrolling region, the cursor cannot be moved outside the scrolling region
with a relative cursor movement command. The cursor stops at the edge of the scrolling region
and the region is not scrolled. However, if the cursor is already outside the scrolling region, this
command can move the cursor until it reaches the top edge of the screen.
When the cursor reaches the top line of the screen, the cursor cannot be moved any farther by
this command. The cursor remains on the top line, and the screen is not scrolled when an attempt
is made to move the cursor past the top line.
When the cursor is moved between normal lines and double-width or double-size lines, the
cursor moves across the screen horizontally as well as vertically. This is because the cursor
follows character column positions, which are in different physical locations on the screen for
normal and double-width (or double-size) lines. (Double-width and double-size lines are 40
columns wide, and normal lines are 80 columns wide.) For example, as the cursor moves
between column 40 on a double-size line and column 40 on a normal line, the cursor’s physical
position jumps from the right margin of the screen on the double-size line to the center of the
screen on the normal line.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[<Pn>A
<Pn> is numeric parameter, designating the number of lines to move.
If <Pn> is 0 or omitted, the cursor moves up one line.
If <Pn> is greater than 0, the cursor moves up <Pn> lines.

3266,%/((55256
No scrolling occurs when an attempt is made to move the cursor above the top line of the
scrolling region or above the top of the screen.

(;$03/(6
<ESC>[A
Moves the cursor up one line.
<ESC>[021A
Moves the cursor up 21 lines. If the cursor was originally less than 21 lines down from the
top of the screen (or scrolling region), the cursor is moved to the top line of the screen (or
scrolling region).

5-88
0RYH&XUVRU'RZQ&RPPDQG>&8'@ 5HPRWH
The Move Cursor Down command is a relative cursor movement command. It moves the cursor
down the screen without affecting its column position.
Once the cursor enters a scrolling region the cursor cannot be moved outside the scrolling region
with a relative cursor movement command. The cursor stops at the edge of the scrolling region
and the region is not scrolled. However, if the cursor is already outside the scrolling region, the
Move Cursor Down command can move the cursor until it reaches the bottom edge of the screen.
When the cursor reaches the bottom line of the screen, the cursor cannot be moved any farther by
this command. The cursor remains on the bottom line and the screen is not scrolled when an
attempt is made to move the cursor past the bottom line.
When the cursor is moved between normal lines and double-width or double-size lines, the
cursor moves across the screen horizontally as well as vertically. This is because the cursor
follows character column positions, which are in different physical locations on the screen for
normal and double-width (or double-size) lines. (Double-width and double-size lines are 40
columns wide, and normal lines are 80 columns wide.) For example, as the cursor moves
between column 40 on a double-size line and column 40 on a normal line, the cursor’s physical
position jumps from the right margin of the screen on the double-size line to the center of the
screen on the normal line.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[<Pn>B
<Pn> is a numeric parameter, designating the number of lines to move.
If <Pn> is 0 or omitted, the cursor moves down one line.
If <Pn> is greater than 0, the cursor moves down <Pn> lines.

3266,%/((55256
No scrolling occurs when an attempt is made to move the cursor below the bottom line of the
scrolling region or below the bottom of the screen.

(;$03/(6
<ESC>[B
Moves the cursor down one line.
<ESC>[021B
Moves the cursor down 21 lines. If the cursor was originally less than 21 lines up from the
bottom of the screen (or scrolling region), the cursor moves to the bottom line of the screen
(or scrolling region).

5-89
1H[W/LQH&RPPDQG>1(/@ 5HPRWH
The Next Line command is a relative cursor movement command. It moves the cursor to column
1 (the first position) on the next line.
The Next Line command has the following effects:

• If the cursor is on the bottom line of the scrolling region when the command is received, the
region is scrolled up.

• If the scrolling region is the entire screen and the cursor is on the bottom line when the
command is received, the screen is scrolled up.

• If the cursor is outside the scrolling region when the command is received, the cursor is
moved down one line until it reaches the bottom edge of the screen. Subsequent attempts to
move the cursor beyond the bottom edge of the screen do not move the cursor and do not
scroll the screen.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC> E
-or-
<NEL> can be used when the host and TCS are communicating using 8 data bits.
Moves the cursor to column 1 of the next line down. If the cursor is already on the bottom
line of the scrolling region, this command causes the region to scroll up.

5-90
,QGH[&RPPDQG>,1'@ 5HPRWH
The Index command is a relative cursor movement command. It moves the cursor down one line
without affecting its column position.
The Index command differs from the Move Cursor Down command in that if the cursor is on the
bottom line of the scrolling region when the Index command is sent, the region is scrolled up. (If
the scrolling region is the entire screen, the screen is scrolled up.)
If the cursor is outside the scrolling region when this command is sent, the cursor is moved down
one line until it reaches the bottom edge of the screen. Subsequent attempts to move the cursor
beyond the bottom edge of the screen are ignored and do not scroll the screen.
When the cursor is moved between normal lines and double-width or double-size lines, the
cursor moves across the screen horizontally as well as vertically. This is because the cursor
follows character column positions, which are in different physical locations on the screen for
normal and double-width (or double-size) lines. (Double-width and double-size lines are 40
columns wide, and normal lines are 80 columns wide.) For example, as the cursor moves
between column 40 on a double-size line and column 40 on a normal line, the cursor’s physical
position jumps from the right margin of the screen on the double-size line to the center of the
screen on the normal line.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>D
-or-
<IND> can be used when the host and TCS are communicating using 8 data bits.
Moves the cursor down one line in the same column. If the cursor is already on the bottom
line of the scrolling region, this command causes the region to scroll up.

5-91
5HYHUVH,QGH[&RPPDQG>5,@ 5HPRWH
The Reverse Index command is a relative cursor movement command. It moves the cursor up one
line without affecting the cursor’s column position.
The Reverse Index command differs from the Move Cursor Up command in that if the cursor is
on the top line of the scrolling region when the Reverse Index command is sent, the region is
scrolled down. (If the scrolling region is the entire screen, the screen is scrolled down.)
If the cursor is outside the scrolling region when this command is issued, the cursor is moved up
one line until it reaches the top edge of the screen. Subsequent attempts to move the cursor
beyond the edge of the screen are prevented and do not scroll the screen.
When the cursor is moved between normal lines and double-width or double-size lines, the
cursor moves across the screen horizontally as well as vertically. This is because the cursor
follows character column positions, which are in different physical locations on the screen for
normal and double-width (or double-size) lines. (Double-width and double-size lines are 40
columns wide, and normal lines are 80 columns wide.) For example, as the cursor moves
between column 40 on a double-size line and column 40 on a normal line, the cursor’s physical
position jumps from the right margin of the screen on the double-size line to the center of the
screen on the normal line.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>M
-or-
<RI> can be used when the host and TCS are communicating using 8 data bits.
Moves the cursor up one line in the same column. If the cursor is already on the top line of
the scrolling region, this command causes the region to scroll down.

5-92
5HDG&XUVRU3RVLWLRQ&RPPDQG>&35@ 5HPRWH
The Read Cursor Position command allows the host to determine the cursor’s position on the
screen.
After receiving the Read Cursor Position command from the host, the TCS reports the vertical
and horizontal position of the cursor by responding with a string in the following format:
<ESC>[<P1>;<Pc>R
<P1> is a numeric parameter, designating a line number.
<P1> is a number between 1 and 24 (inclusive). It represents the relative line number of
the cursor. If the Origin Mode is set, line 1 is at the top of the scrolling region. If Origin
Mode is reset, line 1 is at the top of the screen.
<Pc> is a numeric parameter, designating a column number.
<Pc> is a number between 1 and 80 (inclusive) for normal lines or a number between 1
and 40 (inclusive) for double-width or double-size lines. It represents the character
column occupied by the cursor and properly takes into account double-width columns
which occur within double-size or double-width lines.
The format of this response string can be changed by the Reporting Format command, which is
discussed in detail in Chapter 4.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[6n

(;$03/(
<ESC>[6n
This command requests the TCS to report the cursor position. If the cursor is located halfway
down and halfway across the screen on a normal line (not double-width or double-size), the
TCS responds with:
<ESC>[12,40R
NOTE
The report may differ from the above format if the Reporting Format command has been issued. Please
refer to the Reporting Format command description in Chapter 4 for details.

5-93
5HDG&KDUDFWHU8QGHU&XUVRU&RPPDQG^)5&8&` 5HPRWH
The Read Character Under Cursor command causes the TCS to identify (for the host) the
character under the cursor, in effect, allowing the host to read any character displayed on the
screen.
The uses of this command include:

• Reading the entire screen and sending it to a printer.

• Saving a message that is displayed on the screen, displaying a new message in the same area,
and then restoring the previous message.

• Testing the character memory of the TCS remotely.


After receiving the Read Character Under Cursor command from the host, the TCS responds by
sending a control string to the host that identifies the character at the current position of the
cursor. The control string takes the form:
<ESC>[>3;<Pc>n
<Pc> is the decimal value of the character under the cursor. For example, if <Pc> is 43, a
plus ("+") is under the cursor.

NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.

A character may have been displayed in one of two ways:

• The host can send a graphic code directly to the TCS (either as a 7- or 8-bit code or as a 7-bit
ASCII code shifted to the Extended Character Set with the Select Character Set command).

• The host can designate a National Replacement Code (NRC) and then send a graphic code to
the TCS. The TCS uses the NRC to "translate" the graphic code into the appropriate
international character on the display.
If the character under the cursor was placed there using a National Replacement Code, the
character is reported in the form:
<ESC>[>3;<Pnrc>n
<Pnrc> is the decimal value of the graphic code that was originally sent by the host before
the code was translated for display as an international character.
(It is the responsibility of the host to ensure that the NRC in effect when this command is
sent matches the NRC used when the character was originally sent to the TCS.)

23(5$72586$*(
None. (This is a remote command only.)

5-94
+26786$*(
<ESC>[>3n

3266,%/((55256
The TCS assumes that the NRC in effect when the Read Character Under Cursor command is
sent is the same as when the character was originally displayed by the TCS.
If this is not the case, when the Read Character Under Cursor command is received by the TCS,
the TCS will return a control string to the host identifying a code that may not match the code
originally sent by the host.
For example, assume the German NRC is selected and the host sends the code representing an
ASCII "{" character that translates into an a umlaut (ä) for display on the screen. Now assume the
NRC is changed to Italian. If the Read Character Under Cursor command is sent, the TCS will
attempt to find an a umlaut (ä) in the Italian NRC set and reverse map it to the code representing
the original ASCII character. It will not be able to do so and will, therefore, return a string
identifying the a umlaut (ä) as if it had been placed there without the use of an NRC.

(;$03/(6
<ESC>[>3n
Requests the TCS to report the character under the cursor.
If the character is "g" (103 decimal, 67 hex), the TCS responds:
<ESC>[>3;103n
If the character is "e grave" (e) and the current NRC is "Italian", the TCS responds:
<ESC>[>3;125n
NOTE
"e grave "(e) maps into "}’, which is represented by the code 7D in hex and 125 in decimal.

If the cursor is over the upper-left corner of Boxtype 2 (1 36 decimal, 88 hex), the TCS responds:
<ESC>[>3;136n

5-95
5HDG$WWULEXWHV8QGHU&XUVRU&RPPDQG^)5$8&` 5HPRWH
The Read Attributes Under Cursor command allows the host to read the character attributes
shown on the screen.
The Read Attributes Under Cursor command is used to:

• Read the entire screen and send it to a printer.

• Save a message displayed on the screen, display a new message in the same area, and then
restore the previous message.

• Test the attribute memory of the TCS remotely.


After receiving this command, the TCS responds by sending the host the attributes of the
character at the current position of the cursor as follows:
Monochrome TCS:
<ESC> [>4 ;<Phi> ;<Pul> ;<Pblink> ;<Prv> ;<Pconcl> n
Color TCS:
<ESC> [>4 ;<Phi> ;<Pul> ;<Pblink> ;<Prv> ;<Pconcl> ;<Pfg> ; <Pbg> ;<Pcc> n

NOTE
The report may differ from the above format if the Reporting Format command has been issued. Please
refer to the Reporting Format command description in Chapter 4 for details

<Phi> is the Highlight attribute.


If <Phi> is 1, Highlight is on.
If <Phi> is 22, Highlight is off.
<Pul> is the Underline attribute.
If <Pul> is 4, Underline is on.
If <Pul> is 24, Underline is off.
<Pblink> is the Blink attribute.
If <Pblink> is 5, Blink is on.
If <Pblink> is 25, Blink is off.
<Prv> is the Reverse-Video attribute.
If <Prv> is 7, Reverse-Video is on.
If <Prv> is 27, Reverse-Video is off.
<Pconcl> is the Concealed attribute.
If <Pconcl> is 8, Conceal is on.
If <Pconcl> is 28, Conceal is off.

5-96
The following parameters are valid for the color TCS only. Table 5-13 shows the definitions for
the color attributes.
<Pfg> is the foreground color attribute
<Pbg> is the background color attribute
<Pcc> is the conceal color attribute that shows conceal color activity for the entire screen,
regardless of cursor position.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>4n
Requests the TCS to report the attributes of the character at the current cursor location.

(;$03/(
The host requests the TCS to report the attributes under the cursor by sending:
<ESC>[>4n
Monochrome TCS: If the character under the cursor is normally blinking, but is temporarily
concealed, the TCS responds:
<ESC>[>4;22;24;5;27;8n
Color TCS: If the character under the cursor is displayed blinking, with red foreground and black
background and the conceal color is blue, the TCS responds:
<ESC>[>4;22;24;5;27;28;31;40;74n
The conceal color is always reported even if the character under the cursor is not
currently concealed.

7DEOH&RORU$WWULEXWH'HILQLWLRQV  'HIDXOW

&2/25 3IJ! 3EJ! 3FF!


%ODFN   
5HG   
*UHHQ   
<HOORZ   
%OXH   
0DJHQWD   
&\DQ   
:KLWH   

5-97
&XUVRU7\SH&RPPDQG>)&7@ /RFDO5HPRWH
The Cursor Type command selects one of the following types of cursors:

• Non-Blinking, Reverse-Video Block


The cursor appears as a reverse-video, full character cell block and does not blink.

• Slow-Blinking, Reverse-Video Block


The cursor appears as a full character cell block and blinks every second with a 50% duty
cycle.

NOTE
A 50% duty cycle means that the cursor is "on" half of the time.

• Fast-Blinking Reverse-Video Block


The cursor appears as a full-character cell block and blinks every 0.5 seconds with a 50%
duty cycle.

• Non-Blinking Underline
The cursor appears as an underline and does not blink.

• Slow-Blinking Underline
The cursor appears as an underline and blinks every second with a 50% duty cycle.

• Fast-Blinking Underline
The cursor appears as an underline and blinks every 0.5 with a 50% duty cycle.

• Invisible
The cursor is not visible.

'()$8/7
Slow-blinking reverse-video block.

23(5$72586$*(
The user selects the cursor type by entering the Setup Screen and, using touchkeys or the
optional keyboard, setting the Cursor Type parameter to the desired cursor type.
When the Cursor Type is changed by the user through the Setup Screen, the cursor itself is
displayed as the parameter’s value in the Parameter List Area of the Setup Screen. The displayed
cursor type changes immediately when the cursor type is changed.

5-98
+26786$*(
<ESC>[<Ps>;...;<Ps>v
<Ps> is a selective parameter, designating a cursor type.
If <Ps> is 0 or omitted, the previous cursor type is made visible. If <Ps> is 1, the current
cursor type is made invisible.
If <Ps> is 2, the cursor is an underline.
If <Ps> is 3, the cursor is a reverse-video block.
If <Ps> is 4, the cursor is non-blinking.
If <Ps> is 5, the cursor is slow-blinking.
If <Ps> is 6, the cursor is fast-blinking.
NOTE
The parameter values can be combined to select multiple cursor attributes with a single control string (see
examples, below). Invalid selective parameters are ignored.

3266,%/((55256
If the host asks for two or more incompatible cursor characteristics in the same control string
(such as underline followed by reverse-video block), the last cursor characteristic (reverse-video
block) takes precedence.

(;$03/(6
<ESC>[3v
Selects the reverse-video block cursor. The cursor blinks at the same rate as the previous
cursor. The cursor is invisible if the previous cursor was invisible.
<ESC>[2;4;0v
Selects the underline cursor and makes it non-blinking and visible.
<ESC>[4;6v
Makes the cursor fast-blinking. The fast-blinking characteristic takes precedence over the
non-blinking characteristic because it is the last cursor characteristic in the control string.
(This example has no practical use, but shows how conflicting requests are resolved by the
TCS.)

5-99
6&5((1$33($5$1&(&200$1'6
The Screen Appearance commands affect the appearance of the entire screen. The Screen
Appearance commands are:

• Screen Background Mode command (Local/Remote)

• Display Activity command (Local/Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begins on a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in brace {} are ANSI-compatible, TCS-private
commands. in parentheses () are ANSI-compatible, DEC-private commands.

5-100
6FUHHQ%DFNJURXQG0RGH&RPPDQG '(&6&10  /RFDO5HPRWH
Monochrome TCS: The Screen Background Mode command sets or resets the Screen
Background Mode, which determines whether the background of the screen is dark or light.

• When the Screen Background Mode is set ("reverse"), the background of each character
(without reverse-video attributes) is lit and the foreground is unlit. This creates a lit
background with dark characters.

• When the Screen Background Mode is set ("reverse"), the background of each character
(without reverse-video attributes) is lit and the foreground is unlit. This creates a lit
background.
Color TCS: When the Screen Background Mode is reset, the foreground of each character
(without reverse-video attributes) is displayed in the currently selected foreground color and the
background in the currently selected background color.

• When the Screen Background Mode is set, the foreground of each character (without reverse-
video attributes) is displayed in the currently selected background color and the background
in the currently selected foreground color.

• Foreground and background colors are selected with the Set Character Attributes command.
The above descriptions assume that the reverse-video attribute is not in effect. For characters with
the reverse-video attribute in effect (selected with the Set Character Attributes command), setting
Screen Background Mode reverses the character cell foreground / background relationship.
Changes in the Screen Background Mode take affect immediately, whether the command is
issued locally from the Setup Screen (by the user) or remotely (by a control string from the host).

'()$8/7
Reset. (Normal video.)

23(5$72586$*(
The user selects the screen background by entering the Setup Screen and, using touchkeys or the
optional keyboard, setting the Background parameter to the one of the following values:

• "normal" (reset)

• "reverse" (set)

+26786$*(
<ESC>[?5l
Resets the background to "normal". (The terminator for the reset command is the letter "l",
ASCII 6C hex.)
<ESC>[?5h
Sets background to "reverse".

5-101
'LVSOD\$FWLYLW\&RPPDQG^)'$` /RFDO5HPRWH
The Display Activity command turns the display on or off, or programs an automatic timeout (the
screen is automatically turned off) following periods of inactivity.
CAUTION
Setting Display Activity off then saving the Setup Screen is a relatively common source of confusion for new TCS
operators. The Setup Screen is always available regardless of the setting of Display Activity, so in case a dark
screen makes the TCS appear inoperative, be sure to check the setting.

The automatic timeout is a feature that turns off the display during periods of inactivity longer
than 30 minutes, thereby extending the life of the phosphor on the display.

• When the display activity is set to "on", the display stays lit (even during extended periods of
inactivity).

• When the display activity is set to "off", the screen is turned off. Even though the display
appears blank, data continues to be processed normally by the TCS just as if the display were
turned on. The display remains off, even if there is user or host activity, until the display
activity is changed to "on" or "timeout", or the Setup Screen is entered.

NOTE
Regardless of the display activity setting, the screen always turns on when the Setup Screen is entered.

• When the display activity is set to "timeout", the display turns off if 30 minutes elapse
without user or host activity. After the display has timed out, any activity by the user or host
causes the display to turn back on. For example, the screen turns back on if the user presses
the any key or touches the touch panel, or if the host sends a character or command.
After timeout has occurred, the first user activity sensed by the TCS (including activation of the
Setup Screen) turns on the screen and starts a new timeout cycle, but the TCS does not interpret
this activity as a command to be sent to the host. For example, if the user wants to transmit the
space character to the host after the display has timed out, he must press any key or touch the
display, then press the space bar. However, the first activity from the host after a timeout has
occurred causes the screen to turn on and is interpreted as a command. If the user activity occurs
on a portion of the TCS that is locked out, then the screen is not turned on after a timeout has
occurred. The touch panel, keyboard, or Setup Screen can be locked by Remote commands.

NOTE
If display activity is set to "off" and saved with a Save Setup, the next time power is applied to the TCS, the
TCS starts up with the screen off

'()$8/7
On.

5-102
23(5$72586$*(
The user sets the display activity by entering the Setup Screen and, using touchkeys or the
optional keyboard, setting the Display Activity parameter to one of the following values:

• on

• off

• timeout
The display activity setting does not take effect until the Setup Screen is exited.

+26786$*(
<ESC>[3;<Ps>z
<Ps> is a selective parameter, designating the Display Activity.
If <Ps> is 0 or omitted, Display Activity is set "on".
If <Ps> is 1, Display Activity is set "off".
If <Ps> is 2, Display Activity is set to "timeout".

(;$03/(6
<ESC>[3z
Turns the display on immediately.
<ESC>[3;1z
Turns the display off immediately.
<ESC>[3;2z
Enables automatic timeout of the display after 30 minutes of inactivity.

5-103
&+$37(5352*5$00,1*7+(728&+3$1(/
,1752'8&7,21
This chapter describes how to create touchkeys on the Touch Control Screen (TCS). Topics
include:

• The touch panel

• Touch reporting

• The commands used to create touchkeys and touch targets


For ease of reference, the commands are divided into two groups, consisting of functionally
related commands:

• Panel Commands

• Region Commands
Appendix A includes a sample touch panel program.

7+(728&+3$1(/
The transparent touch panel is the key feature of the TCS that allows the user to communicate
with the host simply by touching labeled, touch-sensitive blocks on the display.
The programmer creates each touch-sensitive block and defines its function in the host program.
The user then touches the block to make a menu selection, control a process, or direct the
operation of a program.

7RXFK&HOOV
The touch panel consists of a thin, transparent, flexible switch matrix affixed to the front of the
TCS display. The switch matrix contains 120 individual switches called touch cells. The touch
cells are activated (closed) at the touch of a fingertip (or other soft object).
The 120 touch cells are arranged in a grid 10 columns wide by 12 rows high. Each touch cell
covers an area 8 characters wide by 2 characters high and is identified by a unique number that
the TCS can report to the host when the touch cell is touched. Touch cell numbers allow the host
to respond appropriately to touch cell reports from the TCS. Figure 6-1 shows the touch cell
number assignments.

6-1
)LJXUH7RXFK&HOO1XPEHU$VVLJQPHQWV

7RXFKNH\VDQG7RXFK7DUJHWV
The host application program can incorporate touch cells into units called touchkeys. A touchkey
can consist of a single touch cell or a group of cells that function as if they were a single touch
cell.
To show the TCS operator exactly where on the screen a touchkey is located, and what function
it performs, touchkeys are usually defined in conjunction with visual targets called touch targets.
Touch targets are usually outlined and labeled. Touchkeys are usually defined to include as many
touch cells as necessary to cover the touch target.
The advantage of using touchkeys that consist of multiple touch cells is they allow for an
enlarged target. This eliminates the difficulty of trying to touch a single touch cell, and greatly
reduces the chance of parallax error.
Touchkeys that contain more than one touch cell are defined with the Build Touchkey command.
Their attributes and reporting reflect that of the upper left touch cell of the group, called the
master cell. When the user presses any touch cell within the touchkey, the TCS uses the
attributes of the master cell to determine what action to take.
Figure 6-2 shows a touch target for a touchkey composed of four touch cells.

6-2
)LJXUH([DPSOH7RXFKNH\
Depending on the number of touch cells that have been grouped together, the term touchkey can
refer to a single touch-sensitive area as large as the entire display or as small as a single touch
cell.

7RXFKNH\9LVXDO([WHQW
Many applications need to be able to easily change the visual contents of the character cells
within a touchkey. Depending on the application requirements, slightly different areas within a
touchkey need to be affected by changes. To help simplify the programming tasks associated
with this type of operation, the TCS features the following visual regions within a touchkey:

• Border: The border is the portion of the touchkey composed of only the character cells on the
perimeter of the physical boundaries of the touchkey. This area appears as an unfilled
rectangle, except in one case. A single-height touchkey is only one touch cell (two
characters) high. Therefore, the entire contents of a single-height touchkey are the border.

• Inner: The inner part of a touchkey is the entire area within the physical boundaries of the
touchkey except for the border. This area appears as a solid rectangle. Since a single-height
touchkey is only two characters high, the entire touchkey is the inner portion.

• All: The entire area within the physical boundaries of the touchkey, including both the
border and inner areas.
A touchkey that is two touch cells high and a single touch cell wide has visual regions as shown
in Figure 6-3.

6-3
)LJXUH7RXFKNH\9LVXDO([WHQW

6-4
728&+5(3257,1*
The touch panel is divided into 12 rows and 10 columns of individual touch cells, one or more of
which can form a single touchkey. (See Figure 6-1.) Each touchkey has a unique numeric value
determined by the master cell in its upper left corner, which the TCS reports to the host. The
TCS can send touch reports either spontaneously (whenever a touchkey is touched) or only when
the TCS is polled for a response (using the Polled Touch Mode).
Normally, the TCS spontaneously sends a touch report to the host whenever a touchkey is
touched. However, when the host is busy or has particularly slow input/output service, it may be
advantageous to operate the touch panel in the Polled Touch Mode. In the Polled Touch Mode,
the TCS sends the host a touch report only when the host requests (polls) the TCS to do so. This
lessens the burden on the host and minimizes the possibility of data overruns and lost characters.
The Polled Touch Mode is fully documented later in this chapter.
In either case, the TCS sends each touch report in the following format:
<ESC>[>2;<Pk>n
<Pk> is a three-digit, zero-filled ASCII numeric string (000 through 120, inclusive) that
represents the number of the touchkey.
For example, if the user activates touchkey number 81, the following report is sent to the host:
<ESC>[>2;081n

NOTE
The TCS supports several touch reporting controls and formats. The host can select the touch report
introducers or terminator by using the Reporting Format command described in Chapter 4. The host can
get more information about a touchkey by using the Extended Report Mode command, described later in
this chapter.

6-5
728&+3$1(/&200$1'6
The Touch Panel commands control the operation of the touch panel. The Touch Panel
commands are:

• Build Touchkey command (Remote)

• Clear Touchkey command (Remote)

• Touchkey Type command (Remote)

• Touchkey Visual Extent command (Remote)

• Touchkey Audible Attribute command (Remote)

• Auto-Repeat Rate command (Remote)

• Polled Touch Mode command (Remote)

• Read Touchkey Status command (Remote)

• Extended Report Mode command (Remote)

• Touch Panel Lockout Mode command (Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begins on a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in brace {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC-private commands.

6-6
%XLOG7RXFKNH\&RPPDQG^)%7.` 5HPRWH
The Build Touchkey command groups touch cells together into a single rectangular touchkey.
Building touchkeys provides an easy way to handle larger portions of the touch panel as single
touch-sensitive areas, and eliminates the programming overhead associated with translating and
handling individual touch cells.
The built touchkey takes on the attributes and reporting identification of the touch cell in its
upper left corner (the master cell). If any touch cell is touched within the touchkey, the entire
touchkey responds with the attributes programmed for the master cell (ignoring the individual
attributes of the touch cell pressed), including generating a touch report with the master cell’s
number.
Once a touchkey is built, the host refers to it solely by its master cell number. The touchkey acts
as a single unit until a Clear Touchkey command is issued. Any modification of the attributes of
touch cells (other than the master cell) within the touchkey has no effect on operation of the
touchkey. Only the master cell attributes affect operation of the touchkey.
After a Clear Touchkey command is issued, the touch cells that made it up revert to operating in
a manner consistent with their individual attributes as last programmed by the host. This
programming of individual touch cells could even have occurred while the touch cells were part
of the larger touchkey.
Any commands that can be applied to individual touch cells can also be applied to touchkeys. As
far as the host is concerned, there is no operational distinction made between touch cells and
touchkeys except for their potential size differences.
CAUTION
Issuing a Build Touchkey command with all parameters set to zero or with all parameters missing constitutes a Clear
Touchkey command, and will CLEAR ALL TOUCHKEYS. Refer to the Clear Touchkey command for details.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[5;<Pk>;<Ph>;<Pw>u
<Pk> is a numeric parameter that specifies the master cell within the touchkey to be built
(the upper left touch cell).
If <Pk> is omitted or 0, clears all touchkeys.
<Ph> is a numeric parameter that specifies the height of the touchkey in touch cell units.
If <Ph> is 0 or omitted, height is l.
If <Ph> is greater than 12, height is 12.
<Pw> is a numeric parameter that specifies the width of the touchkey in touch cell units.
If <Pw> is 0 or omitted, width is l.
If <Pw> is greater than 10, width is 10.

6-7
3266,%/((55256
If the host attempts to build a touchkey that overlaps an already existing touchkey, the previous
touchkey is cleared before the new one is built.
Omitting <Pw> and <Ph> or setting them both to 1 in this command constitutes a Clear
Touchkey command.
If this command changes a touchkey that is currently being pressed and a visual response is in
progress for the touchkey, the visual response is prematurely terminated.
If this command changes a touchkey that is currently being pressed and the touchkey is auto-
repeating, auto-repeating is terminated.
If this command changes a toggle touchkey that is toggled on, the touchkey is toggled off and the
visual state of the touchkey is set to off.

(;$03/(6
<ESC>[5;21;3u
Builds a touchkey 3 touch cells high by 1 touch cell wide at master cell 21.
<ESC>[5;6;10;4u
Builds a touchkey 10 touch cells high by 4 touch cells wide at master cell 6.
<ESC>[5;47u
Builds a l by l touchkey at master cell 47. This command effectively clears any larger
touchkey at master cell 47, since a 1 by 1 touchkey is the same as a single touch cell.
<ESC>[5u
Clears all touchkeys.

6-8
&OHDU7RXFKNH\&RPPDQG^)&7.` 5HPRWH
The Clear Touchkey command reverses the effect of a previous Build Touchkey command.
While touch cells are grouped as a larger touchkey, changing the attributes of the touchkey only
affects the attributes stored at the master cell. All other touch cells retain their unique attributes,
which are temporarily ignored while they are grouped as the touchkey. When the Clear Touchkey
command clears the touchkey, the individual touch cells resume operation as specified by their
individual attributes.
The Clear Touchkey command does not automatically undo any visual effect related to the
touchkey. For example, if a border was placed around a touchkey with the Outline a Touchkey
command, use the Erase a Touchkey command to remove the border before clearing the
touchkey.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[5;<Pk>u
<Pk> is a numeric parameter that specifies the touchkey to be cleared.
If <Pk> is 0 or omitted, all touchkeys are cleared.

3266,%/((55256
Touchkeys are cleared only if the Clear Touchkey command specifies the master cell. The TCS
ignores any request to clear other cells within the touchkey.
If this command changes a touchkey that is currently being pressed and a visual response is in
progress for the touchkey, the visual response is prematurely terminated.
If this command changes a touchkey that is currently being pressed and the touchkey is auto-
repeating, then auto-repeating is terminated.
If this command changes a toggle touchkey that is toggled on, the touchkey is toggled off and the
visual state of the touchkey is set to off.

(;$03/(6
<ESC>[5u
Clears all touchkeys.
<ESC>[5;0u
Clears all touchkeys.
<ESC>[5;47u
Clears touchkey with master cell 47.

6-9
7RXFKNH\7\SH&RPPDQG^)7.7` 5HPRWH
The Touchkey Type command specifies how the TCS controls a touchkey. Each type can take on
one of the following values:

• Dead: The touchkey does not generate a touch report when touched. A touchkey
programmed as dead acts as if there were no touch-sensitive area at its location.

• Press: The touchkey generates a single report whenever it is pressed.

• Press and Release: The host can detect touchkey presses and releases if extended reporting
mode is enabled. This allows an operation to remain enabled for the duration of the touchkey
press and disabled when the touchkey is released.

• Auto-Repeat: The touchkey generates a report when it is initially pressed. If continuously


pressed for more than 1/2 second and the auto-repeat rate is not disabled, reports are
generated at the auto-repeat rate set by the host until the touchkey is released. If the auto-
repeat rate is disabled, an auto-repeat touchkey acts like a press touchkey.

• Toggle: The touchkey generates a report whenever it is pressed. If Extended Report Mode is
set, the touch report indicates that the touchkey is either toggled on or off. The initial state of
the touchkey is off. After the first press, the touchkey is on. Each subsequent press alternates
the touchkey between off and on. See the Extended Report Mode command for details.
The touchkey type also determines how other attributes of a touchkey are handled when the
touchkey is activated. For example, the Touchkey Visual Extent command is affected by
touchkey type.

'()$8/7
All touchkeys are auto-repeat.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[4;<Pk>;<Pt>u
<Pk> is a numeric parameter that specifies the touchkey whose type is to be assigned.
If <Pk> is omitted or 0, all touchkeys are set to the specified type.
<Pt> is a selective parameter that specifies the type to be assigned to the touchkey.
If <Pt> is omitted or 0, the touchkey type is dead.
If <Pt> is 1, the touchkey type is press.
If <Pt> is 2, the touchkey type is auto-repeat.
If <Pt> is 3, the touchkey type is toggle.
If <Pt> is 4, the touchkey type is press and release.

6-10
3266,%/((55256
If the type of the touchkey that is currently being pressed is changed and a visual response is in
progress for the touchkey, the visual response is prematurely terminated.
If the type of the touchkey that is currently being pressed is changed and the key was auto-
repeating, auto-repeating is terminated.
If the Touchkey Type command causes an existing toggle touchkey to be changed to a new type
and the toggle touchkey was on, the toggle state and the visual representation of the toggle state
are both set to off.

(;$03/(6
<ESC>[4u
<ESC>[4;0;0;u
These are equivalent commands. When both parameters are set to zero or omitted, all
touchkeys are set to dead. Either command disables the touch panel.
<ESC>[4;0;3u
Sets all touchkeys to toggle.
<ESC>[4;45,1u
Sets Touchkey 45 to press.

6-11
7RXFKNH\9LVXDO([WHQW&RPPDQG^)7.9(-` 5HPRWH
The Touchkey Visual Extent command specifies the portion of a touchkey that automatically
responds visually when activated by the user. Each visual extent can take on one of the following
values:

• Border: The border is the portion of the touchkey composed only of the character cells on
the perimeter of the physical boundaries of the touchkey. This area appears as an unfilled
rectangle, except in the case of a single-height touchkey. A single-height touchkey is only
two characters high, so the entire touchkey contents are the border.

• Inner: The inner part of a touchkey is the entire area within the physical boundaries of the
touchkey except for the border. This area appears as a solid rectangle. Since a single-height
touchkey is only two characters high, the entire touchkey is the inner portion.

• All: The entire area within the physical boundaries of the touchkey, including both the
border and inner areas.

• None: None of the character cells within the physical boundaries of the touchkey responds
visually when activated.
The automatic visual response interacts with the touchkey types as follows:

• Dead: There is no automatic visual response, regardless of the visual extent value.

• Press: The area of the touchkey specified by the visual extent reverses its video and stays
reversed until the touchkey is released.

• Auto-repeat: The area of the touchkey specified by the visual extent reverses its video and
stays reversed until the touchkey is released.

• Toggle: The area of the touchkey specified by the visual extent reverses its video when the
touchkey is pressed and a touch report is sent to the host. The touchkey stays reversed until
the touchkey is pressed again and another touch report is sent to the host. Each time the
touchkey is pressed and a touch report is sent to the host, the touchkey alternates its visual
state. When the touchkey is in the off state, the area of the touchkey specified by the visual
extent appears as set by the host. When the touchkey is in the on state, the area of the
touchkey specified by the visual extent appears in reverse video from that set by the host.
The automatic visual response is intimately tied to the touch report sent to the host. If the TCS
output buffer is so full that a touch report cannot be sent to the host, automatic visual response
does not occur. An automatic visual response occurs only when a touch report fits in the output
buffer and will eventually be sent to the host. This guarantees the user is given immediate
feedback only when the host is guaranteed to be notified of the change in the state of the
touchkey.

'()$8/7
The visual extents of all touchkeys are set to none.

6-12
23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[3;<Pk>;<Pv>u
<Pk> is a numeric parameter that specifies the touchkey whose visual extent is to be
assigned.
If <Pk> is 0 or omitted, the visual extents of all touchkeys are set as specified in this
command.
<Pv> is a selective parameter that indicates the visual extent to be assigned to the touchkey.
If <Pv> is 0 or omitted, no characters in the touchkey respond visually.
If <Pv> is 1, only the inner characters respond visually.
If <Pv> is 2, only the border characters respond visually.
If <Pv> is 3, all characters in the touchkey respond visually.

3266,%/((55256
The host should not explicitly change any attributes of characters within press, auto-repeat, or
toggle touchkeys having automatic visual response by the TCS. If the host changes any of these
attributes, the automatic visual response is affected.
If the visual extent for a press or auto-repeat touchkey is changed after the touchkey is pressed,
but before it is released, the visual extent in effect when the touchkey was pressed is used when
the touchkey is released. Subsequent touchkey presses will use the new visual extent.
If the visual extent for a toggle touchkey is changed while the touchkey is on, the next press will
use the new visual extent, turning the toggle touchkey off. Unwanted visual effects can occur if
the visual extent for a toggle touchkey is changed while the touchkey is on.
Undesirable visual effects may result if this command is used for a touchkey that contains a
mixture of line types.

(;$03/(6
<ESC>[3u
Sets all touchkey’s visual extent to none.
<ESC>[3;0;2u
Sets all touchkey’s visual extent to border.
<ESC>[3;45;1u
Sets the visual extent of Touchkey 45 to inner.

6-13
7RXFKNH\$XGLEOH$WWULEXWH&RPPDQG^)7.$$` 5HPRWH
The Touchkey Audible Attribute command specifies whether the TCS beeps when a touchkey is
activated by the user. Each touchkey can be assigned one of two audible attributes:

• Silent: The TCS does not beep when the touchkey specified within this command is touched.

• Beep: The TCS automatically beeps in accordance with the touchkey type whenever the
touchkey is touched.
The automatic beep interacts with the touchkey types attributes as follows:

• Dead: No automatic beep is generated, regardless of audible attribute.

• Press: An automatic beep is generated whenever the touchkey is pressed and a touch report is
sent to the host.

• Auto-Repeat: An automatic beep is generated when the touchkey is initially pressed and a
touch report is sent to the host. If the touchkey is held beyond the initial delay and begins
auto-repeating, each time the touchkey auto-repeats and a report is sent to the host, an
automatic beep is generated.

• Toggle: An automatic beep is generated whenever the touchkey is pressed and a touch report
is sent to the host.

NOTE
If the Touchkey Audible Attribute is set to beep and if auto-repeating is enabled and an auto-repeat
touchkey is held beyond an initial delay, the TCS beeps at the auto-repeat rate until the touchkey is
released.
If the TCS is in the Polled Touch Mode and the Touchkey Audible Attribute is set to beep, the TCS beeps
immediately when a press, auto-repeat, or toggle touchkey is touched. However, the TCS does not beep if
the TCS has already queued a touch report that the host has not yet read.

'()$8/7
Beep.

23(5$72586$*(
None. (This is a remote command only.)

6-14
+26786$*(
<ESC>[1;<Ps>;<Pk>u
<Ps> is a selective parameter that specifies the audible attribute being assigned to the
touchkey.
If <Ps> is 0 or omitted, the audible attribute is silent.
If <Ps> is 1, the audible attribute is beep.
<Pk> is a numeric parameter that specifies the touchkey whose audible attribute is being
assigned.
If <Pk> is 0 or omitted, the audible attribute of all touchkeys is specified.

(;$03/(6
<ESC>[1u
Sets the audible attribute of all touchkeys to silent.
<ESC>[1;0;1u
Sets the audible attribute of Touchkey 1 to silent.
<ESC>[1;1;45u
Sets the audible attribute of Touchkey 45 to beep.

6-15
$XWR5HSHDW5DWH&RPPDQG^)$55` 5HPRWH
The Auto-Repeat Rate command allows the host to set the auto-repeat rate for touchkey
reporting.
The auto-repeat rate is the rate at which touch reports are sent (or made available) to the host
when a touchkey is pressed continuously. The auto-repeat rate can be any value from 0 (off)
through 25.5 seconds.
The effect of this command is determined by the setting of the Polled Touch Mode:

• If the Polled Touch Mode is reset and a touchkey is pressed continuously, the auto-repeat
rate is the rate at which the TCS spontaneously sends touch reports to the host.

• If the Polled Touch Mode is set and a touchkey is pressed continuously, the auto-repeat rate
is limited by the rate at which the host requests (polls) the TCS to send touch reports.
When a touchkey is first pressed, there is a 1/2-second delay before the auto-repeat rate takes
effect. The auto-repeat rate then stays in effect as long as the touchkey is pressed.

NOTE
If the user continues to press the touchkey after the Clear User Inputs command is received, a touch report
will be generated for the touchkey as if it had been pressed for the first time. See the description of the
Clear User Inputs command, in Chapter 4.

'()$8/7
0 (off)

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[2;<Pn>u
<Pn> is a numeric parameter (from 0 through 255)that specifies the delay (in tenths of
seconds) between automatic repetitions.
If <Pn> is 0 or omitted, auto-repeating is disabled.
If <Pn> is 1 through 255, the auto-repeat rate is set to <Pn> multiplied by 0.1 seconds
(0.1 through 25.5 seconds).

6-16
(;$03/(6
<ESC>[2;3u
The auto-repeat rate is set to 0.3 seconds.
<ESC> [2;100u
The auto-repeat rate is set to 10 seconds.
<ESC>[2u
Auto-repeating is disabled.

6-17
3ROOHG7RXFK0RGH&RPPDQG^)370` 5HPRWH
The Polled Touch Mode command selects the Polled Touch Mode, which causes the TCS to
report touchkey closures only when requested (polled) by the host.
The Polled Touch Mode prevents data overruns and lost characters when the TCS is used with a
host that has a slow I/O response. The Polled Touch Mode is also useful when it is undesirable
for the host to use interrupt processing.
The Polled Touch Mode is used in conjunction with the Read Touchkey Status command, which
the host sends to request a touch report. That command is described later in this chapter.

• When the Polled Touch Mode is reset, the TCS spontaneously sends a touch report to the
host whenever the user touches a touchkey.

• When the Polled Touch Mode is set, the TCS queues one and only one touch report when the
user touches a touchkey. The TCS sends the report to the host only when the host sends the
Read Touchkey Status command. If multiple touchkeys are touched before the host polls the
TCS for a report, the TCS queues a touch report only for the first touch; the TCS ignores all
other touches, which are in effect locked out.

NOTE
If the TCS receives a Read Touchkey Status command and the user has not touched a touchkey since the
previous Read Touchkey Status command was received, the TCS reports a touchkey number of 000.

If the Touchkey Audible Attribute is set for the touchkey, the TCS beeps immediately when the
touchkey is touched. However, if the TCS has already queued a touch report and is waiting to
send the report to the host, additional touches are ignored and do not cause any visual or audible
feedback.
An auto-repeat rate can be set when the TCS is operating in the Polled Touch Mode. However,
the rate of auto-repeating can be limited by the frequency of the host’s requests for reports. (See
the discussion under "Auto-Repeat Rate Command.") If the host requests touch reports rapidly
enough, the TCS responds at the same auto-repeat rate regardless of whether the Polled Touch
Mode is set or reset.
The TCS takes special action regarding touch activity when the host sends a Build Touchkey,
Clear Touchkey, Touchkey Type, or Copy Screen command that affects the Displayed Screen.
The host must take these actions into account if Polled Touch Mode is set and the host has not
caught up with touchkey input. For details, see the descriptions of each of these commands.

'()$8/7
Reset. (Polled Touch Mode is off.)

23(5$72586$*(
None. (This is a remote command only.)

6-18
+26786$*(
<ESC>[>1l
Resets Polled Touch Mode (to off). (The terminator for the reset command is the letter "l,"
ASCII 6C hex.)
<ESC>[>1h
Sets Polled Touch Mode (to on).

6-19
5HDG7RXFKNH\6WDWXV&RPPDQG^)57.6` 5HPRWH
The Read Touchkey Status command requests the TCS to send a touch report for the last
touchkey touched but not yet reported. This command is used when the TCS is operating in the
Polled Touch Mode (when the Polled Touch Mode is set to on). Specifically, the Read Touchkey
Status command allows the host to:

• Accept the next touch report when operating in Polled Touch Mode

• Read the current state of a toggle touchkey to see if it is on or off


When the TCS receives the Read Touchkey Status command, the TCS sends a report to the host.
If the Extended Report Mode is set, the touch report is sent in extended format and includes the
touchkey’s toggle state. See the Touchkey Type command for a description of the toggle
touchkey type.
If Extended Report Mode is reset, the TCS responds to this command in the following format:
<ESC>[>2;<Pk>n
If Extended Report Mode is set, the TCS responds to this command in the following format:
<ESC>[>2;<Pk>;<Ps>n
See the Extended Report Mode command description for details of the use of Extended Report
Mode.

NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.

The touchkey whose status is to be read, can be any of the following:

• Touchkey number 000


This requests that the touch report associated with the next touchkey be returned during
Polled Touch Mode operation. This is how the host polls the TCS for the next touchkey
activated.
The touch report in this situation may also return Touchkey 000, which indicates there are no
more touch reports waiting to be polled by the host.

• The touchkey number of a toggle touchkey


The host can read the status of any toggle touchkey and determine whether the touchkey is
on or off. The Extended Report Mode must be set for this additional information to be
included in the touch report.

• The touchkey number of a non-toggle touchkey


The status of any non-toggling touchkey is off. Reading the status of non-toggling touchkeys
serves no useful purpose. If the toggle state of a touch cell within a toggle touchkey is
requested, the touch report sent to the host reflects the toggle state of the master cell. This

6-20
means that no matter what touch cell is pressed within a toggle touchkey, the toggle state is
altered for the master cell. Only a single toggle state exists for any touchkey.

• The touchkey number of a press and release touch key


The host can read the status of any toggle touchkey and determine whether the touchkey is
currently pressed or released. The Extended Report Mode must be set for this additional
information to be included in the touch report.
When not operating in Polled Touch Mode, this command provides useful information only
when the Extended Report Mode is set and touchkey numbers that are toggle type are sent by
the host.

NOTE
When the Polled Touch Mode is set (on), the TCS queues one and only one touch cell report when the user
activates a touchkey. If multiple touchkeys are touched before the host polls the TCS for a report, the TCS
queues a touch report only for the first touch; the TCS ignores all other touches, which are in effect locked
out.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>2;<Pk>n
<Pk> is a numeric parameter that specifies the number of the touchkey whose status is to be
reported.
If <Pk> is 0 or omitted, send the next touch report when operating in Polled Touch
Mode.

3266,%/((55256
Requesting a status report from Touchkey 000 while not operating in Polled Touch Mode always
results in a response of Touchkey 000, indicating that there are no touch reports waiting to be
polled.
While Extended Report Mode is reset, requesting a status report for a non-zero touchkey results
in no useful information because the same touchkey number the host inquired about is returned
from the TCS without any toggle state information.

(;$03/(
<ESC>[>2n
Requests the TCS to send the next touch report when operating in Polled Touch Mode.
<ESC>[>2;103n
Requests the TCS to send the status of Touchkey 103. The status includes the touchkey
toggle state if the Extended Report Mode is set.

6-21
([WHQGHG5HSRUW0RGH&RPPDQG^)(50` 5HPRWH
The Extended Report Mode can be reset or set using the Reset Mode or Set Mode command.
When the Extended Report Mode is reset, touch reports contain only the touchkey number, with
no information about the current state of the touchkey.
When the Extended Report Mode is set, touch reports contain the number of the touchkey and
the touchkey’s current state (toggled on/off or pressed/releases). The purpose of this mode is to
support the use of the toggle or press and release touchkey type. See the Touchkey Type
command description for details about the toggle touchkey and the press and release touchkey. If
a touchkey is not a toggle or press and release type, the state reported when Extended Report
Mode is set is always off. The state information is appended to the normal touch report as
follows:
<ESC>[>2;<Pk>;<Ps>n
<Pk> is a three-digit, zero-filled ASCII numeric string (000 through 120) that represents the
number of the touchkey being reported.
<Ps> is the current state of the touchkey.
If <Ps> is 0, touchkey is currently toggled off (if touch type = 3).
If <Ps> is 1, touchkey is currently toggled on (if touch type = 3).
If <Ps> is 2, touchkey is currently pressed (if touch type = 4).
If <Ps> is 3, touchkey is currently released (if touch type = 4).
The touchkey state of a report for Touchkey 000 is always off.

NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.

'()$8/7
Reset. (Extended Report Mode is off; TCS returns the touchkey number only.)

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>61
Resets Extended Report Mode. (The terminator for the reset command is the letter "l," ASCII
6C hex.)
<ESC>[>6h
Sets Extended Report Mode.

6-22
(;$03/(6
A touch report that occurs when the Extended Report Mode is reset appears as follows:
<ESC>[>2;042n
The same touch report with the Extended Report Mode set might appear as:
<ESC>[>2;042;1n
This string indicates that Touchkey 42 is toggled on.

6-23
7RXFK3DQHO/RFNRXW0RGH&RPPDQG^)7/0` 5HPRWH
The Touch Panel Lockout Mode command controls the Touch Panel Lockout Mode, which
allows the host to lock out user input from the touch panel. This command does not affect the
optional keyboard.

• When the Touch Panel Lockout Mode is reset, input is allowed from the touch panel. (The
touch panel is unlocked.)

• When the Touch Panel Lockout Mode is set, input is not allowed from the touch panel. (The
touch panel is locked.)
If the TCS receives a Read Touchkey Status command when the Touch Panel Lockout Mode is
set, the TCS reports the touchkey number 000 to indicate no inputs have occurred. (The format of
this report is described under Read Touchkey Status Command, earlier in this chapter.)
If the user enters the Setup Screen (either by pressing the Set Up switch or the Set Up key) when
the Touch Panel Lockout Mode is set, the touch panel is temporarily unlocked. When the user
exits the Setup Screen or enters the Communication Monitor, the touch panel reverts to the
locked state.
If the user is pressing a touchkey while the Touch Lock-out Mode is in the process of being set,
and the touchkey has begun auto-repeating, the touchkey will stop auto-repeating.

'()$8/7
Reset (unlocked).

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>2l
Resets Touch Panel Lockout Mode (unlocks the touch panel). (The terminator for the reset
command is the letter "l," ASCII 6C hex.)
<ESC>[>2h
Sets Touch Panel Lockout Mode (locks the touch panel).

6-24
5(*,21&200$1'6
Region commands provide a simple way for the programmer to create visual touch targets on the
display. Region commands outline or erase a defined area on the screen, and modify the
attributes of characters and lines within a defined area.
The Region commands are:

• Outline a Touchkey command (Remote)

• Outline a Region command (Remote)

• Custom Outline a Touchkey command (Remote)

• Custom Outline a Region command (Remote)

• Modify Character Attributes in a Touchkey command (Remote)

• Modify Character Attributes in a Region command (Remote)

• Reverse Character Attributes in a Touchkey command (Remote)

• Reverse Character Attributes in a Region command (Remote)

• Fill a Touchkey with Character command (Remote)

• Fill a Region with Character command (Remote)

• Erase a Touchkey command (Remote)

• Erase a Region command (Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begins on a new page.

&RORU)HDWXUHV
For the color TCS, the following additional features affect the Region commands:
• Commands that cause characters to be displayed normally use the current foreground,
background, and conceal color attributes. However, there are several controls that can affect
how and when these attributes are used. Refer to Set Character Attributes Command in
Chapter 5 for details.

• Commands that cause characters to be erased use a space character in the current background
color and turn off the highlight, underline, blink, reverse-video, and concealed attributes for
each erased character.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC- private commands.

6-25
2XWOLQHD7RXFKNH\&RPPDQG^)27.` 5HPRWH
The Outline a Touchkey command creates the visual border for a touchkey. The position of the
cursor is not changed when this command is executed.
The area of the display affected by this command is restricted to the scrolling region if the Origin
Mode is set.
The attribute of the border are determined by the attribute already defined by the last Set
Character Attributes command (unless the NOCHANGE Attribute Mode is set). For example, if
the Set Character Attributes command has turned on the conceal attribute, the border is invisible.
The border of a touchkey consists of those character positions within the touchkey adjacent to
the touchkey’s edges.
Four border types are available. Each border is drawn using a different Boxtype character. A
border using each Boxtype character is shown below:

For the Outline a Touchkey command to produce correct and predictable results, the touchkey’s
line type must be determined. Line type is determined according to the following rules:

• If the touchkey contains any double-size lines, the entire touchkey is assumed to be
composed of double-size lines.

• If the touchkey contains any double-width lines, the entire touchkey is assumed to be
composed of double-width lines.

• If the touchkey does not contain any double-width or double-size lines, the touchkey is
assumed to be composed of all normal lines.

NOTE
Undesirable results may be produced if the Outline a Touchkey command is executed on a touchkey that
contains mixed line types.

If the touchkey specified in this command designates a touch cell within a touchkey (but not the
master cell), an outline is drawn around that touch cell rather than the entire touchkey.

6-26
This command assumes that the Static Special Character Font will be mapped into the Extended
Character Set when the screen is displayed. Otherwise, the box characters used to draw the
outline may appear different than described above. The boxtypes used by this command can be
customized by using the Down-Line Load and Map Character Font commands to change the
contents of the Extended Character Set, as described in Chapter 5.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[6;<Pk>;<Ps>u
<Pk> is a numeric parameter that specifies the touchkey to be outlined.
If <Pk> is 0 or omitted, the specified border is placed around the entire screen.
<Ps> is a selective parameter that specifies the type to be used.
If <Ps> is 0 or omitted, Boxtype 1 is used.
If <Ps> is 1, Boxtype 1 is used.
If <Ps> is 2, Boxtype 2 is used.
If <Ps> is 3, Boxtype 3 is used.
If <Ps> is 4, Boxtype 4 is used.

3266,%/((55256
Undesirable results may be produced if the Outline a Touchkey command is executed on a
touchkey that contains mixed line types.

(;$03/(6
<ESC>[6u
Draws a border around the entire screen using Boxtype 1.
<ESC>[6;53;2u
Draws a border around Touchkey 53 using Boxtype 2.

6-27
2XWOLQHD5HJLRQ&RPPDQG^)25` 5HPRWH
The Outline a Region command places a border around an area of the screen defined relative to
the cursor, thereby drawing a touch target. This is convenient when a visual target does not
correspond exactly with the physical boundaries of a touchkey. The position of the cursor is not
changed when this command is executed.
The region of the display affected by this command is restricted to the scrolling region if the
Origin Mode is set.
The attribute of the border are determined by the attribute already defined by the last Set
Character Attributes command (unless the NOCHANGE Attribute Mode is set). For example, if
the Set Character Attributes command has turned on the conceal attribute, the border is invisible.
The border of a region consists of those character positions within the region adjacent to the
region’s edges. The upper-left corner of the border is located at the current position of the cursor.
Four border types are available. Each border is drawn using a different Boxtype character. For a
description of the Boxtype characters. See the Outline a Touchkey command.
For the Outline a Region command to produce correct and predictable results, the region’s line
type must be determined. Line type is determined according to the following rules:

• If the region contains any double-size lines, the entire region is assumed to be composed of
double-size lines.

• If the region contains any double-width lines, the entire region is assumed to be composed of
double-width lines.

• If the region does not contain any double-width or double-size lines, the region is assumed to
be composed of all normal lines.

NOTE
Undesirable results may be produced if the Outline a Region command is executed on a region that
contains mixed line types.

This command assumes that the Static Special Character Font will be mapped into the Extended
Character Set when the screen is displayed. Otherwise, the box characters used to draw the
outline may appear different than described above. The boxtype used by this command can be
customized by using the Down-Line Load and Map Character Font commands to change the
contents of the Extended Character Set, as described in Chapter 5.

23(5$72586$*(
None. (This is a remote command only.)

6-28
+26786$*(
<ESC>[6;<P1>;<Pc>;<Pb>t
<P1> is a numeric parameter from 0 through 24, which designates the height of the region in
lines.
If <P1> is 0, omitted, or greater than 24, a region with a height of 24 lines is defined.
<Pc> is a numeric parameter from 0 through 80, which designates the width of the region in
columns.
If <Pc> is 0, omitted, or greater than 80, a region 80 columns wide is defined.
<Pb> is a selective parameter that designates the type of border to place around the defined
region.
If <Pb> is 0 or omitted, Boxtype 1 is used.
If <Pb> is 1, Boxtype 1 is used.
If <Pb> is 2, Boxtype 2 is used.
If <Pb> is 3, Boxtype 3 is used.
If <Pb> is 4, Boxtype 4 is used.

3266,%/((55256
Undesirable results may be produced if the Outline a Region command is executed over a region
that contains mixed line types.
If the region specified runs off the edge or bottom of the screen, the edge of the region is
assumed to be along the screen edges. When Origin Mode is set, the edges of the scrolling region
are handled as if they were the edges of the screen.

(;$03/(6
<ESC>[6t
If Origin Mode is reset and the cursor is at the home position (row 1, column 1), a border
using Boxtype1 border is drawn around the entire screen.
<ESC>[6;10;5;3t
A border using Boxtype 3 is drawn around a rectangular region 10 lines high by 5 columns
wide. The location of the cursor marks the upper-left corner of the rectangle.
<ESC>[6;6;10t
Places a border using Boxtype 1 around a rectangular region 6 lines high by 10 columns
wide. The location of the cursor marks the upper-left corner of the area.

6-29
&XVWRP2XWOLQHD7RXFKNH\&RPPDQG^)&27.` 5HPRWH
The Custom Outline a Touchkey command places a customized border around a touchkey. The
command must include a starting character value in the character set to specify where to get the
border to be used for outlining.
The area of the display affected by this command is restricted to the scrolling region if the Origin
Mode is set.
The attribute of the border are determined by the attribute already defined by the last Set
Character Attributes command (unless the NOCHANGE Attribute Mode is set). For example, if
the Set Character Attributes command has turned on the conceal attribute, the border is invisible.
The border of a touchkey consists of those character positions within the touchkey that are
adjacent to the touchkey’s edges.
The border is drawn using the eight characters from the specified starting character value as
follows:
&+$5$&7(59$/8( %25'(53257,21
6WDUWLQJ&KDUDFWHU9DOXH XSSHUOHIWFRUQHU
6WDUWLQJ&KDUDFWHU9DOXH XSSHUVLGH
6WDUWLQJ&KDUDFWHU9DOXH XSSHUULJKWFRUQHU
6WDUWLQJ&KDUDFWHU9DOXH ULJKWVLGH
6WDUWLQJ&KDUDFWHU9DOXH ORZHUULJKWFRUQHU
6WDUWLQJ&KDUDFWHU9DOXH ORZHUVLGH
6WDUWLQJ&KDUDFWHU9DOXH ORZHUOHIWFRUQHU
6WDUWLQJ&KDUDFWHU9DOXH OHIWVLGH

The special characters used to create customized borders can be loaded into the Standard or
Extended Character Set by using the Down-Line Load Character Font command and the Map
Character Font command, as described in Chapter 5.
For the Custom Outline a Touchkey command to produce correct and predictable results, the
touchkey’s line type must be determined. Line type is determined according to the following
rules:

• If the touchkey contains any double-size lines, the entire touchkey is assumed to be
composed of double-size lines.

• If the touchkey contains any double-width lines, the entire touchkey is assumed to be
composed of double-width lines.

• If the touchkey does not contain any double-width or double-size lines, the touchkey is
assumed to be composed of all normal lines.

6-30
NOTE
Undesirable results may be produced if the Custom Outline a Touchkey command is executed on a
touchkey that contains mixed line types.

If the touchkey specified in this command designates a touch cell within a touchkey (but not the
master cell), an outline is drawn around that touch cell rather than the entire touchkey.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[5;<Pk>;<Pch>x
<Pk> is a numeric parameter that specifies the touchkey to be outlined.
If<Pk> is 0 or omitted, the specified border is placed around the entire screen.
<Pch> is numeric parameter that specifies the decimal value of the first character within the
Standard or Extended Character Set to start using for the custom border.
If <Pch> is omitted, the default value 128 is used (the value of the first Boxtype 1
character when the Static Special Character Font is mapped into the Extended Character
Set).
If <Pch> is greater than 255, 255 is used.

3266,%/((55256
Undesirable results may be produced if this command is executed on a touchkey that contains a
mixture of line types.
If the starting character <Pch> is greater than 248, some of the outline characters will have
values greater than 255 (for example, 249 + 7 = 256). Any outline character values that would
exceed 255 use the value 255. If the starting character <Pch> is 255 or greater, all the outline
characters use the value 255.

(;$03/(6
<ESC>[5;;163x
Places a border around the entire screen using the eight characters from within the Extended
Character Set starting with character value 163.
<ESC>[5;153;8x
Places a border around Touchkey 153 using the eight characters from within the Standard
Character Set starting with character value 8.

6-31
&XVWRP2XWOLQHD5HJLRQ&RPPDQG^)&25` 5HPRWH
The Custom Outline a Region command allows a customized border to be placed around a
rectangular area of the screen. The command must include a starting character value that
specifies where to get the border to be used for outlining.
The region of the display affected by this command is restricted to the scrolling region if the
Origin Mode is set.
The attribute of the border are determined by the attribute already defined by the last Set
Character Attributes command (unless the NOCHANGE Attribute Mode is set). For example, if
the Set Character Attributes command has turned on the conceal attribute, the border is invisible.
The border of a region consists of those character positions within the region that are adjacent to
the region’s edges. The upper-left corner of the border is at the current position of the cursor.
The border is drawn using the eight characters from the specified starting character value as
follows:
&+$5$&7(59$/8( %25'(53257,21
6WDUWLQJ&KDUDFWHU9DOXH XSSHUOHIWFRUQHU
6WDUWLQJ&KDUDFWHU9DOXH XSSHUVLGH
6WDUWLQJ&KDUDFWHU9DOXH XSSHUULJKWFRUQHU
6WDUWLQJ&KDUDFWHU9DOXH ULJKWVLGH
6WDUWLQJ&KDUDFWHU9DOXH ORZHUULJKWFRUQHU
6WDUWLQJ&KDUDFWHU9DOXH ORZHUVLGH
6WDUWLQJ&KDUDFWHU9DOXH ORZHUOHIWFRUQHU
6WDUWLQJ&KDUDFWHU9DOXH OHIWVLGH

The special characters used to create customized borders can be loaded into the Standard or
Extended Character Set by using the Down-Line Load Character Font command and the Map
Character Font command, as described in Chapter 5.
For the Custom Outline a Region command to produce correct and predictable results, the
region’s line type must be determined. Line type is determined according to the following rules:

• If the region contains any double-size lines, the entire region is assumed to be composed of
double-size lines.

• If the region contains any double-width lines, the entire region is assumed to be composed of
double-width lines.

• If the region does not contain any double-width or double-size lines, the region is assumed to
be composed of all normal lines.

NOTE
Undesirable results may be produced if the Modify Character Attributes in a Region or the Customer
Outline in a Region commands are executed on a region that contains mixed line types.

6-32
23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[4;<P1>;<Pc>;<Pch>x
<P1> is a numeric parameter from 0 through 24 that designates the height of the region
in lines.
If <P1> is 0, omitted, or greater than 24, a region with a height of 24 lines is defined.
<Pc> is a numeric parameter from 0 through 80 that designates the width of the region in
columns.
If <Pc> is 0, omitted, or greater than 80, a region 80 columns wide is defined.
<Pch> is a numeric parameter that specifies the decimal value of the first character within
the Standard or Extended Character Set to start using for the custom border.
If <Pch> is omitted, the default value 128 is used (the value of the first Boxtype 1
character when the Static Special Character Font is mapped into the Extended Character
Set).
If <Pch> is greater than 255, 255 is used.

3266,%/((55256
Undesirable results may be produced if the Custom Outline a Region command is executed on a
region that contains mixed line types.
If the region specified runs off the edge or bottom of the screen, the edge of the region is
assumed to be along the screen edges. When Origin Mode is set, the edges of the scrolling region
are handled as if they were the edges of the screen.
If the starting character <Pch> is greater than 248, some of the outline characters will have
values greater than 255 (for example, 249 + 7 = 256). Any outline character values that would
have exceeded 255 use the value 255. If the starting character <Pch> is 255 or greater, all the
outline characters use the value 255.

(;$03/(6
<ESC>[4;;;163x
If the cursor is at the home position with Origin Mode reset, this string places a border around
the entire screen using the eight characters from within the Extended Character Set starting with
character value 163.
<ESC>[4;10;5;0x
Places a border using the eight characters from within the Standard Character Set starting with
character value 0 within a 10 line high by 5 column wide region.

6-33
0RGLI\&KDUDFWHU$WWULEXWHVLQD7RXFKNH\&RPPDQG^)0&$,7.` 5HPRWH
The Modify Character Attributes in a Touchkey command causes the character attributes within
a touchkey to be modified on a touchkey basis, rather than character-by-character.
This command assigns to the designated touchkey the character attributes currently in effect (as
last assigned by the Set Character Attributes command). Because the Modify Character
Attributes in a Touchkey command directly causes attributes to be modified, the NOCHANGE
Attribute Mode has no effect on this command.

NOTE
If the Set Character Attributes command has selected the conceal attribute, characters within the touchkey
disappear. The characters can be made visible again by sending the Reverse Character Attributes in a
Touchkey command to reverse (turn off) the conceal attribute.
For the color TCS to properly conceal characters, the conceal color attribute must be set to the same color
as the screen background.

The area of the display affected by this command is restricted to lie within the scrolling region
when Origin Mode is set.
Within a touchkey, the host can restrict the effect of this command to one of the areas previously
defined in this chapter under Touchkey Visual Extent.
For the Modify Character Attributes in a Touchkey command to produce correct and predictable
results, the touchkey’s line type must be determined. Line type is determined according to the
following rules:

• If the touchkey contains any double-size lines, the entire touchkey is assumed to be
composed of double-size lines.

• If the touchkey contains any double-width lines, the entire touchkey is assumed to be
composed of double-width lines.

• If the touchkey does not contain any double-width or double-size lines, the touchkey is
assumed to be composed of all normal lines.

NOTE
Undesirable results may be produced if the Modify Character Attributes in a Touchkey command is
executed on a touchkey that contains mixed line types.

If the touchkey specified in this command designates a touch cell within a touchkey (but not the
master cell), the attributes are modified within that touch cell rather than the entire touchkey.

23(5$72586$*(
None. (This is a remote command only.)

6-34
+26786$*(
<ESC>[7;<Pk>;<Pv>u
<Pk> is a numeric parameter that specifies the touchkey whose character attributes are to be
modified.
If <Pk> is 0 or omitted, the entire screen is modified.
<Pv> is a selective parameter that designates the visual extent of the touchkey to be affected
by the command.
If <Pv> is 0 or omitted, the attributes of all characters in the touchkey are modified.
If <Pv> is 1, the attributes of only inner characters are modified.
If <Pv> is 2, the attributes of only border characters are modified.
If <Pv> is 3, the attributes of all characters in the touchkey are modified.

3266,%/((55256
Undesirable results may be produced if the Modify Character Attributes in a Touchkey command
is executed on a touchkey that contains mixed line types.

(;$03/(6
<ESC>[7;;3u
Modifies the entire portion of every touchkey, using the current character attributes.
<ESC>[7;5;2u
Modifies the border of Touchkey 5, using the current character attributes.

6-35
0RGLI\&KDUDFWHU$WWULEXWHVLQD5HJLRQ&RPPDQG^)0&$,5` 5HPRWH
The Modify Character Attributes in a Region command causes the character attributes within a
defined region to be modified on a regional basis, rather than character-by-character.
This command assigns to the designated region the attributes currently in effect (as last assigned
by the Set Character Attributes command). Because the Modify Character Attributes in a Region
command directly causes attributes to be modified, the NOCHANGE Attribute Mode has no
effect on this command.

NOTE
If the Set Character Attributes command has selected the conceal attribute, characters within the region
disappear. The characters can be made visible again by sending the Reverse Character Attributes in a
Region command to reverse (turn off) the conceal attribute.
For the color TCS to properly conceal characters, the conceal color attribute must be set to the same color
as the screen background.

The region to be acted upon by this command is defined relative to the cursor position, which
becomes the upper-left corner of the region. The number of lines (height) and number of columns
(width) making up the region are specified by numeric parameters.
The region of the display affected by this command is restricted to the scrolling region if the
Origin Mode is set.
Within a defined region, the host can restrict the effect of this command to one of the following
areas:

• Inner characters
Only those characters within a region that are not adjacent to an edge (border) of the region
are affected.

• Border characters
Only those characters within a region that are adjacent to an edge (border) of the region are
affected.

• All characters
All the characters (inner and border) in the region are affected.
For the Modify Character Attributes in a Region command to produce correct and predictable
results, the region’s line type must be determined. Line type is determined according to the
following rules:

• If the region contains any double-size lines, the entire region is assumed to be composed of
double-size lines.

• If the region contains any double-width lines, the entire region is assumed to be composed of
double-width lines.

6-36
• If the region does not contain any double-width or double-size lines, the region is assumed to
be composed of all normal lines.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[7;<P1>;<Pc>;<Pv>t
<P1> is a numeric parameter from 0 through 24 that designates the height of the region in
lines.
If <Pl> is 0, omitted, or greater than 24, a region with a height of 24 lines is defined.
<Pc> is a numeric parameter from 0 through 80, that designates the width of the region in
columns.
If <Pc> is 0, omitted, or greater than 80, a region 80 columns wide is defined.
<Pv> is a selective parameter, designating which portion of the region is affected by the
command.
If <Pv> is 0 or omitted, the attributes of all characters in the region are modified.
If <Pv> is 1, the attributes of only inner characters are modified.
If <Pv> is 2, the attributes of only border characters are modified.
If <Pv> is 3, the attributes of all characters in the region are modified.

3266,%/((55256
Undesirable results may be produced if the Modify Character Attributes in a Region command is
executed on a region that contains mixed line types.
If the region specified runs off the edge or bottom of the screen, the edge of the region is
assumed to be along the screen edges. When Origin Mode is set, the edges of the scrolling region
are handled as if they were the edges of the screen.

(;$03/(6
<ESC>[7t
Modifies the entire screen (if Origin Mode is reset and the cursor is in the home position).
<ESC>[7;12;51;2t
Modifies the border attributes of a region 12 lines high by 51 columns wide relative to the
cursor (which marks the upper left corner of the border).

6-37
5HYHUVH&KDUDFWHU$WWULEXWHVLQD7RXFKNH\&RPPDQG^)5&$,7.` 5HPRWH
The Reverse Character Attributes in a Touchkey command allows the host to quickly change the
character attributes within a touchkey.
The attributes to be changed with this command are specified within the command. One or more
attributes can be changed at a time. All the attributes specified in this command are reversed
from their current setting for each of the characters within the touchkey. The characters
appearing within the touchkey are not changed; only their displayed attributes are updated. The
character attributes in use as last set by the Set Character Attributes Command are never changed
by this command.
This command relieves the host of having to keep track of the current attributes within a
touchkey. For example, if the host detects a touchkey being pressed and wants to highlight the
characters within the touchkey, this command can be used. Every time the host detects the
touchkey being pressed, it can send this command to reverse the touchkey’s attributes. In this
case, the host does not have to remember whether the touchkey had a particular attribute on or
off; it just knows that it wants to reverse the attribute from its previous state.
Because the Reverse Character Attributes in a Touchkey command directly causes attributes to
be modified, the NOCHANGE Attribute Mode has no effect on this command.
The area of the display affected by this command is restricted to lie within the scrolling region
when Origin Mode is set.
Within a touchkey, the host can restrict the effect of this command to one of the areas previously
defined in this chapter under Touchkey Visual Extent.
For the Reverse Character Attributes in a Touchkey command to produce correct and predictable
results, the touchkey’s line type must be determined. Line type is determined according to the
following rules:

• If the touchkey contains any double-size lines, the entire touchkey is assumed to be
composed of double-size lines.

• If the touchkey contains any double-width lines, the entire touchkey is assumed to be
composed of double-width lines.

• If the touchkey does not contain any double-width or double-size lines, the touchkey is
assumed to be composed of all normal lines.

NOTE
Undesirable results may be produced if the Reverse Character Attributes in a Touchkey command is
executed on a touchkey that contains mixed line types.

If the touchkey specified in this command designates a touch cell within a touchkey (but not the
master cell), then the attributes are reversed within that touch cell rather than the entire touchkey.

23(5$72586$*(
None. (This is a remote command only.)

6-38
+26786$*(
<ESC>[9;<Pk>;<Pv>;<Pa>;...;<Pa>u
<Pk> is a numeric parameter that specifies the touchkey whose character attributes are to be
reversed.
If <Pk> is 0 or omitted, the character attributes of the entire screen are reversed.
Pv> is a selective parameter that specifies the visual extent of the touchkey to be reversed.
If <Pv> is 0 or omitted, the attributes of all characters within the touchkey are reversed.
If <Pv> is 1, the attributes of only inner characters within the touchkey are reversed.
If <Pv> is 2, the attributes of only border characters within the touchkey are reversed.
If <Pv> is 3, the attributes of all characters within the touchkey are reversed.
<Pa> is a selective parameter that specifies the attribute to reverse.
If <Pa> is 0 or omitted, the reverse video attribute is reversed.
If <Pa> is 1, the highlight attribute is reversed.
If <Pa> is 4, the underline attribute is reversed.
If <Pa> is 5, the blink attribute is reversed.
If <Pa> is 7, the reverse video attribute is reversed.
If <Pa> is 8, the conceal attribute is reversed.

3266,%/((55256
Undesirable results may occur if this command is invoked on a touchkey that contains a mixture
of line types.

(;$03/(6
<ESC>[9;;;5u
Reverses the blink attribute for all characters in the entire screen.
<ESC>[9;5;2;4;1u
Reverses the highlight and underline attributes in the border of Touchkey 5.
<ESC>[9;90;1;8u
Reverses the conceal attribute in the inner part of Touchkey 90. If the characters in the inner
part of Touchkey 90 were not visible (concealed) before this command was sent, the
characters will become visible (unconcealed). If the characters were visible (unconcealed)
before this command, they will become invisible (concealed).

6-39
5HYHUVH&KDUDFWHU$WWULEXWHVLQD5HJLRQ&RPPDQG^)5&$O5` 5HPRWH
The Reverse Character Attributes in a Region Command allows the host to quickly reverse
character attributes within a region.
The attributes to be changed with this command are specified within the command. One or more
attributes can be changed at a time. All the attributes specified in this command are reversed
from their current setting for each character within the region. The characters appearing within
the region are not changed; only their displayed attributes are updated. The character attributes in
use as last set by the Set Character Attributes Command are never changed by this command.
This command relieves the host of having to keep track of the current attributes within a region.
For example, if the host wants to display a message within a region and, depending on
conditions, may want the message to be highlighted or not highlighted, this command can be
used. Every time the host wants to switch the attributes of the message, it only needs to send this
command. The host never has to remember whether the message was last highlighted or not; it
just knows that it wants to reverse the highlight attribute from its previous state.
Because the Reverse Character Attributes in a Region command directly causes attributes to be
modified, the NOCHANGE Attribute Mode has no effect on this command.
The region to be acted upon by this command is defined relative to the cursor position, which
becomes the upper-left corner of the region. The number of lines (height) and number of columns
(width) making up the region are specified by numeric parameters.
The region of the display affected by this command is restricted to the scrolling region if the
Origin Mode is set.
Within a defined region, the host can restrict the effect of this command to one of the following
areas:

• Inner characters
Only those characters within a region not adjacent to an edge (border) of the region are
affected.

• Border characters
Only those characters within a region adjacent to an edge (border) of the region are affected.

• All characters
All the characters (inner and border) in the region are affected.
For the Reverse Character Attributes in a Region command to produce correct and predictable
results, the region’s line type must be determined as follows:

• If the region contains any double-size lines, the entire region is assumed to be composed of
double-size lines.

• If the region contains any double-width lines, the entire region is assumed to be composed of
double-width lines.

6-40
• If the region does not contain any double-width or double-size lines, the region is assumed to
be composed of all normal lines.

NOTE
Undesirable results may be produced if the Reverse Character Attributes in a Region command is executed
on a region that contains mixed line types.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[9;<P1>;<Pc>;<Pv>;<Pa>;...;<Pa>t
<P1> is a numeric parameter from 0 through 24, which designates the height of the region in
lines.
If <P1> is 0, omitted, or greater than 24, a region with a height of 24 lines is defined.
<Pc> is a numeric parameter from 0 through 80, which designates the width of the region in
columns.
If <Pc> is 0, omitted, or greater than 80, a region 80 columns wide is defined.
<Pv> is a selective parameter that specifies the visual extent of the region to be reversed.
If <Pv> is 0 or omitted, the attributes of all characters within the region are reversed.
If <Pv> is I, the attributes of only inner characters within the region are reversed.
If <Pv> is 2, the attributes of only border characters within the region are reversed.
If <Pv> is 3, the attributes of all characters within the region are reversed.
<Pa> is a selective parameter that specifies the attribute to be reversed.
If <Pa> is 0 or omitted, the reverse video attribute is reversed.
If <Pa> is 1, the highlight attribute is reversed.
If <Pa> is 4, the underline attribute is reversed.
If <Pa> is 5, the blink attribute is reversed.
If <Pa> is 7, the reverse video attribute is reversed.
If <Pa> is 8, the conceal attribute is reversed.

3266,%/((55256
If the region specified runs off the edge or bottom of the screen, the edge of the region is
assumed to be along the screen edges. When Origin Mode is set, the edges of the scrolling region
are handled as if they were the edges of the screen.
Undesirable results may be produced if the Reverse Character Attributes in a Region command is
executed on a region that contains mixed line types.

6-41
(;$03/(6
<ESC>[9;;;;5t
Reverses the blink attribute for the entire screen.
<ESC> [9;12;51;2;4;1t
Reverses the highlight and underline attributes in the border of a 12 line by 51 column region
with upper left corner at the cursor.
<ESC>[9;1;50;1;8t
Reverses the conceal attribute in the inner part of a 1 line by 50 column region. If the
characters in the inner part of the region were not visible (concealed) before this command
was sent, the characters will become visible (unconcealed). If the characters were visible
(unconcealed) before this command, they will become invisible (concealed).

6-42
)LOOD7RXFKNH\:LWKD&KDUDFWHU&RPPDQG^))7.&` 5HPRWH
The Fill a Touchkey With a Character command allows the host to easily fill a touchkey with a
character. The character specified in this command will be repeatedly displayed in each character
position throughout the visual extent of the touchkey that the host specifies. This command
allows a touchkey to be filled with any one of the 256 characters from the Standard and Extended
Character Sets.
The area of the display affected by this command is restricted to lie within the scrolling region
when Origin Mode is set.
Within a touchkey, the host can restrict the effect of this command to one of the areas previously
defined in this chapter under Touchkey Visual Extent.
For the Fill a Touchkey With a Character command to produce correct and predictable results,
the touchkey’s line type must be determined. Line type is determined according to the following
rules:

• If the touchkey contains any double-size lines, the entire touchkey is assumed to be
composed of double-size lines.

• If the touchkey contains any double-width lines, the entire touchkey is assumed to be
composed of double-width lines.

• If the touchkey does not contain any double-width or double-size lines, the touchkey is
assumed to be composed of all normal lines.

NOTE
Undesirable results may be produced if the Fill a Touchkey With a Character command is executed on a
touchkey that contains mixed line types.

If the touchkey specified in this command designates a touch cell within a touchkey (but not the
master cell), then the characters are filled within that touch cell rather than the entire touchkey.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[3;<Pk>;<Pv>;<Pch>x
<Pk> is a numeric parameter that specifies which touchkey is to be filled.
If <Pk> is 0 or omitted, the entire screen is filled using the visual extent specified.
<Pv> is a selective parameter that specifies the visual extent of the touchkey to be filled.
If <Pv> is 0 or omitted, all of the touchkey is filled.
If <Pv> is 1, the only inner portion of the touchkey is filled.
If <Pv> is 2, the only border of the touchkey is filled.
If <Pv> is 3, all the touchkey is filled.

6-43
<Pch> is a numeric parameter that specifies the decimal value of the character to be used for
filling the area specified.
If <Pch> is omitted, the default value 251 from within the Extended Character Set is
used (the gray block character when the Static Special Character Font is mapped into the
Extended Character Set).
If <Pch > is greater than 255, 255 is used.

3266,%/((55256
Undesirable results may be produced if the Fill a Touchkey With a Character command is
executed on a touchkey that contains mixed line types.

(;$03/(
<ESC>[3x
Fills the entire screen with the gray block character (value 251 when the Static Special
Character Font is mapped into the Extended Character Set).
<ESC>[3;53;2;42x
Puts the asterisk (*) character (value 42 when the Static ASCII Character Font is mapped
into the Standard Character Set) in every character position of the border of Touchkey 53.

NOTE
These examples assume that the Static ASCII Character Font and the Static Special Character Font are
mapped into the Standard and Extended Character Sets, respectively. If this is not the case, the character
that fills the region may differ from the above examples (it may be a custom character).

6-44
)LOOD5HJLRQ:LWKD&KDUDFWHU&RPPDQG^))5&` 5HPRWH
The Fill a Region With a Character command allows the host to easily fill a rectangular area with
a specified character. The upper left corner of the region is defined by the current cursor
position. The character specified in this command is repeatedly displayed in each character
position throughout the visual extent of the region that the host specifies. This command allows a
fill with any of the 256 characters from the Standard and Extended Character Sets.
The area of the display affected by this command is restricted to lie within the scrolling region
when Origin Mode is set.
Within a defined region, the host can restrict the effect of this command to one of the following
areas:

• Inner characters
Only those characters within a region not adjacent to an edge (border) of the region are
affected.

• Border characters
Only those characters within a region adjacent to an edge (border) of the region are affected.

• All characters
All the characters (inner and border) in the region are affected.
For the Fill a Region With a Character command to produce correct and predictable results, the
region’s line type must be determined as follows:

• If the region contains any double-size lines, the entire region is assumed to be composed of
double-size lines.

• If the region contains any double-width lines, the entire region is assumed to be composed of
double-width lines.

• If the region does not contain any double-width or double-size lines, the region is assumed to
be composed of all normal lines.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[2;<P1>;<Pc>;<Pv>;<Pch>x
<P1> is a numeric parameter from 0 through 24, which designates the height of the region in
lines.
If <Pl> is 0, omitted, or greater than 24, a region with a height of 24 lines is defined.
<Pc> is a numeric parameter from 0 through 80, which designates the width of the region in
columns.

6-45
If <Pc> is 0, omitted, or greater than 80, a region 80 columns wide is defined.
<Pv> is a selective parameter that specifies the visual extent of the region to be filled.
If <Pv> is 0 or omitted, all of the region is filled.
If <Pv> is 1, only the inner portion of the region is filled.
If <Pv> is 2, only the border of the region is filled.
If <Pv> is 3, all of the region is filled.
<Pch> is a numeric parameter that specifies the decimal value of the character to be used for
filling the area specified.
If <Pch> is omitted, the default value 251 from within the Extended Character Set is
used (the gray block character when the Static Special Character Font is mapped into the
Extended Character Set).
If <Pch> is greater than 255, 255 is used.

3266,%/((55256
If the region specified runs off the edge or bottom of the screen, the edge of the region is
assumed to be along the screen edges. When Origin Mode is set, the edges of the scrolling region
are handled as if they were the edges of the screen.
Undesirable results may be produced if the Fill a Region With a Character command is executed
on a region that contains mixed line types.

(;$03/(6
<ESC>[2x
Fills the entire screen with the gray block character (value 251 when the Static Special
Character Font is mapped into the Extended Character Set).
<ESC> [2;2;45;3;43x
Fills every character position of a 2 line by 45 column region (whose upper left corner is at
the current cursor position) with a plus (+) character (value 43 when the Static ASCII
Character Font is mapped into the Standard Character Set).

NOTE
These examples assume that the Static ASCII Character Font and Static Special Character Font are
mapped into the Standard and Extended Character Sets, respectively. If this is not the case, the character
that fills the region may differ from the above examples (it may be a custom character).

6-46
(UDVHD7RXFKNH\&RPPDQG^)(7.` 5HPRWH
The Erase a Touchkey command is sent by the host to erase the target associated with a specified
touchkey on the display.
Each character that is erased is replaced by a blank (a Space character). The attribute of each
character position in the erased touchkey reverts to off, unless the NOCHANGE Attribute Mode
is set.
The area of the display affected by this command is restricted to lie within the scrolling region
when Origin Mode is set.
Within a touchkey, the host can restrict the effect of this command to one of the areas previously
defined in this chapter under Touchkey Visual Extent.
For the Erase a Touchkey command to produce correct and predictable results, the touchkey’s
line type must be determined. Line type is determined according to the following rules:

• If the touchkey contains any double-size lines, the entire touchkey is assumed to be
composed of double-size lines.

• If the touchkey contains any double-width lines, the entire touchkey is assumed to be
composed of double-width lines.

• If the touchkey does not contain any double-width or double-size lines, the touchkey is
assumed to be composed of all normal lines.

NOTE
Undesirable results may be produced if the Erase a Touchkey command is executed on a touchkey that
contains mixed line types.

If the touchkey specified in this command designates a touch cell within a touchkey (but not the
master cell), then the characters are erased within that touch cell rather than the entire touchkey.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[8;<Pk>;<Pv>u
<Pk> is a numeric parameter that specifies which touchkey is to be erased.
If <Pk> is 0 or omitted, the entire screen is erased.
<Pv> is a selective parameter that specifies the visual extent of the touchkey to be erased.
If <Pv> is 0 or omitted, all characters in the touchkey are erased.
If <Pv> is 1, the only inner characters are erased.
If <Pv> is 2, the only border characters are erased.
If <Pv> is 3, all characters in the touchkey are erased.

6-47
3266,%/((55256
Undesirable results may be produced if the Erase a Touchkey command is executed on a
touchkey that contains mixed line types.

(;$03/(6
<ESC>[8u
Erases the entire screen (if Origin Mode is reset and the cursor is in the home position).
<ESC>[8;53;2u
Erases the border of Touchkey 53.

6-48
(UDVHD5HJLRQ&RPPDQG^)(5` 5HPRWH
The Erase a Region command is sent by the host to erase a designated area of the screen.
Each character that is erased is replaced by a blank (a Space character). The attribute of each
character position in the erased region reverts to off, unless the NOCHANGE Attribute Mode is
set.
The region to be erased is defined relative to the cursor position, which becomes the upper-left
corner of the region. The number of lines (height) and number of columns (width) making up the
region are specified by numeric parameters.
The region of the display affected by this command is restricted to the scrolling region if the
Origin Mode is set.
Within a defined region, the host can restrict the effect of this command to one of the following
areas:

• Inner characters
Only those characters within a region not adjacent to an edge (border) of the region are
erased.

• Border characters
Only those characters within a region adjacent to an edge (border) of the region are erased.

• All characters
All the characters (inner and border) in the region are erased.
For the Erase a Region command to produce correct and predictable results, the line type of the
region must be determined. Line type is determined according to the following rules:

• If the region contains any double-size lines, the entire region is assumed to be composed of
double-size lines.

• If the region contains any double-width lines, the entire region is assumed to be composed of
double-width lines.

• If the region does not contain any double-width or double-size lines, the region is assumed to
be composed of all normal lines.

NOTE
Undesirable results may be produced if the Erase a Region command is executed on a region that contains
mixed line types.

23(5$72586$*(
None. (This is a remote command only.)

6-49
+26786$*(
<ESC>[8;<P1>;<Pc>;<Pv>t
<Pl> is a numeric parameter from 0 through 24, which designates the height of the region in
lines.
If <P1> is 0, omitted, or greater than 24, a region with a height of 24 lines is defined.
<Pc> is a numeric parameter from 0 through 80, which designates the width of the region in
columns.
If <Pc> is 0, omitted, or greater than 80, a region 80 columns wide is defined.
<Pv> is a selective parameter, which indicates the visual extent of the region to be erased.
If <Pv> is 0 or omitted, all characters in the region are erased.
If <Pv> is 1, the only inner characters are erased.
If <Pv> is 2, the only border characters are erased.
If <Pv> is 3, all the characters in the region are erased.

3266,%/((55256
Undesirable results may be produced if the Erase a Region command is executed over a region
that contains mixed line types.
If the region specified runs off the edge or bottom of the screen, the edge of the region is
assumed to be along the screen edges. When Origin Mode is set, the edges of the scrolling region
are handled as if they were the edges of the screen.

(;$03/(6
<ESC>[8t
Erases the entire screen (if Origin Mode is reset and the cursor is in the home position).
<ESC>[8;2;45;3t
All of a 2-line by 45-column region is erased (relative to the location of the cursor, which
represents the upper-left corner of the region).

6-50
&+$37(5352*5$00,1*7+(237,21$/.(<%2$5'
,1752'8&7,21
This chapter describes how to program the optional keyboard. Topics include:

• A description of the keyboard

• A list of the codes the keyboard transmits to the host

• A description of the commands that affect the keyboard’s operation

.(<%2$5''(6&5,37,21
The optional keyboard has keys similar to those on a typewriter, with the addition of some
special keys. The keyboard contains standard keys, a Setup key, cursor control keys, special
function keys, and an auxiliary keypad.

6WDQGDUG.H\V
The standard keys generate ASCII codes, and have the names of ASCII characters printed on the
keycaps.
Following are some general descriptions of some of the non-numeric keys. Note that the function
of most of these keys is ultimately determined by the application software running on the host
computer. The ASCII codes sent to the host computer by the non-alphanumeric standard keys are
shown in Table 7-1.
The Back Space key normally causes the cursor to move one space to the left.
The Break key generates a short break when pressed alone, or a long break when pressed in with
the Shift key. The Break key normally resets the communication interfaces with a device
attached to the TCS. However, the function of the Break key is determined by the types of
peripherals connected to the TCS and the application software running on the host computer.
(For more information, see Send Short Break Command and Send Long Break Command, later in
this chapter.)
The Delete key normally moves the cursor one space to the left, deleting the character that
occupied the space.
The Return key sends either the ASCII code <CR> (0D Hex) or the ASCII code sequence <CR>
<LF> (0D 0A Hex) to the host, depending on the state of the New Line Mode. See New Line
Mode Command, in Chapter 5.
The Return key normally moves the cursor to the first column of the next line. However, the
action caused by sending <CR> or <CR> <LF> to the host computer is determined by the
application software running on the host computer.
The Shift key alone does not generate a code. It is used with other standard keys to send
uppercase characters, by holding down Shift while pressing another key. The uppercase
characters include capital letters and uppercase symbols.

7-1
The Space Bar normally moves the cursor one space to the right, leaving an invisible space
character in its place.
The Scroll Lock key is a toggle. The first press freezes the display by causing the TCS to stop
processing codes. The second press allows the TCS to resume processing codes. If the host
continues to send codes while Scroll Lock is in effect, the TCS input buffer may fill, prompting
the TCS to stall the host.
The Ctrl key alone does not send a code. It is used with other standard keys to send control codes
by holding down the Ctrl key while pressing another key. For example, the Ctrl key can be used
to send a control code that causes the TCS to beep. The keystroke Ctrl/G (when echoed to the
TCS) normally cause the beeper to sound. Table 7-2 shows the codes that the TCS transmits
when various keys are pressed with the Ctrl key. The action caused by sending these control
codes to the host computer is determined by the application software running on the host
computer.
The Caps Lock key locks when pressed, and unlocks when pressed again. When the Caps Lock
key is locked, all alphabetic keys generate capital letters. When the Caps Lock key is unlocked,
all alphabetic keys generate lowercase letters (unless an alphabetic key is pressed with the Shift
key). Numeric or symbolic keys are unaffected by the Caps Lock key. The LED indicator on the
Caps Lock key is lit when the key is locked, and off when the key is unlocked.
The Tab key normally moves the cursor one tab space to the right.
The Esc (escape) key generates the ASCII <ESC> code (1B Hex).

7DEOH1RQ$OSKDQXPHULF6WDQGDUG.H\&RGHV
.(< &2'( 6 6(1772+267 01(021,& 6
+(;$'(&,0$/
'HOHWH ) '(/!
7DE  +7!
5HWXUQ 'RU'$ &5!RU&5!/)!
6SDFH%DU  63$&(!
(VF % (6&!
%DFN6SDFH  %6!
7KH1HZ/LQH0RGHGHWHUPLQHVZKLFKFRGHVDUHVHQW6HH&KDSWHU

7-2
7KH6HW8S.H\
The Set Up key does not transmit anything to the host computer. It is used to call up the Setup
Screen, and to exit the Setup, Test, and Alignment Screens. See Using the Setup Screen, for more
information.

&XUVRU&RQWURO.H\V
The cursor control keys transmit ANSI cursor control sequences to the host as shown in Table 7-
3. These are special sequences of ASCII codes defined by the American National Standards
Institute (ANSI).

7-3
7DEOH&RGHV6HQWE\.H\VZKHQ3UHVVHGZLWKWKH&WUO.H\
.(< 35(66(':,7+ &2'(6(1772+267 +(;$'(&,0$/ 01(021,&
&75/.(<
RU6SDFH%DU  18//!
$  62+!
%  67;!
&  (7;!
'  (27!
(  (14!
)  $&.!
*  %(/!
+  %6!
,  +7!
- $ /)!
. % 97!
/
& ))!
0
'RU'$ &5!RU&5!/)!
1
( 62!
2
) 6,!
3
 '/(!
4
 '&! ;21
5
 '&!
6
 '&! ;2))
7
 '&!
8
 1$.!
9
 6<1!
:
 (7%!
;RU'HOHWH
 &$1!
<
 (0!
=
$ 68%!
RU>
% (6&!
RU?
& )6!
RU@
' *6!
RUC
( 56!
RU
) 86!

) '(/!
7KH1HZ/LQH0RGHGHWHUPLQHVZKLFKFRGHVDUHVHQW6HH&KDSWHU

7-4
7DEOH&XUVRU&RQWURO.H\&RGHV
.(< &21752/6(48(1&( $&7,217$.(1,)(&+2('727+(7&6
6(1772+267
Æ (6&!>$ 0RYHVWKHFXUVRURQHOLQHXS
Ç (6&!>% 0RYHVWKHFXUVRURQHOLQHGRZQ
Å (6&!>& 0RYHVWKHFXUVRURQHVSDFHWRWKHULJKW
Ä (6&!>' 0RYHVWKHFXUVRURQHVSDFHWRWKHOHIW

The cursor control keys normally move the cursor on the screen.

6SHFLDO)XQFWLRQ.H\V
The special function keys transmit control sequences to the host as shown in Table 7-4. The
special function keys can also be pressed with the Shift or Ctrl keys to generate additional
control sequences. These control sequences are also shown in Table 7-4. How the host computer
responds to these control sequences depends on the application software. The unlabeled special
function key does not send any codes to the host.

7-5
7DEOH6SHFLDO)XQFWLRQ.H\&RGHV
.(< 6 &2'(6(48(1&(6(1772+267
) (6&!>a
) (6&!>a
) (6&!>a
) (6&!>a
) (6&!>a
) (6&!>a
) (6&!>a
) (6&!>a
) (6&!>a
) (6&!>a
6KLIW) (6&!>a
6KLIW) (6&!>a
6KLIW) (6&!>a
6KLIW) (6&!>a
6KLIW) (6&!>a
6KLIW) (6&!>a
6KLIW) (6&!>a
6KLIW) (6&!>a
6KLIW) (6&!>a
6KLIW) (6&!>a
&WUO) (6&!>a
&WUO) (6&!>a
&WUO) (6&!>a
&WUO) (6&!>a
&WUO) (6&!>a
&WUO) (6&!>a
&WUO) (6&!>a
&WUO) (6&!>a
&WUO) (6&!>a
&WUO) (6&!>a

$X[LOLDU\.H\SDG
The auxiliary keypad is the group of keys on the right side of the keyboard. The auxiliary keypad
can be programmed to operate in one of two modes using the Keypad Mode command. In the
Numeric Mode, the auxiliary keypad transmits numeric codes to the host. In the Application
Mode, the auxiliary keypad transmits application code sequences to the host. Both sets of codes
are shown in Table 7-5. The default mode for the auxiliary keypad is the Numeric Mode.
The Keypad Mode command is described later in this chapter.

7-6
7DEOH$X[LOLDU\.H\SDG&RGHV
.(< 180(5,&&2'(66(1772+267 $33/,&$7,21&2'(66(1772+267
  (6&!2S
  (6&!2T
  (6&!2U
  (6&!2V
  (6&!2W
  (6&!2X
  (6&!2Y
  (6&!2Z
  (6&!2[
  (6&!2\
  (6&!2P
¶ µ (6&!2O
  (6&!2Q
(QWHU &5!RU&5!/)! (6&!20
3) (6&!23 (6&!23
3) (6&!24 (6&!24
3) (6&!25 (6&!25
3) (6&!26 (6&!26
7KH1HZ/LQH0RGHGHWHUPLQHVZKLFKFRGHVDUHVHQW6HH&KDSWHU

7-7
.(<%2$5'&200$1'6
The Keyboard commands affect the operation of the optional keyboard. The Keyboard
commands are:

• Keyboard Lockout Mode command (Remote)

• Keypad Mode command (Remote)

• Local/Remote Mode command (Local)

• Send Long Break command (Local)

• Local/Remote Mode command (Local)

• Send Short Break command (Local)


These commands are described in detail in the following pages. For ease of reference, each
command description begins at the top of a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in square brackets [] are ANSI-specified
commands. Mnemonics in braces {} are ANSI-compatible. TCS-private commands. Mnemonics in
parentheses () are ANSI-compatible, DEC-private commands.

7-8
.H\ERDUG/RFNRXW0RGH&RPPDQG>.$0@ 5HPRWH
The Keyboard Lockout Mode command sets and resets the Keyboard Lockout Mode. This allows
the host to block input from the keyboard.
When the Keyboard Lockout Mode is set, keyboard entries are ignored by the TCS (the keyboard
is locked). Setting the Keyboard Lockout Mode also precludes access to the Setup Screen
through the Set Up key on the keyboard. When the Keyboard Lockout Mode is reset, input is
allowed from the keyboard (the keyboard is unlocked).
When the keyboard is locked, the user can call up the Setup Screen only if the user has access to
the SET UP button. Once the Setup Screen is activated, the keyboard is temporarily unlocked so
that the user can use it to change parameters in the Setup Screen. Once the Setup Screen is exited
or the Communication Monitor is entered, the keyboard is again locked to all user input.

'()$8/7
Reset. (The keyboard is unlocked.)

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC> [2 l
Resets the Keyboard Lockout Mode, which unlocks the keyboard. (The terminator for the
reset command is the letter “l”, ASCII 6C hex.)
<ESC> [2 h
Sets the Keyboard Lockout Mode, which locks the keyboard.

3266,%/((55256
If the host sets the Keyboard Lockout Mode while the user is keying in a sequence, the sequence
is interrupted. To avoid this, it is recommended that the host follow the Keyboard Lockout Mode
command by a Clear User Inputs command to ensure that no partial user input strings are left
waiting to be reported to the host.

7-9
.H\SDG0RGH&RPPDQG>'(&.3$0@>'(&.310@ 5HPRWH
The Keypad Mode command sets the auxiliary keypad to either the Numeric or Application
Mode so the host can select whether the auxiliary keypad on the optional keyboard sends
numeric codes or application codes to the host.
When the keypad is set to the Numeric Mode, the keypad sends numeric codes to the host.
When the keypad is set to the Application Mode, the keypad sends special control sequences to
the host. This allows the keypad to be used for specialized applications where each key is
specially interpreted by the host software.
The numeric codes and application codes sent by the keypad are described under Auxiliary
Keypad, earlier in this chapter.

'()$8/7
Numeric Mode. (The keypad sends numeric codes.)

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC> =
Sets the auxiliary keypad to the Application Mode. (The keypad sends application codes.)
<ESC>>
Sets the auxiliary keypad to the Numeric mode. (The keypad sends numeric codes.)

7-10
/RFDO5HPRWH0RGH&RPPDQG /RFDO
The Local/Remote Mode command controls whether the TCS accepts remote commands from
the host computer or from the keyboard. The command sets the TCS either to the Remote Mode
(in which the TCS accepts remote commands from the host) or to the Local Mode (in which the
TCS accepts remote commands from the keyboard).
For complete details about how to use the Local/Remote Mode command, refer to its description
in Chapter 4.

7-11
6HQG/RQJ%UHDN&RPPDQG /RFDO
The Send Long Break command causes the TCS to hold the RS-232-E Data Terminal Ready
(DTR) and Request to Send (RTS) lines off (low) for approximately 3.5 seconds.
This command is typically used to initiate disconnection from the host equipment, particularly
with a modem communicating to a remote computer over a telephone line.

23(5$72586$*(
The user issues the Send Long Break command by typing Shift/Break on the optional keyboard
(holding down the Shift key while pressing the Break key).

+26786$*(
None. (This is a local command only.)

3266,%/((55256
Any input received from the host during transmission of the long break signal is ignored.

7-12
6HQG6KRUW%UHDN&RPPDQG /RFDO
The Send Short Break command causes the RS-232-E Transmitted Data (TD) line to be held in
the “0” or SPACE state for approximately 300 milliseconds. This can be used as a special signal
to the host that can be recognized at any baud rate.
A typical use of the Short Break command is to signal to the host to cycle through a choice of
baud rates until the baud rate matching that of the TCS is established.

23(5$72586$*(
The user issues the Send Short Break command by pressing the Break key on the optional
keyboard.

+26786$*(
None. (This is a local command only.)

3266,%/((55256
Any input received from the host during transmission of the short break signal is ignored.

7-13
&+$37(55(027(6(/)7(67,1*
,1752'8&7,21
This chapter describes two types of commands:

• Status Reporting commands

• Remote Self-Test commands


The Status Reporting commands report the status of the Touch Control Screen (TCS). The
Remote Self-Test commands activate and report the results of self-tests built into the TCS.
Together, these commands enable the host to do confidence tests and ensure that TCS
components are operating properly. The user can access these and other self-tests locally using
the Test Screen.

NOTE
All status reports supported by the TCS are summarized in Chapter 3.
The term ’Expansion Memory’ is used in several commands. This refers to the 96K of nonvolatile memory
available to the user for Screen and Dynamic Font storage.

8-1
67$7865(3257,1*&200$1'6
Status Reporting commands allow the host to determine the operational status of the TCS. The
Status Reporting commands are:

• Power-Up Interrupt Mode command (Remote)

• Request Power Status command (Remote)

• Error Interrupt Mode command (Remote)

• Request Error Status command (Remote)

• Request TCS Identification command (Remote)

• Request TCS Status command (Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begins on a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DEC-private commands.

8-2
3RZHU8S,QWHUUXSW0RGH&RPPDQG^)38,0` 5HPRWH
The Power-Up Interrupt Mode command is used to set or reset the Power-Up Interrupt Mode.
When the Power-Up Interrupt Mode is set, the TCS generates an interrupt to the host after
regaining power. This interrupt can be used by the host to detect whether the integrity of the TCS
has been disturbed by a loss of power during operation. The host can then act appropriately to
ensure that proper communication resumes with the user. This might entail resending command
sequences to the TCS or resending the previous display contents.
The default power-up interrupt sent by the TCS to the host is the command string:
<ESC>[>1n
When the Power-Up Interrupt Mode is reset, the TCS does not generate an interrupt to the host
after the TCS regains power. The state of the Power-Up Interrupt Mode is preserved in
nonvolatile memory during power loss. This allows the TCS to remember whether a power-up
interrupt is to be generated at the next power-up.
The Power-Up Interrupt Mode can also be set or reset by the host using the Set Mode command
and Reset Mode command, respectively. (See Chapter 4.)

NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.
When the TCS is operating using the multidrop protocol, it will never send a power-up interrupt when it
regains power. When regaining power, the TCS assumes it is Unaddressed and queues any power-up
interrupt in its output buffer until it is re-addressed by the host. See Chapter 2 for information about
multidrop protocol.

'()$8/7
Reset. (TCS does not send power-up interrupt.)

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>4l
Resets the Power-Up Interrupt Mode. (The terminator for the reset command is the letter "l",
ASCII 6C hex.)
<ESC>[>4h
Sets the Power-Up Interrupt Mode.

8-3
5HTXHVW3RZHU6WDWXV&RPPDQG^)536` 5HPRWH
The Request Power Status command allows the host to determine if the TCS has lost power or
was reset since the last Request Power Status command.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>0n
If the TCS has not lost power or been reset since the last Request Power Status command, the
TCS responds to the Request Power Status command by sending the following string to the
host:
<ESC>[>0n
If the TCS has lost power or been reset since the last Request Power Status command, the
TCS responds with:
<ESC>[>1n
NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.

8-4
(UURU,QWHUUXSW0RGH&RPPDQG^)(,0` 5HPRWH
The Error Interrupt Mode command is used to set or reset the Error Interrupt Mode.
When the Error Interrupt Mode is set, the TCS generates an interrupt to the host immediately
upon detecting an error. The host can use this interrupt to detect whether the operational state of
the TCS has been affected by an error. The host can then act appropriately to ensure that proper
operation resumes. This might entail resending command sequences to the TCS.
For instance, an error interrupt is generated whenever screen memory (and hence Expansion
Memory) becomes full and indicates to the host that no more screens can be stored. The host
could then delete or simplify an existing screen to create more room for the new screen.
When the Error Interrupt Mode is reset, the TCS does not generate an error interrupt when an
error is encountered. Instead, the host must poll the TCS using the Request Error Status
command to determine whether an error has occurred.
After the TCS sends an error interrupt, it automatically resets the Error Interrupt Mode. This
gives the host time to finish processing the first interrupt before allowing the TCS to send
another. The host must set the Error Interrupt Mode again when it is ready to be asynchronously
notified of another error.
While Error Interrupt Mode is reset, the TCS holds any error until the host polls for error status
by sending the Request Error Status command. If subsequent errors occur before the host has
polled for the first one, the TCS does not report them to the host, although it continues to display
them in the Operational Status Window. If the TCS is already holding an error when the host sets
the Error Interrupt Mode, an error interrupt is sent immediately.
The conditions that can cause an error, the messages the TCS displays in the Operational Status
Window, and the error report the TCS sends to the host are described in Chapter 9.

'()$8/7
Reset. (The TCS does not send error interrupts.)

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>7l
Resets Error Interrupt Mode. (The terminator for the reset command is the letter "l", ASCII
6C hex.)
<ESC>[>7h
Sets Error Interrupt Mode.

8-5
5HTXHVW(UURU6WDWXV&RPPDQG^)5(6` 5HPRWH
The Request Error Status command allows the host to poll the TCS to determine whether a new
error has occurred. This command is of use only when the Error Interrupt Mode is reset. When
the Error Interrupt Mode is set, the TCS does not hold any error status reports and will have
already sent out an asynchronous error interrupt, reporting the error to the host. Therefore, there
will be no new error for this command to report.
When the Error Interrupt Mode is reset, the TCS holds any new error until the host polls for it
using this command. Subsequent errors that occur between the time that the new error was
detected and the host polls for the error status report are ignored by this command, although they
continue to be reported within the Operational Status Window in the Setup Screen.
Each time the host polls for an error status report, the TCS responds with a report (which may
indicate that no new error has occurred). Polling for the error status report automatically clears
the error condition being held by the TCS and instructs it to resume looking for the next new
error. The error condition is also cleared upon power-up or reset (however, a new error may be
detected during the automatic self-tests, in which case it will be held as described above).
The conditions that can cause an error, the report the TCS displays in the Operational Status
Window, and the error report sent to the host are described in Chapter 9. (check)

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>11n
The status report returned to the Host in response to the above command has the following
format:
<ESC>[>11;<Pe>n
<Pe> is a selective parameter indicating the error type. If <Pe> is 0, no errors.
If <Pe> is 1, RAM test error
If <Pe> is 2, Nonvolatile memory checksum error
If <Pe> is 3, ROM checksum error
If <Pe> is 4, Touch panel error
If <Pe> is 5, Communications framing error
If <Pe> is 6, Communications overrun error
If <Pe> is 7, Communications parity error
If <Pe> is 8, Communications buffer overflow error
If <Pe> is 9, Expansion memory full error
If <Pe> is 10, Expansion memory uninitialized error

8-6
NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.

3266,%/((55256
If this command is sent while the Error Interrupt Mode is set, the TCS always responds with an
indication that no new error has occurred, since it already reported the error on an interrupt basis.

(;$03/(6
The host sends the Request Error Status command to determine whether an error has occurred:
<ESC>[>11n
If no errors have occurred since the TCS was powered-up, reset, or the previous Request Error
Status command was received, the TCS replies:
<ESC>[>11;0n
If an Touch Panel error has occurred, the TCS replies:
<ESC>[>11;4n
If a communications parity error and a communications framing error have occurred, the TCS
replies with the first new error (the parity error) since it was last powered up, reset or polled:
<ESC>[>11;7n

8-7
5HTXHVW7&6,GHQWLILFDWLRQ&RPPDQG>'$@ 5HPRWH
The Request TCS Identification command allows the host to determine the following information
about the TCS:

• The type of TCS with which it is communicating

• The firmware version installed in the TCS

• The programmable options installed in the TCS

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
This command has two equivalent forms:
<ESC>[c
<ESC>[0c
Either string requests TCS identification. The TCS responds with the following string:
<ESC>[<Pt>;<Pv>;<Pm>;<Pd>;<Pw>;<Po>c
<Pt> is the TCS type.
If <Pt> is 2, 1030 Series
If <Pt> is 3, 1050 Series
<Pv> is the firmware version, given as two digits mn, meaning the TCS has firmware
version m.n installed.
<Pm> designates the number of bytes in decimal of Expansion Memory installed.
If <Pm> is n, that number of bytes are installed
<Pd> is the Expansion Memory device type.
If <Pd> is 0, NVRAM
<Pw> is the write protection status of Expansion Memory.
If <Pw> is 0, write protection disabled (can write)
<Po> is a reserved parameter.
NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.

8-8
(;$03/(
An example of a TCS identification sequence sent to the host in response to this command is:
<ESC>[2;10;98304;0;0;0c
The TCS type is Model 1030 (2), with firmware version 1.0(10) containing 96K bytes (98304) of
Expansion Memory.

8-9
5HTXHVW7&66WDWXV&RPPDQG>'65@ 5HPRWH
The Request TCS Status command allows the host to determine the operational status of the
TCS.
The TCS responds to the Request TCS Status command by indicating whether it has had a
malfunction since it was last powered-up or reset. A malfunction is any error the TCS detects,
either during self-test or normal operation. If an error has occurred, the TCS attempts to continue
operating. To identify the type of error that occurred, the host may send the Request Error Status
command.
The status returned by this command does not indicate what type of error has occurred, nor is the
status returned affected by the Request Error Status command. Once any error has occurred, the
status returned by this command continues to indicate a malfunction until cleared by cycling the
power or sending a reset.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[5n
If no malfunction has occurred in the TCS since the TCS was last powered-up or reset, the
TCS responds to this command by sending the following string to the host:
<ESC>[0n
If a malfunction has occurred in the TCS since the TCS was last powered-up or reset, the
TCS responds by sending the following string:
<ESC>[3n
NOTE
The report may differ from the above format if the Reporting Format command has been issued. Refer to
the Reporting Format command description in Chapter 4 for details.

(;$03/(
<ESC>[5n
This control string from the host requests the operational status of the TCS. If no malfunction
has occurred since the TCS was last powered-up or reset, the TCS responds by sending the
string:
<ESC>[0n

8-10
5(027(6(/)7(67&200$1'6
The Remote Self-Test commands activate and report on self-tests built into the TCS. These tests
verify that selected parts of the TCS are operating correctly. The Remote Self-Test commands
are:

• Continuous Integrity Test command (Local/Remote)

• Request ROM Test Report command (Remote)

• Request Nonvolatile Memory Test Report command (Remote)

• Request RAM Test Report command (Remote)

• Request Touch Panel Test Report command (Remote)


These commands are described in detail in the following pages. For ease of reference, each
command description begins on a new page.

NOTE
Where applicable, command names are followed by the appropriate mnemonic. Mnemonics in square
brackets [] are ANSI-specified commands. Mnemonics in braces {} are ANSI-compatible, TCS-private
commands. Mnemonics in parentheses () are ANSI-compatible, DECprivate commands.

8-11
&RQWLQXRXV,QWHJULW\7HVW&RPPDQG^)&O7` /RFDO5HPRWH
The Continuous Integrity Test command places the TCS into the Continuous Integrity Test,
which is a continuous testing loop that verifies proper operation of the TCS electronics. The
Continuous Integrity Test command activates the following tests sequentially in a continuously
repeating cycle:

• ROM Checksum test

• Nonvolatile Memory Checksum test

• RAM test

• Touch Panel closure test


NOTE
The ROM Checksum Test, the Nonvolatile Memory Checksum Test, and the RAM Test are the same as
those described in the Installation Guide under the heading, Power-Up Sequence.

Once the Continuous Integrity Test is activated, it can be terminated locally by pressing the SET
UP key on the optional keyboard, or terminated remotely by performing a Reset command.
When the test begins, any errors detected since the TCS was last powered-up or reset are cleared
and test execution begins.

5(68/76
The test displays the following information on the screen:

• Elapsed time since test started

• Overall pass/fail indicator

• Number of test passes completed

• Number of ROM checksum errors

• Number of nonvolatile memory checksum errors

• Number of RAM failures

• Number of Touch Panel Test failures

• Last faulty ROM checksum, reference designator of faulty ROM

• Last faulty nonvolatile memory checksum, reference designator of faulty nonvolatile memory
device

• Last faulty RAM address, data sent and received, reference designator of faulty RAM

• RAM data pattern failure history

• Touch Panel Closure Test touch cell failure

8-12
All checksums, addresses, data sent, data received, and failure history values are displayed in
hexadecimal. All other numbers are displayed in decimal.
The RAM data pattern failure history contains a l in each bit position where a data error has been
detected throughout the history of the Continuous Integrity Test.
Expansion Memory is always tested as part of the nonvolatile memory checksum test.
To obtain results remotely, the host must send the TCS the control string for one of the Request
Test Report commands described later in this chapter.
When the test is entered locally (through the Setup Screen), input from the host is still received,
but is not processed (similar to operation in the Setup Screen). If the host continues to send data
to the TCS, eventually the input buffer becomes full and the TCS stalls the host. For this reason,
when the test is entered locally, it is not possible for the host to get test results remotely while the
test is in progress.
When the test is entered remotely, input from the host is still received and processed normally.
The only commands from the host that are useful during the Continuous Integrity Test are the
Request Test Report and the Reset commands. Any other input from the host could corrupt the
test results displayed on the screen.

23(5$72586$*(
The user issues the Continuous Integrity Test command from the Setup Screen by entering the
Test Screen and then touching the CONTINUOUS INTEGRITY touchkey or pressing Shift/8 on
the optional keyboard.

+26786$*(
<ESC>[2;9;<Ps>y
<Ps> is a selective parameter specifying the type of touch panel test to be performed.
If <Ps> is omitted or 0, the Touch Panel Closure Test is selected.

3266,%/((55256
If the touch panel is touched while the Touch Panel Closure Test is running, a touch panel failure
is logged. Although host input is still processed after the Continuous Integrity Test command is
sent remotely, it is recommended that only the Request Test Report commands or Reset
command be used. Any other commands could corrupt the Continuous Integrity Test display.

(;$03/(6
<ESC>[2;9y
Activates the Continuous Integrity Test. The touch panel test run is the Touch Panel Integrity
Test.

8-13
5HTXHVW5207HVW5HSRUW&RPPDQG^)5575` 5HPRWH
The Request ROM Test Report command allows the host to obtain detailed results of ROM
testing during the Continuous Integrity Test or automatic self-testing.
The host receives a response from this command when the Continuous Integrity Test is in
progress only if the Continuous Integrity Test was activated by the host rather than locally by the
user.
The TCS responds to the Request ROM Test Report command by sending to the host the ROM
Test results obtained since the Continuous Integrity Test started or since the TCS was last
powered-up or reset.

'()$8/7
The test results are always reinitialized to zero at the start of the Continuous Integrity Test, when
power is applied, or when the TCS is reset.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>6n
The TCS responds with:
<ESC>[>6;<Ploops>;<Pfail>;<Psum>n
<Ploops> indicates the number of ROM Tests completed since the Continuous Integrity
Test started or since the TCS was last powered-up or reset.
<Pfail> indicates the number of ROM Tests that detected a failure since the Continuous
Integrity Test started or since the TCS was last powered-up or reset.
<Psum> is the decimal equivalent of the last failed checksum. The value of <Psum> is 0
if no checksum errors have been detected.
NOTE
The report may differ from the above format if the Reporting Formal command has been issued. Refer to
the Reporting Formal command description in Chapter 4 for details.

(;$03/(6
<ESC>[>6n
This control string from the host requests a ROM Test report. If only a power-up test has
been performed and no ROM checksum errors were detected, the TCS responds with:
<ESC>[>6;1;0;0n
If the Continuous Integrity Test has completed 12 loops and detected ROM checksum errors
during 5 of those test loops and the most recent cell in error was 165, the TCS responds with:
<ESC>[>6;12;5;165n

8-14
5HTXHVW1RQYRODWLOH0HPRU\7HVW5HSRUW&RPPDQG^)5(75` 5HPRWH
The Request Nonvolatile Memory Test Report command allows the host to obtain detailed
results of nonvolatile testing during the Continuous Integrity Test or automatic self-testing.
The host receives a response from this command while the Continuous Integrity Test is in
progress only if the Continuous Integrity Test was activated by the host rather than locally by the
user.
The TCS responds to the Nonvolatile Memory Test Report command by sending to the host the
ROM Test results obtained since the Continuous Integrity Test started or since the TCS was last
powered-up or reset.

'()$8/7
The test results are always reinitialized to zero at the start of the Continuous Integrity Test, when
power is applied, or when the TCS is reset.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>7n
The TCS responds with:
<ESC>[>7;<Ploops>;<Pfail>;<Psum>n
<Ploops> indicates the number of ROM Tests completed since the Continuous Integrity
Test started or since the TCS was last powered-up or reset.
<Pfail> indicates the number of nonvolatile memory checksum tests that detected a
failure since the Continuous Integrity Test started or since the TCS was last powered-up
or reset.
<Psum> is the decimal equivalent of the last failed checksum. The value of <Psum> is 0
if no checksum errors have been detected.
NOTE
The report may differ from the above format if the Reporting Formal command has been issued. Refer to
the Reporting Formal command description in Chapter 4 for details.

(;$03/(6
<ESC>[>7n
This control string from the host requests a Nonvolatile Memory Test report. If only a power-
up test has been performed and no nonvolatile memory checksum errors were detected, the
TCS responds with:
<ESC>[>7;1;0;0n

8-15
If the Continuous Integrity Test has completed 112 loops and detected nonvolatile memory
checksum errors during 23 of those test loops and the most recent cell in error was 46, the
TCS responds with:
<ESC>[>7;112;23;46n

8-16
5HTXHVW5$07HVW5HSRUW&RPPDQG^)55$75` 5HPRWH
The Request RAM Test Report command allows the host to obtain detailed results of RAM
testing during the Continuous Integrity Test or automatic self-testing. The host receives a
response from this command while the Continuous Integrity Test is in progress only if the
Continuous Integrity Test was activated by the host rather than locally by the user.
The TCS responds to the Request RAM Test Report command by sending to the host the RAM
Test results obtained since the Continuous Integrity Test started or since the TCS was last
powered-up or reset.

'()$8/7
The test results are always reinitialized to zero at the start of the Continuous Integrity Test, when
power is applied, or when the TCS is reset.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>8n
The TCS responds with:
<ESC>[>8;<Ploops>;<Pfail>;<Paddr>;<Perror>;<Phistory>n
<Ploops> indicates the number of RAM Tests completed since the Continuous Integrity
Test started or since the TCS was last powered-up or reset.
<Pfail> indicates the number of RAM Tests that detected a failure since the Continuous
Integrity Test started or since the TCS was last powered-up or reset.
<Paddr> is the decimal equivalent of the last failed address. The value of <Paddr> is 0 if
no errors have been detected.
<Perror> is the decimal equivalent of the data value sent to the last failed address
exclusive-ORed with the data value received at the last failed address.
<Phistory> is the decimal equivalent of the data bit error history. The data bit error
history is a 16-bit word that a) contains a logic 0 in each bit position that has never
shown an error during all RAM testing and b) contains a logic 1 in any position that has
contained an error during RAM testing.
NOTE
The report may differ from the above format if the Reporting Formal command has been issued. Refer to
the Reporting Formal command description in Chapter 4 for details.

8-17
(;$03/(6
<ESC>[>8n
This control string from the host requests a RAM Test report. If only a power-up test has
been performed and no RAM errors were detected, the TCS responds with:
<ESC>[>8;1;0;0;0;0n
<ESC>[>8n
This continuous string from the host requests a RAM test report. Assume the Continuous
Integrity Test has completed 3 loops and detected RAM errors during two of those loops.
Also assume that the last address where an error was detected is FA003 hex (1024003
decimal), and that the pattern sent was 75 hex and the pattern received was 4 hex (75XOR 04
= 71 hex = 113 decimal). In addition, assume that at an earlier address the most significant
data bit contained an error. This gives the data bit history a value of F1 hex (71 OR 80 = F1
hex = 241 decimal). In this case the TCS responds with:
<ESC>[>8;3;2;1024003;113;241n

8-18
5HTXHVW7RXFK3DQHO7HVW5HSRUW&RPPDQG^)5775` 5HPRWH
The Request Touch Panel Test Report command allows the host to obtain detailed results of
touch panel testing during the Continuous Integrity Test or automatic self-testing. The host
receives a response from this command while the Continuous Integrity Test is in progress only if
the Continuous Integrity Test was activated by the host rather than locally by the user.
The TCS responds to the Request Touch Panel Test Report command by sending to the host the
Touch Panel Test results obtained since the Continuous Integrity Test started or since the TCS
was last powered-up or reset.

'()$8/7
The test results are always reinitialized to zero at the start of the Continuous Integrity Test, when
power is applied, or when the TCS is reset.

23(5$72586$*(
None. (This is a remote command only.)

+26786$*(
<ESC>[>9n
The TCS responds with:
<ESC> [>9 ; <Ploops> ; <Pfail> ; <Perror> n
<Ploops> indicates the number of Touch Panel Tests completed since the Continuous
Integrity Test started or since the TCS was last powered-up or reset.
<Pfail> indicates the number of Touch Panel Tests that detected a failure since the
Continuous Integrity Test started or since the TCS was last powered-up or reset.
<Perror> is the decimal equivalent of the most recent touch cell closure (if the Touch
Panel Closure Test was performed).
NOTE
The report may differ from the above format if the Reporting Formal command has been issued. Refer to
the Reporting Formal command description in Chapter 4 for details.

8-19
$33(1',;$ 6$03/(352*5$0
352*5$0'(6&5,37,21
With no modifications, the sample program in this appendix can run in BASIC BASICA*,
QuickBASIC*, and GWBASIC* on the IBM PC*, PC/XT, or PC/AT or compatibles.
The program sets up a communication channel between the IBM PC and the TCS, and creates
three touch targets centered vertically on the TCS display. Touching any target reverses the video
in the target. Touching another target causes the first to revert to normal video, and reverses the
one touched. Use Ctrl/Break to exit the program.

3+<6,&$/&211(&7,21
A null modem cable is required to connect the TCS to the host IBM PC. If a cable is not
immediately available, construction details follow. The sample program assumes the TCS is
connected to the PC serial port COM1.

6HWWLQJXSWKH,%03&
Refer to the IBM PC hardware manual to locate the serial port. If the manual is not available, the
following information can help to locate the correct connector. A serial cable is provided with
the TCS and can be used to connect to the serial port on the PC.

6HWWLQJXSWKH7&6
Refer to the ErgoTouch TCS Installation Guide and enter the Setup Screen. Select the following
communication parameters:

• Address: none

• Baud Rate: 9600

• Data Bits: 8

• Parity Enable: off

• Stop Bits: 1

• XON/XOFF: off
While in the Setup Screen, also verify that the following parameters are correctly set:

• Display Activity: on

• Local/Remote: remote
* BASICA. QuickBASIC. and GWBASIC are trademarks of Microsoft Corporation.
IBM PC is a trademark of the International Business Machines Corporation.

A-1
7KH6DPSOH3URJUDP

100 ‘ ********************************************
105 ‘
110 ‘ Set up constants
115
120 es$ = CHR$(27) ‘ Control string introducer
125 cr$ = es$ + “[C” ‘ Move cursor right command
130 cd$ = es$ + “[B” ‘ Move cursor down command
135 ‘
140 DIM tkey$(3) ‘ Define array of touchkey
145 ‘ ‘ positions
150 tkey$(1) = “032” ‘ Position of 1st touchkey
155 tkey$(2) = “035” ‘ Position of 2nd touchkey
160 tkey$(3) = “038” ‘ Position of 3rd touchkey
165 ‘
170 ‘ ********************************************
175 ‘
180 ‘ Initialize variables
185 ‘
190 oldt% = 0 ‘ Last touchkey value
195 touch$ = “” ‘ Input from TCS
200 newt% = 0 ‘ New touchkey value
205 ‘
210 ‘ ********************************************
215 ‘
220 ‘ Open serial communication channels to TCS
225 ‘
230 CLOSE ‘ Close communication ports
235 OPEN “COM1:9600, N, 8, 1, CSO, DSO” AS #1 ‘ Open communications port
240 ‘
245 ‘
250 ‘ *********************************************
255 ‘
260 ‘ Set up TCS modes
265 ‘
270 PRINT #1, es$;”[2s”; ‘ Select displayed screen
275 PRINT #1, es$;”[3s”; ‘ Initialize screen
280 PRINT #1, es$;”[;;13w; ‘ Set terminator char to <CR>
285 PRINT #1, es$;”[>1l”; ‘ Polled touch mode off
290 PRINT #1, es$;”[>2l”; ‘ Enable touch input

A-2
295 PRINT #1, es$;”[12h”; ‘ Local Echo mode off
300 PRINT #1, es$;”[1v”; ‘ Turn off cursor
305 PRINT #1, es$;”[3z”; ‘ Display activity on
310 ‘
315 ‘ Set up TCS character sizes and touch panel
320 ‘
325 PRINT #1, es$;”[1;1H”; ‘ Position cursor
330 PRINT #1, es$;”#2”; ‘ Double-sized line
335 ‘
340 PRINT #1, es$;”[>2n”; : INPUT #1, touch$ ‘ Wait for buffer to clear
345 ‘
350 PRINT #1, es$;”[5;1H”; ‘ Position cursor
355 FOR i% = 1 TO 19 ‘ Create double wide region
360 PRINT #1, es$;”6”; ‘ Double-width lines
365 PRINT #1, es$;”[B”; ‘ Move down one line
370 NEXT i%
375 ‘
380 PRINT #1, es$;”[>2n”; : INPUT #1, touch$ ‘ Wait for buffer to clear
385 ‘
390 ‘ *********************************************
395 ‘
400 ‘ Initialize Touchkeys
405 ‘
410 PRINT #1, es$;”[4u”; ‘ Set all touchkeys to dead
415 ‘
420 FOR i% = 1 TO 3
425 PRINT #1, es$;”[5;”;tkey$(i%);”;3;2u”; ‘ Build touchkey
430 PRINT #1, es$;”[4;”;tkey$(i%);”;1u”; ‘ Set touchkey type
435 PRINT #1, es$;”[6;”;tkey$(i%);”;4u”; ‘ Draw target
440 ‘
445 PRINT #1, es$;”[>2n”; : INPUT #1, touch$ ‘ Wait for buffer to clear
450 NEXT i%
455 ‘
460 PRINT #1, es$;”[>“;tkey$(1);”H”; ‘ Position cursor
465 PRINT #1, cd$;cd$;cr$;”ONE”; ‘ Label first target
470 PRINT #1, es$;”[>“;tkey$(2);”H”; ‘ Position cursor
475 PRINT #1, cd$; cd$; cr$; “TWO”; ‘ Label second target
480 PRINT #1, es$;”[>“;tkey$(3);”H”; ‘ Position cursor
485 PRINT #1, cd$;cd$;cr$;”THREE”; ‘ Label third target
490 ‘
495 PRINT #1, es$;”[>2n”; : INPUT #1, touch$ ‘ Wait for buffer to clear
500 ‘

A-3
505 ‘************************************************
510 ‘
515 ‘ Draw Rest of Display
520 ‘
525 PRINT #1, es$;”[1;11H”; ‘ Position cursor
530 PRINT #1, “Touch Control Screen”; ‘ Top of double-sized line
535 PRINT #1, es$;”#2; ‘ Copy to bottom half.
540 ‘
545 PRINT #1, es$;”[5;3H”; ‘ Position cursor
550 PRINT #1, es$;”[6; 10; 36; 2t”; ‘ Draw outline
555 ‘
560 PRINT #1, es$;”[20;7H”; ‘ Position cursor
565 PRINT #1, “A light touch is all it takes.”; ‘ Print text
570 ‘
575 ‘ ************************************************
580 ‘
585 ‘ Get user input
590 ‘
595 INPUT #1, touch$ ‘ Get touch input from TCS
600 ‘
605 start% = INSTR(1, touch$, es$+”[>2;”) + 5 ‘ Find touchkey number
610 touch$ = MID$(touch$, start%, 3) ‘ Extract touchkey touched
615 ‘
620 ‘ Update the display
625 FOR i% = 1 to 3
630 IF touch$ = tkey$(i%) THEN newt% = i%
635 NEXT i%
640 ‘
645 PRINT #1, es$;”[9;”tkey$(newt%);”;1;7u”; ‘ Reverse new touchkey
650 IF oldt% = 0 THEN GOTO 665 ‘ Determine if first use
655 PRINT #1, es$;”[9;”;tkey$(oldt%);”;1;7u”; ‘ Reset old touchkey
660 ‘
665 oldt% = newt% ‘ Old touch is now new touch
670 GOTO 595 ‘ Start over
675 END

A-4
$33(1',;% &200$1'6800$5<7$%/(
,1752'8&7,21
This appendix contains a table that summarizes all TCS commands and provides commonly
needed information about each command. Commands listed here are fully documented in the
indicated chapters of this manual.
The Command Summary Table groups the commands according to related functions. Where
applicable, the command summary includes mnemonics, host usage, and TCS response.
Commands that are Local only have no Host Usage indicated. If the command elicits a TCS
response, the response is given below the command.
The commands are grouped according to the following functions and are presented in the order
in which they are covered in this manual:

• TCS Mode commands

• Setup Screen commands

• Communication commands

• Screen Memory commands

• Character Set and Character Font commands

• Character Displaying commands

• Character Interpretation commands

• Cursor commands

• Screen Appearance commands

• Touch Panel commands

• Region commands

• Keyboard commands

• Status Reporting commands

• Remote Self-Test commands

NOTE
Mnemonics in square brackets [] are ANSI-specified commands. Mnemonics in brace {} are ANSI-
compatible, TCS-private commands. Mnemonics in parentheses () are ANSI-compatible, DEC-private
commands. Optional parameters are represented in angle brackets (e.g., <Ps>).

B-1
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQV
&200$1'01(021,& +26786$*(7&65(63216(
7&60RGH&RPPDQGV
5HVHW0RGH>50@
)RU$16,VSHFLILHGPRGHV (6&!>3V!3V!O
)RU'(&SULYDWHPRGHV (6&!>"3V!3V!O
)RU7&6SULYDWHPRGHV (6&!>!3V!3V!O
6HW0RGH>60@
)RU$16,VSHFLILHGPRGHV (6&!>3V!3V!K
)RU'(&SULYDWHPRGHV (6&!>"3V!3V!K
)RU7&6SULYDWHPRGHV (6&!>!3V!3V!K
6HWXS6FUHHQ&RPPDQGV
6HWXS/RFNRXW0RGH^)68/0` (6&!>!O UHVHW
(6&!>!K VHW
6DYH6HWXS^)668` (6&!>]
5HFDOO6HWXS^)568` (6&!>]
5HVHW>5,6@ (6&!3V!F
3V!RPLWWHG VRIW KDUG
&RPPXQLFDWLRQ&RPPDQGV
$GGUHVV /RFDORQO\
%DXG5DWH /RFDORQO\
'DWD%LWV /RFDORQO\
3DULW\(QDEOH /RFDORQO\
3DULW\6HQVH /RFDORQO\
6WRS%LWV /RFDORQO\
;21;2))0RGH /RFDORQO\
/RFDO5HPRWH0RGH /RFDORQO\
7UDQVPLW0RGH /RFDORQO\
+DUGZDUH+DQGVKDNH /RFDORQO\

B-2
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
&RPPXQLFDWLRQ&RPPDQGV
5HSRUWLQJ)RUPDW^)5)` (6&!>3!3!3!Z
3!)LUVWLQWURGXFHU
)LUVWLQWURGXFHU'HIDXOW (6&! GHFLPDO
3!6HFRQGLQWURGXFHU
6HFRQGLQWURGXFHU'HIDXOW > GHFLPDO
3!7HUPLQDWRU
7HUPLQDWRU'HIDXOW QRQH
&OHDU8VHU,QSXWV^)&8,` (6&!>]
6FUHHQ0HPRU\&RPPDQGV
OQLWLDOL]H6FUHHQ^),6` (6&!>V
6HOHFW6FUHHQ^)66` (6&!>3VFU!V
3VFU!
RPLWWHG 6HOHFW'LVSOD\HG6FUHHQIRUHGLWLQJ
WR 6HOHFWD6WRUHG6FUHHQIRUHGLWLQJ
&RS\6FUHHQ^)&6` (6&!>3VUF!3GHVW!3GHVW!V
3VUF!
 &RS\IURP'LVSOD\HG6FUHHQ
WR &RS\IURPD6WRUHG6FUHHQ
3GHVW!
RPLWWHG &RS\WR'LVSOD\HG6FUHHQ
WR &RS\WRD6WRUHG6FUHHQ
'HOHWH6FUHHQ^)'6` (6&!>3VFU!3VFU!V
3VFU!
RPLWWHG QRVFUHHQVGHOHWHG
WR 6WRUHG6FUHHQWRGHOHWH
'HOHWH$OO6FUHHQV^)'$6` (6&!>V

B-3
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
6FUHHQ0HPRU\&RPPDQGV
5HDG6FUHHQ0HPRU\5HPDLQLQJ (6&!>!Q
^)5605`
7&65HVSRQVH (6&!>!3VX!3EX!3VU!3EU!Q
3VX!QXPEHURIVFUHHQVLQXVH
3EX!E\WHVRIVFUHHQPHPRU\LQXVH
3VU!QXPEHURIVFUHHQVUHPDLQLQJWREHXVHG
3EU!E\WHVRIVFUHHQPHPRU\UHPDLQLQJ
5HDG6FUHHQ([LVWHQFH^)56(` (6&!>!3VFU!Q
3VFU!
RPLWWHG GRHV'LVSOD\HG6FUHHQH[LVW"
WR GRHVWKLV6WRUHG6FUHHQH[LVW"
7&65HVSRQVH (6&!>!Q LIVFUHHQGRHVQRWH[LVW
(6&!>!Q LIVFUHHQH[LVWV
&KDUDFWHU6HWDQG&KDUDFWHU)RQW&RPPDQGV
6HOHFW&KDUDFWHU6HW>6&6@ 62! ([WHQGHG&KDUDFWHU6HW
6,! 6WDQGDUG&KDUDFWHU6HW
0DS&KDUDFWHU)RQW^)0&)` (6&! PDS6WDWLF$6&,,&KDUDFWHU)RQWLQWR
6WDQGDUG&KDUDFWHU6HW GHIDXOW
(6&! PDS'\QDPLF&KDUDFWHU)RQWOLQWR
6WDQGDUG&KDUDFWHU6HW
(6&! PDS'\QDPLF&KDUDFWHU)RQWLQWR
6WDQGDUG&KDUDFWHU6HW
(6&! PDS6WDWLF6SHFLDO&KDUDFWHU)RQWLQWR
6WDQGDUG&KDUDFWHU6HW
(6&! PDS6WDWLF$6&,,&KDUDFWHU)RQWLQWR
([WHQGHG&KDUDFWHU6HW
(6&! PDS'\QDPLF&KDUDFWHU)RQWLQWR
([WHQGHG&KDUDFWHU6HW
(6&! PDS'\QDPLF&KDUDFWHU)RQWLQWR
([WHQGHG&KDUDFWHU6HW
(6&! PDS6WDWLF6SHFLDO&KDUDFWHU)RQWLQWR
([WHQGHG&KDUDFWHU6HW GHIDXOW

B-4
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
&KDUDFWHU6HWDQG&KDUDFWHU)RQW&RPPDQGV
&RS\&KDUDFWHU)RQW^)&&)` (6&!>3VUF!3GHVW!`
3VUF!
RPLWWHG 6WDWLF$6&,,&KDUDFWHU)RQW
 '\QDPLF&KDUDFWHU)RQW
 '\QDPLF&KDUDFWHU)RQW
 6WDWLF6SHFLDO&KDUDFWHU)RQW
3GHVW!
RPLWWHG LQYDOLGGHVWLQDWLRQIRQW
 '\QDPLF&KDUDFWHU)RQW
 '\QDPLF&KDUDFWHU)RQW
 LQYDOLGGHVWLQDWLRQIRQW
'RZQ/LQH/RDG&KDUDFWHU)RQW (6&!33IQ!3FQ!3H!^6[ESO!
^)'/&)` 6[ES!6[ESQ!(6&!?
3IQ!
RPLWWHG FKDQJH'\QDPLF&KDUDFWHU)RQWO
 FKDQJH'\QDPLF&KDUDFWHU)RQW
 FKDQJH'\QDPLF&KDUDFWHU)RQW
3FQ!
RPLWWHG VWDUWORDGLQJDWUGFKDUDFWHU
 VWDUWORDGLQJDWVWFKDUDFWHU VWDUW RIG\QDPLFFKDUDFWHUIRQW
 VWDUWORDGLQJDWQGFKDUDFWHUQ VWDUWORDGLQJDWQWKFKDUDFWHU
3H!
RPLWWHG HUDVHDOOFKDUDFWHUVLQG\QDPLFFKDUDFWHUIRQW
 HUDVHRQO\ZKHUHQHZFKDUDFWHUVDUHWREHORDGHG
6[ESO!VL[HOELWSDWWHUQIRUILUVWFKDUDFWHU
6[ES!VL[HOELWSDWWHUQIRUVHFRQGFKDUDFWHU
6[ESQ!VL[HOELWSDWWHUQIRUODVWFKDUDFWHU

B-5
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
&KDUDFWHU'LVSOD\LQJ&RPPDQGV
'LVSOD\'RXEOH:LGWK/LQH (6&!
'(&':/
'LVSOD\'RXEOH6L]H/LQH '(&'+/ (6&!
3ODFH'RXEOH6L]H/LQH^)'6/` (6&!
'LVSOD\1RUPDO/LQH '(&6:/ (6&!
'UDZ%DU)RU%DU&KDUW^)'%%` (6&!>3V!3U!3G!3W![
3V!
RPLWWHG  LIYHUWLFDOEDU
 LIKRUL]RQWDOEDU
Q EDUOHQJWKLQFKDUDFWHUVZKHQILOOHG
3U!
RPLWWHG 
Q SRUWLRQRIEDUWRILOOLQWHQWKVRISHUFHQW
3G!
RPLWWHG GUDZYHUWLFDOEDU
 GUDZKRUL]RQWDOEDU
3W!
RPLWWHG O
Q WKLFNQHVVRIEDULQFKDUDFWHUV
(UDVH&KDUDFWHU>(&+@ (6&!>3Q!;
3Q!
RPLWWHG HUDVHFKDUDFWHUDWFXUVRU
Q HUDVHQFKDUDFWHUVDWDQGIROORZLQJFXUVRU
(UDVHLQ/LQH>(/@ (6&!>3V!.
3V!
RPLWWHG HUDVHIURPFXUVRUWKURXJKHQG
 HUDVHIURPVWDUWWKURXJKFXUVRU
 HUDVHWKHHQWLUHOLQH

B-6
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
&KDUDFWHU'LVSOD\LQJ&RPPDQGV
(UDVHLQ'LVSOD\>('@ (6&!>3V!-
3V!
RPLWWHG HUDVHIURPFXUVRUWKURXJKHQG
 HUDVHIURPVWDUWWKURXJKFXUVRU
 HUDVHWKHHQWLUHVFUHHQ
&KDUDFWHU,QWHUSUHWDWLRQ&RPPDQGV
$XWR:UDS$URXQG0RGH (6&!>"O UHVHW
'(&$:0
(6&!>"K VHW
6HQG5HFHLYH0RGH>650@
/RFDO(FKRRQ (6&!>O UHVHW
/RFDO(FKRRII (6&!>K VHW
1HZ/LQH0RGH>/10@ (6&!>O UHVHW
(6&!>K VHW
12&+$1*($WWULEXWH0RGH (6&!>!O UHVHW
^)1&$0`
(6&!>!K VHW
1DWLRQDO5HSODFHPHQW&RGH^)15&` (6&!>3V!]
3V!
RPLWWHG RII
 'DQLVK
 'XWFK
 )UHQFK
 &DQDGLDQ
 )LQQLVK
 *HUPDQ
 ,WDOLDQ
 6SDQLVK
 6ZHGLVK
 6ZLVV
 8.

B-7
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
&KDUDFWHU,QWHUSUHWDWLRQ&RPPDQGV
6HW&KDUDFWHU$WWULEXWHV>6*5@ (6&!>3V!3V!P
3V!
RPLWWHG DOORII
 KLJKOLJKW
 WXUQRIIKLJKOLJKW
 XQGHUOLQH
 WXUQRIIXQGHUOLQH
 EOLQN
 WXUQRIIEOLQN
 UHYHUVHYLGHR
 WXUQRIIUHYHUVHYLGHR
 FRQFHDO
 WXUQRIIFRQFHDO
&RORU7&6
 VHOHFWIRUHJURXQGFRORU
 VHOHFWEDFNJURXQGFRORU
 VHOHFWFRQFHDOFRORU
6FUROOLQJ5HJLRQ '(&67%0 (6&!>3W!3E!U
3W!
RPLWWHG WRSOLQHLV
Q WRSOLQHLVQ
3E!
RPLWWHG ERWWRPOLQHLV
Q ERWWRPOLQHLVQ
2ULJLQ0RGH '(&20 (6&!>"O UHVHW
(6&!>"K VHW

B-8
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
&XUVRU&RPPDQGV
0RYH&XUVRUWR$EVROXWH3RVLWLRQ (6&!>3O!3F!+
>&83@
>+93@ (6&!>3O!3F!I
3O!
RPLWWHG OLQH
Q OLQHQ
3F!
RPLWWHG FROXPQ
Q FROXPQQ
0RYH&XUVRUWR7RXFKNH\ (6&!>!3N!+
^)0&77.`
3N!
RPLWWHG PRYHWRWRXFKNH\
Q QXPEHURIWRXFKNH\
0RYH&XUVRU)RUZDUG>&8)@ (6&!>3Q!&
3Q!
RPLWWHG RQHFKDUDFWHU
Q QFKDUDFWHUV
0RYH&XUVRU%DFNZDUG>&8%@ (6&!>3Q!'
3Q!
RPLWWHG RQHFKDUDFWHU
Q QFKDUDFWHUV
0RYH&XUVRU8S>&88@ (6&!>3Q!$
3Q!
RPLWWHG RQHOLQHQ QOLQHV
0RYH&XUVRU'RZQ>&8'@ (6&!>3Q!%
3Q!
RPLWWHG RQHOLQH
Q QOLQHV
1H[W/LQH>1(/@ (6&!(RU1(/!
,QGH[>,1'@ (6&!'RU,1'!

B-9
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
&XUVRU&RPPDQGV
5HYHUVH,QGH[>5,@ (6&!0RU5,!
5HDG&XUVRU3RVLWLRQ>&35@ (6&!>Q
7&65HVSRQVH (6&!>3O!3F!5
3O!
 UHODWLYHOLQHQXPEHURIFXUVRU,I2ULJLQ
0RGHLVVHWOLQHOLVDWWKHWRSRIVFUROOLQJUHJLRQLI
2ULJLQ0RGHLVUHVHWOLQHLVDWWRSRIVFUHHQ
3F!
O QRUPDOOLQHV
 GRXEOHZLGWKRUGRXEOHVL]HOLQHV
1XPHULFSDUDPHWHUUHSUHVHQWLQJFKDUDFWHUFROXPQ
RIFXUVRU
5HDG&KDUDFWHU8QGHU&XUVRU (6&!>!Q
^)5&8&`
7&65HVSRQVH (6&!>!3FK!Q
3FK!
'HFLPDOYDOXHRIFKDUDFWHUXQGHUFXUVRU
5HDG$WWULEXWHV8QGHU&XUVRU (6&!>!Q
^)5$8&`
7&65HVSRQVH (6&!>!3KL!3XO!3EOLQN!3UY!3FRQFO!Q
3KL!
 KLJKOLJKWDFWLYH
 KLJKOLJKWLQDFWLYH
3XO!
 XQGHUOLQHDFWLYH
 XQGHUOLQHLQDFWLYH
3EOLQN!
 EOLQNDFWLYH
 EOLQNLQDFWLYH
3UY!
 UHYHUVHYLGHRDFWLYH
 UHYHUVHYLGHRLQDFWLYH
3FRQFO!

B-10
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
&XUVRU&RPPDQGV
7&65HVSRQVH  FRQFHDODFWLYH
FRQWLQXHG
 FRQFHDOLQDFWLYH
&RORU7&65HVSRQVH (6&!>!3KL!3XO!3EOLQN!3UY!3FRQFO!3IJ!3EJ!3FF!Q
3IJ! FXUUHQWIRUHJURXQGFRORU
3EJ! FXUUHQWEDFNJURXQGFRORU
3FRQFO! FXUUHQWFRQFHDOFRORU
&XUVRU7\SH^)&7` (6&!>3V!3V!Y
3V!
9LVLELOLW\
RPLWWHG YLVLEOH
 LQYLVLEOH
6KDSH
 XQGHUOLQH
 UHYHUVHYLGHREORFN
$FWLYLW\
 QRQEOLQNLQJ
 VORZEOLQNLQJ
 IDVWEOLQNLQJ
6FUHHQ$SSHDUDQFH&RPPDQGV
6FUHHQ%DFNJURXQG0RGH (6&!>"O QRUPDO
'(&6&10
(6&!>"K UHYHUVH
'LVSOD\$FWLYLW\^)'$` (6&!>3V!]
3V!
RPLWWHG RQ
 RII
 WLPHRXW

B-11
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
7RXFK3DQHO&RPPDQGV
%XLOG7RXFKNH\^)%7.` (6&!>3N!3K!3Z!X
3N!
RPLWWHG FOHDUDOOWRXFKNH\V
Q QXPEHURIPDVWHUFHOOLQWRXFKNH\
3K!
RPLWWHG 
Q KHLJKWLQWRXFKFHOOV
3Z!
RPLWWHG 
Q ZLGWKLQWRXFKFHOOV
&OHDU7RXFKNH\^)&7.` (6&!>3N!X
3N!
RPLWWHG FOHDUDOOWRXFKNH\V
Q QXPEHURIPDVWHUFHOOLQWRXFKNH\
7RXFKNH\7\SH^)7.7` (6&!>3N!3W!X
3N!
RPLWWHG VHWDOOWRXFKNH\V
Q WRXFKNH\ZKRVHW\SHLVEHLQJDVVLJQHG
3W!
RPLWWHG GHDGNH\
 SUHVVNH\
 DXWRUHSHDWNH\
 WRJJOHNH\

B-12
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
7RXFK3DQHO&RPPDQGV
7RXFKNH\9LVXDO([WHQW^)7.9(` (6&!>3N!3Y!X
3N!
RPLWWHG VHWDOOWRXFKNH\V
Q WRXFKNH\ZKRVHH[WHQWLVEHLQJDVVLJQHG
3Y!
RPLWWHG QRYLVXDOUHVSRQVHZKHQSUHVVHG
 UHYHUVHYLGHRLQQHUFKDUDFWHUV
 UHYHUVHYLGHRERUGHUFKDUDFWHUV
 UHYHUVHYLGHRDOOFKDUDFWHUV
7RXFKNH\$XGLEOH$WWULEXWH^)7.$$` (6&!>3V!3N!X
3V!
RPLWWHG VLOHQW
 EHHS
3N!
RPLWWHG VHWDOOWRXFKNH\V
Q WRXFKNH\ZKRVHDWWULEXWHLVEHLQJDVVLJQHG
$XWR5HSHDW5DWH^)$55` (6&!>3Q!X
3Q!
RPLWWHG RII
WR WHQWKVRIVHFRQGV
3ROOHG7RXFK0RGH^)370` (6&!>!O UHVHW
(6&!>!K VHW
5HDG7RXFKNH\6WDWXV^)57.6` (6&!>!3N!Q
3N!
RPLWWHG SROOIRUQH[WWRXFKUHSRUW
Q WRXFKNH\ZKRVHVWDWXVLVWREHUHSRUWHG
7&65HVSRQVH (6&!>!3N!Q
LI([WHQGHG5HSRUW0RGHUHVHW
(6&!>!3N!3V!Q
LI([WHQGHG5HSRUW0RGHVHW
3N!

B-13
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
7RXFK3DQHO&RPPDQGV
7&65HVSRQVH  QRWRXFKHVWRUHSRUW
FRQWLQXHG
QQQ WRXFKNH\QXPEHU
3V!
 NH\LVWRJJOHGRII
 NH\LVWRJJOHGRQ
([WHQGHG5HSRUW0RGH^)(50` (6&!>!O UHVHW
(6&!>!K VHW
7RXFK3DQHO/RFNRXW0RGH^)7/0` (6&!>!O UHVHW
(6&!>!K VHW
5HJLRQ&RPPDQGV
2XWOLQHD7RXFKNH\^)27.` (6&!>3N!3V!X
3N!
RPLWWHG RXWOLQHHQWLUHVFUHHQ
Q WRXFKNH\QXPEHUWRRXWOLQH
3V!
RPLWWHG %R[W\SHOERUGHU RURXWOLQH
 %R[W\SHERUGHU
 %R[W\SHERUGHU
 %R[W\SHERUGHU
 %R[W\SHERUGHU
2XWOLQHD5HJLRQ^)25` (6&!>3O!3F!3E!W
3!
RPLWWHG 
Q OLQHVLQUHJLRQIURPFXUVRUGRZQ
3F!
RPLWWHG 
Q FROXPQVLQUHJLRQIURPFXUVRUWRULJKW
3E!
RPLWWHG %R[W\SHERUGHU RURXWOLQH
 %R[W\SHERUGHU

B-14
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
5HJLRQ&RPPDQGV
2XWOLQHD5HJLRQ^)25` FRQWLQXHG  %R[W\SHERUGHU
 %R[W\SHERUGHU
 %R[W\SHERUGHU
&XVWRP2XWOLQHD7RXFKNH\ (6&!>3N!3FK![
^)&27.`
3N!
RPLWWHG RXWOLQHHQWLUHVFUHHQ
Q WRXFKNH\QXPEHUWRRXWOLQH
3FK!
RPLWWHG  QRUPDOO\%R[W\SH
Q YDOXHRIVWERUGHUFKDUDFWHU
&XVWRP2XWOLQHD5HJLRQ^)&25` (6&!>3O!3F!3FK![
3!
RPLWWHG 
Q OLQHVLQUHJLRQIURPFXUVRUGRZQ
3F!
RPLWWHG 
Q FROXPQVLQUHJLRQIURPFXUVRUWRULJKW
3FK!
RPLWWHG  QRUPDOO\%R[W\SH
Q YDOXHRIVWERUGHUFKDUDFWHU
0RGLI\&KDUDFWHU$WWULEXWHVLQD (6&!>3N!3Y!X
7RXFKNH\^)0&$,7.`
3N!
RPLWWHG PRGLI\HQWLUHVFUHHQ
Q WRXFKNH\QXPEHUWRPRGLI\
3Y!
RPLWWHG PRGLI\DOOFKDUDFWHUV
 PRGLI\LQQHUFKDUDFWHUV
 PRGLI\ERUGHUFKDUDFWHUV
 PRGLI\DOOFKDUDFWHUV

B-15
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
5HJLRQ&RPPDQGV
0RGLI\&KDUDFWHU$WWULEXWHVLQD (6&!>3O!3F!3Y!W
5HJLRQ^)0&$,5`
3O!
RPLWWHG 
Q OLQHVLQUHJLRQIURPFXUVRUGRZQ
3F!
RPLWWHG 
Q FROXPQVLQUHJLRQIURPFXUVRUWRULJKW
3Y!
RPLWWHG PRGLI\DOOFKDUDFWHUV
 PRGLI\LQQHUFKDUDFWHUV
 PRGLI\ERUGHUFKDUDFWHUV
 PRGLI\DOOFKDUDFWHUV
5HYHUVH&KDUDFWHU$WWULEXWHVLQD (6&!>3N!3Y!3D!3D!X
7RXFKNH\^)5&$,7.`
3N!
RPLWWHG UHYHUVHHQWLUHVFUHHQ
Q WRXFKNH\QXPEHUWRUHYHUVH
3Y!
RPLWWHG UHYHUVHDWWULEXWHRIDOOFKDUDFWHUV
 UHYHUVHDWWULEXWHRILQQHUFKDUDFWHUV
 UHYHUVHDWWULEXWHRIERUGHUFKDUDFWHUV
 UHYHUVHDWWULEXWHRIDOOFKDUDFWHUV
3D!
RPLWWHG UHYHUVHUHYHUVHYLGHRDWWULEXWH
 UHYHUVHKLJKOLJKWDWWULEXWH
 UHYHUVHXQGHUOLQHDWWULEXWH
 UHYHUVHEOLQNDWWULEXWH
 UHYHUVHUHYHUVHYLGHRDWWULEXWH
 UHYHUVHFRQFHDODWWULEXWH

B-16
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
5HJLRQ&RPPDQGV
5HYHUVH&KDUDFWHU$WWULEXWHVLQ (6&!>3O!3F!3Y!3D!3D!W
5HJLRQ^)5&$,5`
3O!
RPLWWHG 
Q OLQHVLQUHJLRQIURPFXUVRUGRZQ
3F!
RPLWWHG 
Q FROXPQVLQUHJLRQIURPFXUVRUWRULJKW
3Y!
RPLWWHG UHYHUVHDWWULEXWHRIDOOFKDUDFWHUV
 UHYHUVHDWWULEXWHRILQQHUFKDUDFWHUV
 UHYHUVHDWWULEXWHRIERUGHUFKDUDFWHUV
 UHYHUVHDWWULEXWHRIDOOFKDUDFWHUV
3D!
RPLWWHG UHYHUVHUHYHUVHYLGHRDWWULEXWH
 UHYHUVHKLJKOLJKWDWWULEXWH
 UHYHUVHXQGHUOLQHDWWULEXWH
 UHYHUVHEOLQNDWWULEXWH
 UHYHUVHUHYHUVHYLGHRDWWULEXWH
 UHYHUVHFRQFHDODWWULEXWH
)LOOD7RXFKNH\:LWKD&KDUDFWHU (6&!>3N!3Y!3FK![
^))7.&`
3N!
RPLWWHG DOOWRXFKNH\V
Q WRXFKNH\QXPEHUWRILOO
3Y!
RPLWWHG ILOODOOFKDUDFWHUV
 ILOOLQQHUFKDUDFWHUV
 ILOOERUGHUFKDUDFWHUV
 ILOODOOFKDUDFWHUV
3FK!
RPLWWHG  QRUPDOO\JUD\EORFN
Q YDOXHRIILOOFKDUDFWHU

B-17
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
5HJLRQ&RPPDQGV
)LOOD5HJLRQ:LWKD&KDUDFWHU (6&!>3O!3F!3Y!3FK![
^))5&`
3O!
RPLWWHG 
Q OLQHVLQUHJLRQIURPFXUVRUGRZQ
3F!
RPLWWHG 
Q FROXPQVLQUHJLRQIURPFXUVRUWRULJKW
3Y!
RPLWWHG ILOODOOFKDUDFWHUV
 ILOOLQQHUFKDUDFWHUV
 ILOOERUGHUFKDUDFWHUV
 ILOODOOFKDUDFWHUV
3FK!
RPLWWHG  QRUPDOO\JUD\EORFN
Q YDOXHRIILOOFKDUDFWHU
(UDVHD7RXFKNH\^)(7.` (6&!>3N!3Y!X
3N!
RPLWWHG HUDVHHQWLUHVFUHHQ
Q WRXFKNH\QXPEHUWRHUDVH
3Y!
RPLWWHG HUDVHDOOFKDUDFWHUVLQNH\
 HUDVHLQQHUFKDUDFWHUV
 HUDVHERUGHUFKDUDFWHUV
 HUDVHDOOFKDUDFWHUV
(UDVHD5HJLRQ^)(5` (6&!>3O!3F!3Y!W
3,!
RPLWWHG 
Q OLQHVLQUHJLRQIURPFXUVRUGRZQ
3F!
RPLWWHG 
Q FROXPQVLQUHJLRQIURPFXUVRUWRULJKW

B-18
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
5HJLRQ&RPPDQGV
(UDVHD5HJLRQ^)(5` FRQWLQXHG 3Y!
RPLWWHG HUDVHDOOFKDUDFWHUVLQUHJLRQ
 HUDVHLQQHUFKDUDFWHUV
 HUDVHERUGHUFKDUDFWHUV
.H\ERDUG&RPPDQGV
.H\ERDUG/RFNRXW0RGH>.$0@ (6&!>O UHVHW
(6&!>K VHW
.H\SDG0RGH '(&.3$0 (6&!  $SSOLFDWLRQ0RGH
'(&.310 (6&!! 1XPHULF0RGH
/RFDO5HPRWH0RGH /RFDORQO\
6HQG/RQJ%UHDN /RFDORQO\
6HQG6KRUW%UHDN /RFDORQO\
6WDWXV5HSRUWLQJ&RPPDQGV
3RZHU8S,QWHUUXSW0RGH^)38O0` (6&!>!O UHVHW
(6&!>!K VHW
5HTXHVW3RZHU6WDWXV^)536` (6&!>!Q
7&65HVSRQVH (6&!>!Q QRUHVHWRUORVVRISRZHU
(6&!>!Q UHVHWRUORVVRISRZHU
(UURU,QWHUUXSW0RGH^)(O0` (6&!>!O UHVHW
(6&!>!K VHW
5HTXHVW(UURU6WDWXV^)5(6` (6&!>!Q
7&65HVSRQVH (6&!>!3H!Q
3H!
 QRHUURUVRUPHPRU\LVYRODWLOH
O 5$07HVWHUURU
 1RQYRODWLOH0HPRU\&KHFNVXPHUURU
 520&KHFNVXPHUURU
 7RXFK3DQHOHUURU
 &RPPXQLFDWLRQ)UDPLQJHUURU
 &RPPXQLFDWLRQ2YHUUXQHUURU
 &RPPXQLFDWLRQ3DULW\HUURU
 &RPPXQLFDWLRQ%XIIHU2YHUIORZHUURU

B-19
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
5HJLRQ&RPPDQGV
7&65HVSRQVH  ([SDQVLRQ0HPRU\)XOOHUURU
FRQWLQXHG
 ([SDQVLRQ0HPRU\8QLQLWLDOL]HGHUURU
5HTXHVW7&6,GHQWLILFDWLRQ>'$@ (6&!>F
(6&!>F
7&65HVSRQVH (6&!>3W!3Y!3P!3G!3Z!
3R!F
3W!
 7&6
 7&6
3Y!
PQ ILUPZDUHYHUVLRQPQ
3P!
Q E\WHVRI([SDQVLRQ0HPRU\ .
3G!
 195$0([SDQVLRQ0HPRU\ RU5$0RUQRQH
3Z!
 ([SDQVLRQ0HPRU\ZULWDEOH
3R!
UHVHUYHGSDUDPHWHU
5HTXHVW7&66WDWXV>'65@ (6&!>Q
7&65HVSRQVH (6&!>Q QRPDOIXQFWLRQ
(6&!>Q PDOIXQFWLRQ
5HPRWH6HOI7HVW&RPPDQGV
&RQWLQXRXV,QWHJULW\7HVW^)&O7` (6&!>3V!\
3V!
RPLWWHG 7RXFK3DQHO&ORVXUH7HVW

B-20
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
5HPRWH6HOI7HVW&RPPDQGV
5HTXHVW5207HVW5HSRUW^)5575` (6&!>!Q
7&65HVSRQVH (6&!>!3ORRSV!3IDLO!3VXP!Q
3ORRSV!
1XPEHURI520FKHFNVXPWHVWVFRPSOHWHGVLQFHWKH&RQWLQXRXV,QWHJULW\
7HVWVWDUWHGRUVLQFHODVWSRZHUXSRUUHVHW
3IDLO!
1XPEHURI520FKHFNVXPWHVWVGHWHFWLQJDIDLOXUHVLQFHWKH&RQWLQXRXV
,QWHJULW\7HVWZDVVWDUWHGRUODVWSRZHUXSRUUHVHW
3VXP!
'HFLPDOHTXLYDOHQWRIODVWIDLOHGFKHFNVXP
,IQRHUURUVGHWHFWHG
5HTXHVW1RQYRODWLOH0HPRU\7HVW (6&!>!Q
5HSRUW^)5(75`
7&65HVSRQVH (6&!>!3ORRSV!3IDLO!3VXP!Q
3ORRSV!
1XPEHURIQRQYRODWLOHPHPRU\FKHFNVXPWHVWVFRPSOHWHGVLQFHWKH
&RQWLQXRXV,QWHJULW\7HVWVWDUWHGRUVLQFHODVWSRZHUXSRUUHVHW
3IDLO!
1XPEHURIQRQYRODWLOHPHPRU\FKHFNVXPWHVWVGHWHFWLQJDIDLOXUHVLQFHWKH
&RQWLQXRXV,QWHJULW\7HVWZDVVWDUWHGRUODVWSRZHUXSRUUHVHW
3VXP!
'HFLPDOHTXLYDOHQWRIODVWIDLOHGFKHFNVXP
,IQRHUURUVGHWHFWHG
5HTXHVW5$07HVW5HSRUW (6&!>!Q
^)55$75`
7&65HVSRQVH (6&!>!3ORRSV!3IDLO!3DGGU!3HUURU!
3KLVWRU\!Q
3ORRSV!
1XPEHURI5$0WHVWVFRPSOHWHGVLQFHWKH&RQWLQXRXV,QWHJULW\7HVW
VWDUWHGRUVLQFHODVWSRZHUXSRUUHVHW
3IDLO!
1XPEHURI5$0WHVWVGHWHFWLQJDIDLOXUHVLQFHWKH&RQWLQXRXV,QWHJULW\
7HVWZDVVWDUWHGRUODVWSRZHUXSRUUHVHW
3DGGU!

B-21
7DEOH%6XPPDU\RI7&6&RPPDQGV*URXSHG$FFRUGLQJWR5HODWHG)XQFWLRQVFRQWLQXHG
&200$1'01(021,& +26786$*(7&65(63216(
5HPRWH6HOI7HVW&RPPDQGV
7&65HVSRQVH 'HFLPDOHTXLYDOHQWRIWKHODVWIDLOHGDGGUHVV,IQRHUURUVZHUHGHWHFWHG
FRQWLQXHG
3HUURU!
'HFLPDOHTXLYDOHQWRIWKHGDWDYDOXHVHQWWRWKHODVWIDLOHGDGGUHVV
H[FOXVLYH25HGZLWKWKHGDWDYDOXHUHFHLYHGDWWKHODVWIDLOHGDGGUHVV
3KLVWRU\!
'HFLPDOHTXLYDOHQWRIWKHGDWDELWHUURUKLVWRU\DELWZRUGWKDWFRQWDLQV
DORJLFLQHDFKELWSRVLWLRQWKDWKDVQHYHUVKRZQDQHUURUGXULQJDOO5$0
WHVWLQJFRQWDLQVDORJLFLQDQ\ELWSRVLWLRQWKDWKDVFRQWDLQHGDQHUURU
GXULQJ5$0WHVWLQJ
5HTXHVW7RXFK3DQHO7HVW5HSRUW (6&!>!Q
^)5775`
7&65HVSRQVH (6&!>!3ORRSV!3IDLO!3HUURU!Q
3ORRSV!
1XPEHURIWRXFKSDQHOWHVWVFRPSOHWHGVLQFHWKH&RQWLQXRXV,QWHJULW\7HVW
VWDUWHGRUVLQFHODVWSRZHUXSRUUHVHW
3IDLO!
1XPEHURIWRXFKSDQHOWHVWVGHWHFWLQJDIDLOXUHVLQFHWKH&RQWLQXRXV
,QWHJULW\7HVWZDVVWDUWHGRUODVWSRZHUXSRUUHVHW
3HUURU!
'HFLPDOHTXLYDOHQWRIWKHPRVWUHFHQWWRXFKFHOOFORVXUH

B-22
$33(1',;& &86720&+$5$&7(5)2176
,1752'8&7,21
The static character fonts supplied with the TCS (which provide the default contents for the
Standard and Extended Character Sets) can be customized by the designer. This appendix
describes the static character fonts and explains how they can be modified.
NOTE
Many locations within the static character fonts are used for specific purposes by the TCS Setup Screen
and its subscreens. Replacing the static character fonts with custom characters is not recommended
whenever dynamic character fonts can be used instead. Refer to Table C-3.

7KH'LVWLQFWLRQ%HWZHHQ&KDUDFWHU6HWVDQG&KDUDFWHU)RQWV
The TCS has two 128-position character sets, called the Standard and Extended Character Sets.
These two character sets convert incoming codes into displayable characters. For each code
received from the host, there is a corresponding character within one of the two character sets.
The character sets contain data mapped into them from one of four character fonts. The four
character fonts are the Static ASCII Character Font, the Static Special Character Font, and
Dynamic Character Fonts l and 2. At power up or reset, the TCS automatically maps the Static
ASCII Character Font into the Standard Character Set and the Static Special Character Font into
the Extended Character Set. Several commands enable the programmer to map any font into
either of the character sets, to copy any font into either of the dynamic character fonts, and to
down-line load characters into either of the dynamic character fonts.
The static character fonts are stored in TCS firmware and can be changed at the factory only.
NOTE
Only the Static ASCII Character Font and the Static Special Character Font can be changed by
customizing the PROM. Dynamic Character Fonts 1 and 2 can be changed only through TCS
programming.
7DEOH&6WDWLF$6&,,&KDUDFWHU)RQW

Note:
In this table, the value of a
character in hex can be
determined by its row and
column position. The
column number represents
the 16’s digit and the row
number represents the 1’s.
For example, character G is
specified as column 4, row
7. Therefore, the value of
character G is 47 hex.
The shaded characters in
this table show the ASCII
mnemonics for the
respective control codes;
these mnemonics are never
displayed, except in the
Communications Monitor.

* Also the default contents


of the Standard Character
Set and Dynamic Character
Font 1. See Character Sets
and Fonts in Section 5 for
details.
7DEOH&6WDWLF6SHFLDO&KDUDFWHU)RQW

Note:
In this table, the value of a
character in hex can be
determined by its row and
column position. The column
number represents the 1’s. For
example, character ‘a’ is
specified as column A, row B.
Therefore, the value of
character ‘a’ is AB hex.
The shaded characters in
columns 8 and 9 contain
Boxtype characters that can
only be displayed by sending
the Outline A Region
command. The shaded
character at location FF hex is
never displayed, except in the
Communications Monitor.

* Also the default contents of


the Extended Character Set
and Dynamic Character Font
2. See Character Sets and
Fonts in Section 5 for details.
&UHDWLQJ&XVWRP&KDUDFWHUV8VLQJ6RIWZDUHRU)LUPZDUH
It may not be necessary to read further in this appendix if only a few special characters are
needed. The programmer may find it easier to down-line load them into the dynamic character
fonts rather than modify the firmware. The information in this appendix is intended to assist
those who require several special characters, such as an entire alphabet, icons, mathematical
symbols, or corporate logos.
There are several advantages to down-line loading a few special characters rather than
committing them to the firmware:
• Operation within the Setup and Test Screens is unaffected by custom characters placed into
the dynamic fonts.

• The results can be seen as quickly as a program can send them to the TCS. If the appearance
is not what was desired, it is far easier to change a few lines of the program than to upgrade
the ROM and check again.

• Dynamic Character Fonts l and 2 will be preserved after power down because they are stored
in nonvolatile memory.
There are, however, advantages to customizing the static fonts, particularly where several
characters are to be modified:
• There is no software overhead of down-loading characters once the font is in firmware. To
display the new characters, the programmer needs only a chart similar to the one shown later
in this appendix. Custom characters in the character font firmware automatically replace the
normal characters in the static character fonts.

• When creating a many custom characters, down-loading may be more time-consuming and
inefficient. It is best to consult with the programmer before deciding which approach to take.

&+$5$&7(5'(6&5,37,21
The character font in ROM supplied with the TCS contains two character fonts:
• The Static ASCII Character Font, containing 128 characters defined by the American
Standard Code for Information Interchange (ASCII).

• The Static Special Character Font, containing 128 characters including international
characters used by National Replacement Codes (NRC), characters for drawing boxes,
graphics characters, and other common symbols.

• Static ASCII Character Font is located in the lower half (addresses 00 through 7F hex) of the
character font PROM supplied with the TCS, as shown in Table C-l. The Static Special
Character Font is located in the upper half (addresses 80 through FF hex) of the character
font PROM, as shown in Table C-2.
'HVFULSWLRQ2I6WDWLF&KDUDFWHU)RQWV
Together, the two character fonts of the TCS contain 256 characters. Complete descriptions of
the fonts, the standard usage of their characters, and the consequences of changing a character
are shown in Tables C-3 and C-4.
Many locations within the static character fonts are used for specific purposes by the TCS Setup
Screen and its subscreens. Replacing the static character fonts with custom characters is not
recommended whenever dynamic character fonts can be used instead. Refer to Tables C-3 and
C-4.
7DEOH&&RQVHTXHQFHVRI&KDQJLQJWKH6WDWLF$6&,,&KDUDFWHU)RQW3520
&+$5$&7(5 127( 67$1'$5'86$*( &216(48(1&(6,)&+$1*(' 
,1+(;
) O $16,FRQWUROFRGHV1RWGLVSOD\HG 6HYHQELWFRQWUROFRGHVZLOOEH
H[FHSWRQ6WDWLF$6&,,&KDUDFWHU GLVSOD\HGXVLQJFXVWRPFKDUDFWHUV
)RQW7HVWDQG&RPPXQLFDWLRQ ZLWKLQWKH6WDWLF$6&,,&KDUDFWHU)RQW
0RQLWRU 7HVWDQGWKH&RPPXQLFDWLRQ0RQLWRU
  6SDFHFKDUDFWHU 6SDFHFRGHVDQGHUDVXUHRSHUDWLRQV
ZLOOGLVSOD\WKHFXVWRPFKDUDFWHU
(  6WDQGDUGVHWRI$6&,,FKDUDFWHUV $OSKDQXPHULFDQGSXQFWXDWLRQFRGHV
ZLOOGLVSOD\WKHFXVWRPFKDUDFWHU
)  5HVHUYHGE\$16,1RWGLVSOD\HG 7KHFRQWUROFRGHZLOOEHGLVSOD\HGXVLQJ
H[FHSWRQ6WDWLF$6&,,&KDUDFWHU WKHFXVWRPFKDUDFWHUZLWKLQWKH6WDWLF
)RQW7HVWDQG&RPPXQLFDWLRQ $6&,,&KDUDFWHU)RQW7HVWDQGWKH
0RQLWRU &RPPXQLFDWLRQ0RQLWRU
127(6
 &RGHVRYHUO\LQJWKHVHFKDUDFWHUSRVLWLRQVDUHUHVHUYHGE\$16,DVQRQGLVSOD\DEOHFRQWUROV
 7KHVHSRVLWLRQVVKRXOGQRWEHFKDQJHGH[FHSWZLWKFDXWLRQ
 &KDQJHVWRWKH6WDWLF$6&,,&KDUDFWHU)RQWRQO\KDYHWKLVHIIHFWZKHQRSHUDWLQJZLWKLQWKH6HWXS
6FUHHQDQGLWVVXEVFUHHQVRUZKHQWKH6WDWLF$6&,,&KDUDFWHU)RQWLVPDSSHGLQWRWKH6WDQGDUG
&KDUDFWHU6HW
7DEOH&&RQVHTXHQFHVRI&KDQJLQJWKH6WDWLF6SHFLDO&KDUDFWHU)RQW3520
&+$5$&7(5 ,1 127( 67$1'$5'86$*( &216(48(1&(6,)&+$1*(' 
+(;
  %R[W\SH 7RXFKNH\DQGUHJLRQRXWOLQHFRPPDQG
XVHFXVWRPFKDUDFWHUVIRU%R[W\SHO
)  %R[W\SH 7RXFKNH\DQGUHJLRQRXWOLQHFRPPDQG
XVHFXVWRPFKDUDFWHUVIRU%R[W\SH
  %R[W\SH 7RXFKNH\DQGUHJLRQRXWOLQHFRPPDQG
XVHFXVWRPFKDUDFWHUVIRU%R[W\SH
)  %R[W\SH 7RXFKNH\DQGUHJLRQRXWOLQHFRPPDQG
XVHFXVWRPFKDUDFWHUVIRU%R[W\SH
$2  $OORZVVSDFHFKDUDFWHUVSDFHVWREH 6SDFHFRGHV ZKHQWKH([WHQGHG
HDVLO\GLVSOD\HGHYHQZKHQVKLIWHG &KDUDFWHU6HWLVVHOHFWHG GLVSOD\WKH
RXWWRWKHH[WHQGHGFKDUDFWHUVHW FXVWRPFKDUDFWHU
$O  2( RYHUUXQHUURU  &RPPXQLFDWLRQRYHUUXQHUURUVGLVSOD\
WKHFXVWRPFKDUDFWHU
$  %2 EXIIHURYHUIORZHUURU  &RPPXQLFDWLRQEXIIHURYHUIORZHUURUV
GLVSOD\WKHFXVWRPFKDUDFWHU
$&  ,QWHUQDWLRQDOFKDUDFWHUVXVHGIRU 7KH1DWLRQDO5HSODFHPHQW&RGH
15&VXSSRUW FRPPDQGGLVSOD\VWKHFXVWRP
FKDUDFWHUV
&$&'  $UURZFKDUDFWHUV 6HWXS6FUHHQDUURZVZLOOEHUHSODFHG
E\WKHFXVWRPFKDUDFWHUV
&('  $OLJQPHQWSDWWHUQFKDUDFWHUVXVHG $OLJQPHQWSDWWHUQZLOOGLVSOD\WKH
E\WKH6HWXS6FUHHQ FXVWRPFKDUDFWHUV
''  9HUWLFDOEDUFKDUWFKDUDFWHUV 7KH'UDZ%DUIRU%DU&KDUWFRPPDQG
GLVSOD\VFXVWRPFKDUDFWHUVIRUYHUWLFDO
EDUFKDUWV
'(2  +RUL]RQWDOEDUFKDUWFKDUDFWHUV 7KH'UDZ%DUIRU%DU&KDUWFRPPDQG
GLVSOD\VFXVWRPFKDUDFWHUVIRU
KRUL]RQWDOEDUFKDUWV
(O)% 0LVFHOODQHRXVJUDSKLFVFKDUDFWHUV *UDSKLFFRGHVGLVSOD\WKHFXVWRP
FKDUDFWHUV
)&  5HVHUYHG 0D\EHXVHGLQIXWXUHIRUHUURU
UHSRUWLQJ
)'  )( IUDPLQJHUURU  &RPPXQLFDWLRQVIUDPLQJHUURUVGLVSOD\
WKHFXVWRPFKDUDFWHU
)(  3( SDULW\HUURU  &RPPXQLFDWLRQVSDULW\HUURUVGLVSOD\
WKHFXVWRPFKDUDFWHU
7DEOH&&RQVHTXHQFHVRI&KDQJLQJWKH6WDWLF6SHFLDO&KDUDFWHU)RQW3520FRQWLQXHG
))  5HVHUYHGE\$16,1RWGLVSOD\HG 7KHFRGHZLOOEHGLVSOD\HGXVLQJWKH
H[FHSWLQ6WDWLF6SHFLDO&KDUDFWHU FXVWRPFKDUDFWHUZLWKLQWKH6WDWLF
)RQW7HVWDQG&RPPXQLFDWLRQ 6SHFLDO&KDUDFWHU)RQW7HVWDQGWKH
0RQLWRU &RPPXQLFDWLRQ0RQLWRU
127(6
 &RGHVRYHUO\LQJWKHVHFKDUDFWHUSRVLWLRQVDUHUHVHUYHGE\$16,DVQRQGLVSOD\DEOHFRQWUROV
 7KHVHSRVLWLRQV VKRXOG QRWEHFKDQJHGH[FHSWZLWKFDXWLRQ
 6HH7DEOH&IRUGHWDLOV
 7RGHWHUPLQHZKLFKLQWHUQDWLRQDOFKDUDFWHUVDUHXVHGIRUHDFK15&VHHWKHGHVFULSWLRQRQ1DWLRQDO
5HSODFHPHQW&RGHV 15& LQ&KDSWHURIWKLVPDQXDO
 &KDQJHVWRWKH6WDWLF$6&,,&KDUDFWHU)RQWRQO\KDYHWKLVHIIHFWZKHQRSHUDWLQJZLWKLQWKH6HWXS
6FUHHQDQGLWVVXEVFUHHQVRUZKHQWKH6WDWLF$6&,,&KDUDFWHU)RQWLVPDSSHGLQWRWKH6WDQGDUG
&KDUDFWHU6HW

%R[W\SHV
Boxtypes are special characters used to draw boxes or borders on the display. The first 32
positions of the Static Special Character Font contain four complete boxtype patterns. These
boxtypes are used by the Region Commands (see Chapter 6).
Custom borders can be created by changing the data contained in the boxtype locations of the
Static Special Character Font (positions 80 through 9F hex) as shown in Table C-5. The boxtype-
border locations are specifically defined by the software in the TCS. When programming new
boxtype borders, keep the box part locations the same in order to draw the box correctly on the
display.
7DEOH&%R[W\SH&KDUDFWHUV
&+$5$&7(5 ,1+(; %2;3$57
%2;7<3(    

    XSSHUOHIWFRUQHU
    XSSHUVLGH
 $  $ XSSHUULJKWFRUQHU
 %  % ULJKWVLGH
 &  & ORZHUULJKWFRUQHU
 '  ' ORZHUVLGH
 (  ( ORZHUOHIWFRUQHU
 )  ) OHIWVLGH
+2:&+$5$&7(56$5(6725('
Characters displayed on the TCS consist of character cells. A character cell is a portion of the
display 8 pixels wide by 10 pixels high. These pixels are turned on or off by the data contained in
the character set. Since every pixel in each character cell can be displayed, graphic characters can
be easily created.
Sixteen consecutive bytes are reserved for each character. The first byte corresponds to the top
row of dots in a character cell. The tenth byte corresponds to the bottom row. The last six bytes
are not used on the display.
Each byte within a given character contains that character’s equivalent ASCII code in
hexadecimal followed by its byte number within the character cell. The byte number for each
character cell starts at zero (the top row of dots). For example, the third byte (the third row of
dots) for the capital letter H (ASCII 48 hex) is 482.
Figure C-l shows how the capital letter H is encoded.

Address TCS Display Code


in Rom 84218421 Byte
480 00
481 82
482 82
483 82
484 FE
485 82
486 82
487 82
488 00
489 00
48A Not Used XX
48B Not Used XX
48C Not Used XX
48D Not Used XX
48E Not Used XX
48F Not Used XX Note XX = DON’T CARE

)LJXUH&(QFRGLQJWKH/HWWHU+
Each l bit in the character cell corresponds to a displayed dot. Each 0 bit in the character cell is
not displayed. The least significant bit of each character cell byte is in the rightmost position. (In
Figure C-l, each dot represents a “0” in the character cell.)
Character display addressing is shown in Figure C-2, using the capital letter H as an example.
(Again, each dot in the figure represents a “0” in the character cell.) The ASCII code 48 (hex)
corresponds to the letter H. This number is decoded by the TCS, which retrieves the dot pattern
from the character font set memory. The dot pattern is then shown on the TCS display as a set of
dots that form the letter H.
Character’s Start Dot
ASCII Code Address Character Pattern
Decode Font Display
H (48 HEX) 480 Eprom

480 00
481 82
482 82
483 82
484 FE
485 82
486 82
487 82
488 00
489 00
48A Not Used XX

)LJXUH&'LVSOD\&KDUDFWHU$GGUHVVLQJ

&KDUDFWHU6L]HV
The standard ASCII display characters are designed according to the following rules:
• Uppercase characters, numerals, and symbols like the percent and dollar signs, and brackets
and braces are designed within a region 7 pixels high by 7 pixels wide. The bottom of the
character is placed 2 pixels above the bottom of the character cell. The leftmost side of the
character region is justified to the left column of pixels in the character cell.

• Lowercase letters are designed within a region 5 pixels high by 7 pixels wide. The bottom of
the character is placed 2 pixels above the bottom of the character cell. The leftmost side of
the character region is justified to the left column of pixels in the character cell.
• Lowercase letters with descenders have the body of the character 4 pixels high by 7 pixels
wide with a 3-pixel high descender. Letters with descenders extend to the bottom of the
character cell. The leftmost side of the character region is justified to the left column of
pixels in the character cell.

• Lowercase letters with ascenders are designed within a region 7 pixels high by 7 pixels wide.
The bottom of characters with ascenders is placed 2 pixels above the bottom of the character
cell. The leftmost side of the character region is justified to the left column of pixels in the
character cell.
3,;(/'$7$
The following diagrams are for reference to the contents of the Static ASCII and Static Special
Character Fonts. This information can be used to design custom character fonts. The aspect ratio
of the character representations was altered slightly to give a close approximation of the display.
Each character is identified in octal, hexadecimal, and decimal, as shown in the key.
A blank form is included for your convenience to design customer characters.

2FWDO

+H[DGHFLPDO

'HFLPDO
  
Custom Character Pattern Chart

ASCII Code

ASCII Code

ASCII Code

ASCII Code
$33(1',;' ,1&$6(2)',)),&8/7<
,1752'8&7,21
This appendix describes common TCS programming and operating problems. Most topics are
covered in the command reference information, but are restated here because many common
programming difficulties result from incorrect combinations of modes and commands rather than
from simple misuse of a single command.
This appendix also includes a table of all messages that can be displayed in the Operational
Status Window.

6<0372062/87,21&+$57
The following Symptom/Solution Chart contains a list of difficulties that could be experienced
by TCS users. Most trouble reports are caused by errors in using TCS commands, not by
hardware failures. However, if none of the solutions listed here corrects the symptom, contact the
Dynapro Customer Service Group at 1-800-667-0374.
Your TCS will probably never exhibit any of the symptoms shown here. However, to help any
users having difficulties, every effort has been made to include all known failure modes.

NOTE
A soft reset reinitializes all volatile parameters and modes to their default settings and sets all nonvolatile
parameters to their previously saved Setup values. To perform a soft reset, press the RESET touchkey on
the Setup Screen or press Shift/Set Up on the optional keyboard.

CAUTION
A hard reset forces the TCS back to its factory default settings and should only be used as a last
resort when troubleshooting a problem. A hard reset deletes all stored screens and reinitializes the
dynamic character fonts with their default.
A hard reset can be commanded locally by setting the Local/Remote Mode to Local within the Setup
Screen, exiting the Setup Screen, and typing <ESC> l c on the keyboard.

Refer to the Reset command in Chapter 4 for complete information about both soft and hard
resets.

D-1
7DEOH'6\PSWRP6ROXWLRQ&KDUW
6<03720 3266,%/(&$86( 62/87,21 6
&RPPXQLFDWLRQ3UREOHPV
&RPPXQLFDWLRQVHUURUVLQ 7&6DQGKRVWFRPPXQLFDWLRQV &KDQJHFRPPXQLFDWLRQVSDUDPHWHUVIRU
2SHUDWLRQDO6WDWXV:LQGRZ SDUDPHWHUVGRQRWPDWFK 7&6RUKRVW
;21;2))0RGHLVRIIVR7&6FDQQRW (QWHU6HWXS6FUHHQDQGFKDQJH
VWDOOWKHKRVWUHVXOWLQJLQ ;21;2))0RGHWRRQ
FRPPXQLFDWLRQVEXIIHURYHUIORZDQGORVW
25
FRGHV
8VHKDQGVKDNLQJOLQHVIRUIORZFRQWURO
LQVWHDG
7&6XVLQJPXOWLGURSSURWRFROEXWSLQV 'XULQJPXOWLGURSRSHUDWLRQOLQHVVSHFLILF
DQGRIVHULDOFRPPXQLFDWLRQVFRQQHFWRU WR56(RSHUDWLRQVKRXOGQRWEH
DUHVWLOOLQXVH XVHG

%RWKKRVWDQG7&6DUH'7( 'DWD ,QVWDOODQXOOPRGHPFDEOHEHWZHHQWKH


7HUPLQDO(TXLSPHQW  KRVWDQGWKH7&6
0XOWLGURSDGGUHVVRI7&6VHWWR (QWHU6HWXS6FUHHQDQGFKDQJH$GGUHVV
WKURXJKEXWKRVWLVQRWXVLQJ WRQRQH
PXOWLGURSSURWRFRO
+RVWDQG7&6QRW 7&6XVLQJPXOWLGURSSURWRFROEXWQRW 8VH&RPPXQLFDWLRQ0RQLWRUWRYHULI\WKDW
FRPPXQLFDWLQJ1R FRUUHFWO\DGGUHVVHGE\WKHKRVW WKHKRVWLVFRUUHFWO\DGGUHVVLQJWKH7&6
FRPPXQLFDWLRQVHUURUVLQ XVLQJPXOWLGURSSURWRFRO
2SHUDWLRQDO6WDWXV:LQGRZ
25
(QWHU6HWXS6FUHHQDQGFKHFNPXOWLGURS
DGGUHVV
%DXGUDWHXVHGE\WKH7&6GLIIHUV (QWHU6HWXS6FUHHQDQGFKDQJH7&6
GUDVWLFDOO\IURPWKDWLQXVHE\WKHKRVW EDXGUDWH

7&6KDQGVKDNLQJOLQHLPSURSHUO\
FRQQHFWHGVR7&6LVVWDOOHGRUKRVW
KDQGVKDNLQJOLQHLPSURSHUO\FRQQHFWHG
VRKRVWLVVWDOOHG

,QFRUUHFWVHWWLQJRQ'65DQG&76LQ
6HWXS
6HULDOOLQNLQRSHUDWLYH &KHFN&RPPXQLFDWLRQ0RQLWRUWRVHHLI
DQ\FRGHVDUHEHLQJUHFHLYHG
25
&KHFNFRPPXQLFDWLRQVFDEOH

D-2
6\PSWRP6ROXWLRQ&KDUWFRQWLQXHG
6<03720 3266,%/(&$86( 62/87,21 6
&RPPXQLFDWLRQ3UREOHPV
7&6LQFRUUHFWO\LQWHUSUHWV +RVWLVHFKRLQJXVHULQSXWEDFNWRWKH 'LVDEOHHFKRLQJE\WKHKRVWDQGXVHORFDO
KRVWFRPPDQGVGXULQJXVHU 7&6WKHUHE\LQWHUUXSWLQJ DQGFRUUXSWLQJ HFKRLQVWHDG
LQSXW FRQWUROVHTXHQFHVEHLQJVHQWWRWKH7&6
25
6WDOODQGXQVWDOOWKH7&6DURXQGHDFK
JURXSRIFRQWUROVHTXHQFHVVHQWWRWKH
7&6GXULQJXVHULQSXW
7&6RXWSXWFDXVHVHUURURQ 5HSRUWLQJIRUPDWLQFRQVLVWHQWZLWK &KDQJHUHSRUWLQJIRUPDWWREH
KRVW H[SHFWDWLRQVRIKRVW FRPSDWLEOHZLWKKRVW
7&6FDQQRWDV\QFKURQRXVO\VHQGSRZHU 7&6DVVXPHVLWLVQRORQJHUDGGUHVVHG
XSLQWHUUXSWXSRQUHJDLQLQJSRZHUGXULQJ DIWHUUHJDLQLQJSRZHU7&6PXVWEH
PXOWLGURSRSHUDWLRQ UHDGGUHVVHGEHIRUHWKHTXHXHGSRZHUXS
LQWHUUXSWZLOOEHVHQW
3RZHUXSLQWHUUXSWQRW 3RZHU8S,QWHUUXSW0RGHLVUHVHW 6HW3RZHU8S,QWHUUXSW0RGH
JHQHUDWHGE\7&6
5HSRUWLQJIRUPDWGLIIHUVIURPWKDW &KDQJHUHSRUWLQJIRUPDWWRPDWFK
H[SHFWHGE\WKHKRVW UHTXLUHPHQWV
.H\ERDUGGLVFRQQHFWHG 3OXJNH\ERDUGLQ
.H\ERDUG/RFNRXW0RGHVHW 5HVHW.H\ERDUG/RFNRXW0RGH
.H\ERDUGGRHVQ
WZRUN +RVWSURJUDPH[SHFWVLQSXWWRHQGZLWKD (QWHU6HWXS6FUHHQDQGVHW1HZ/LQHWR
OLQHIHHG,)!ZKHQXVHUW\SHV5HWXUQ RQ
+RVWDQG7&6QRWFRPPXQLFDWLQJ 6HHDERYHV\PSWRPV
7RXFK3UREOHPV
7RXFKSDQHOHUURUVLQ 8VHUWRXFKHGWRXFKSDQHOGXULQJWRXFK $YRLGWRXFKLQJWKHWRXFKSDQHOGXULQJ
2SHUDWLRQDO6WDWXV:LQGRZ SDQHOWHVW WRXFKSDQHOWHVWV
7KHKRVWVKRXOGXVHWKH5HDG7RXFKNH\
6WDWXVFRPPDQGZKHQ3ROOHG7RXFK
0RGHLVVHW
3ROOHG7RXFK0RGHLVVHWEXWWKHKRVWLV
25
QRWVHQGLQJWKH5HDG7RXFKNH\6WDWXV
&RPPDQG 5HVHW3ROOHG7RXFK0RGHVR7&6FDQ
VHQGDV\QFKURQRXVWRXFKUHSRUWV

D-3
6\PSWRP6ROXWLRQ&KDUWFRQWLQXHG
6<03720 3266,%/(&$86( 62/87,21 6
7RXFK3UREOHPV
7RXFKNH\VQHYHUVHQG $OOWRXFKNH\VSURJUDPPHGDVGHDG 8VH7RXFKNH\7\SHFRPPDQGWRFKDQJH
WRXFKUHSRUW WRXFKNH\W\SHV
25
(QWHU6HWXS6FUHHQDQGSHUIRUPDVRIW
UHVHW VHH127(DIWHUWDEOH 
7RXFKSDQHOIDLOHGGXULQJWRXFKSDQHO (QWHU6HWXS6FUHHQDQGFKHFN
WHVWDQGZDVDXWRPDWLFDOO\ORFNHGRXWWR 2SHUDWLRQDO6WDWXV:LQGRZIRUWRXFK
DYRLGIORRGLQJKRVWZLWKWRXFKUHSRUWV SDQHOIDLOXUHPHVVDJH
+RVWDQG7&6QRWFRPPXQLFDWLQJ 6HHV\PSWRPVDERYH
5HDG7RXFKNH\6WDWXV 3ROOHG7RXFK0RGHLVUHVHWVRWRXFK 6HW3ROOHG7RXFK0RGHRUDFFHSWWRXFK
FRPPDQGDOZD\VUHWXUQV UHSRUWVDOUHDG\VHQWDV\QFKURQRXVO\ UHSRUWVDV\QFKURQRXVO\LQVWHDGRIXVLQJ
WRXFKNH\QXPEHU]HUR 5HDG7RXFKNH\6WDWXVFRPPDQG
7RXFKNH\VUHSRUWEXWZLWK 5HSRUWLQJIRUPDWKDVEHHQFKDQJHGIURP &KDQJHUHSRUWLQJIRUPDWEDFNWRGHIDXOW
LQFRUUHFWIRUPDW GHIDXOWIRUPDW RUSHUIRUPDKDUGUHVHW
([WHQGHG5HSRUW0RGHLVUHVHWVRWRJJOH ([WHQGHG5HSRUW0RGHPXVWEHVHWIRU
WRXFKNH\VWDWHLVQRWUHSRUWHG WRXFKUHSRUWWRLQFOXGHWRXFKNH\WRJJOH
VWDWH
7RXFKNH\VUHSRUWZLWK &HOOWRXFKHGLVSDUWRIDODUJHUWRXFKNH\ &OHDUWKHWRXFKNH\RUFOHDUDOOWRXFKNH\V
FRUUHFWIRUPDWEXWZURQJ ZKLFKZDVEXLOWVRWRXFKUHSRUWXVHV
QXPEHU QXPEHURIPDVWHUFHOO
&HOOWRXFKHGZDVPHDQWWREHSDUWRID 5HEXLOGWKHWRXFKNH\
ODUJHUWRXFKNH\EXWWRXFKNH\ZDVQHYHU
EXLOWVRWRXFKUHSRUWGRHVQRWXVHPDVWHU
FHOOQXPEHU
$XWRUHSHDWW\SHWRXFKNH\ $XWRUHSHDWUDWHVHWWR]HUR 6HWDXWRUHSHDWUDWHWRGHVLUHGYDOXH
GRHVQRWDXWRUHSHDW XVLQJ$XWR5HSHDW5DWHFRPPDQG

D-4
6\PSWRP6ROXWLRQ&KDUWFRQWLQXHG
6<03720 3266,%/(&$86( 62/87,21 6
'LVSOD\3UREOHPV
6FUHHQGRHVQ
WOLJKW 'LVSOD\DFWLYLW\VDYHGDVRII (QWHU6HWXS6FUHHQDQGFKDQJHGLVSOD\
DFWLYLW\WRRQRUWLPHRXW
&RQFHDODWWULEXWHVHWRYHUWKHHQWLUH (QWHU6HWXS6FUHHQDQGSHUIRUPDVRIW
GLVSOD\ UHVHW VHH127(DIWHUWDEOH 
.H\ERDUG/RFNRXW0RGHVHW 5HVHW.H\ERDUG/RFNRXW0RGHIURPWKH
KRVW
25
8VH6(783EXWWRQ
25
&\FOHSRZHUWRWKH7&6

&DQ
WHQWHU6HWXS6FUHHQ 6HWXS/RFNRXW0RGHVHW 5HVHW6HWXS/RFNRXW0RGHIURPWKHKRVW
25
&\FOHSRZHUWRWKH7&6
6HWXSSDUDPHWHUVGRQ
WJHW &WUO6RU6$9(QRWGRQH (QWHU6HWXS6FUHHQFKDQJHSDUDPHWHUV
VDYHG WRGHVLUHGYDOXHDQG6$9(QHZYDOXHV
1RFXUVRU ,QYLVLEOHFXUVRUVHOHFWHG (QWHU6HWXS6FUHHQDQGFKDQJHFXUVRU
W\SH
&XUVRUZRQ
WPRYHZKHUH &XUVRUFDQQRWOHDYHVFUROOLQJUHJLRQZLWK 8VHDEVROXWHFXUVRUPRYHPHQW
QHHGHG UHODWLYHFXUVRUPRYHPHQWFRPPDQGV FRPPDQG
25
(QODUJHVFUROOLQJUHJLRQWRLQFOXGHFXUVRU
GHVWLQDWLRQ
2ULJLQ0RGHVHWDQGVFUROOLQJUHJLRQ 5HVHW2ULJLQ0RGH
VPDOOHUWKDQHQWLUHVFUHHQ&XUVRUFDQQRW
25
OHDYHVFUROOLQJUHJLRQZKHQRULJLQPRGH
LVVHWHYHQZLWKDEVROXWHFXUVRU (QODUJHVFUROOLQJUHJLRQ
FRPPDQGV
&XUVRUVWRSVRQODVW $XWR:UDS0RGHLVUHVHW (QWHU6HWXS6FUHHQDQGVHW$XWR:UDSWR
FROXPQ RQ

D-5
6\PSWRP6ROXWLRQ&KDUWFRQWLQXHG
6<03720 3266,%/(&$86( 62/87,21 6
'LVSOD\3UREOHPV
$WWULEXWHVFKDQJHHYHQ 1RUPDORSHUDWLRQ'LUHFWO\FRPPDQGHG 6HH12&+$1*($WWULEXWH0RGH
ZKHQ12&+$1*($WWULEXWH DWWULEXWHFKDQJHVDUHXQDIIHFWHGE\ GHVFULSWLRQLQ&KDSWHU
0RGHVHW 12&+$1*($WWULEXWH0RGH
&RQFHDODWWULEXWHVHW 7XUQRIIFRQFHDODWWULEXWHXVLQJ6HW
&KDUDFWHU$WWULEXWHV&RPPDQG
25
(QWHUWKH6HWXS6FUHHQDQGSHUIRUPD
VRIWUHVHW
1HZFKDUDFWHUVQRW $VWRUHGVFUHHQLVVHOHFWHGIRUHGLWLQJ &RS\WKHVWRUHGVFUHHQWRWKH'LVSOD\HG
GLVSOD\HG 6LQFHVWRUHGVFUHHQVDUHLQYLVLEOHQHZ 6FUHHQ
FKDUDFWHUVDUHEHLQJSODFHGGLUHFWO\LQWR
25
DVWRUHGVFUHHQ
6HOHFWWKH'LVSOD\HG6FUHHQ
'\QDPLF&KDUDFWHU)RQWZDVHUDVHGDQG 6HH'RZQ/LQH/RDG&KDUDFWHU)RQW
QHYHUILOOHGZLWKQHZFXVWRPFKDUDFWHUV FRPPDQGLQ&KDSWHU
,QFRUUHFWFKDUDFWHUIRQWPDSSHGLQWR 6HH0DS&KDUDFWHU)RQWFRPPDQGLQ
FKDUDFWHUVHW V  &KDSWHU
,QFRUUHFWFKDUDFWHUV ,QFRUUHFWFKDUDFWHUVHWVHOHFWHG 6HQG6HOHFW&KDUDFWHU6HW&RPPDQGWR
GLVSOD\HG VHOHFWGHVLUHGFKDUDFWHUVHW
1DWLRQDO5HSODFHPHQW&RGHVLVLQXVH (QWHU6HWXS6FUHHQDQGVHW15&WR
QRQH
7&6XVLQJPRUHGDWDELWVWKDQKRVW &KHFNWKDWFRPPXQLFDWLRQVIUDPLQJ
+RVW
VSDULW\ELWLQWHUSUHWHGDVWKGDWDELW IRUPDWXVHGE\7&6PDWFKHVWKDWXVHG
E\7&6 E\KRVW
&KDUDFWHUVRUDWWULEXWHVDUH 2ULJLQ0RGHVHWFRPPDQGVDUHOLPLWHG 5HVHW2ULJLQ0RGH
UHVWULFWHGWRVPDOOHUDUHD ZLWKLQWKHVFUROOLQJUHJLRQ
25
WKDQLQWHQGHG
(QODUJHWKHVFUROOLQJUHJLRQ
'RZQ/LQH/RDGHG &RPPDQGLQFRUUHFWO\IRUPDWWHG 6HH'RZQ/LQH/RDG&KDUDFWHU)RQW
&KDUDFWHU)RQWKDV FRPPDQGLQ&KDSWHU
LQFRUUHFWDSSHDUDQFH
&KDUDFWHUIRQWLQFRUUHFWO\PDSSHGLQWR 6HH0DS&KDUDFWHU)RQWFRPPDQGLQ
FKDUDFWHUVHW V  &KDSWHU

&RORU'LVSOD\3UREOHPV
6FUHHQGRHVQ¶WOLJKW )RUHJURXQGDQGEDFNJURXQGERWKVHWWR 0DNHIRUHJURXQGDQGEDFNJURXQG
EODFN GLIIHUHQWFRORUV$GMXVWFRQWUDVW
&KDUDFWHUVQRWGLVSOD\HG )RUHJURXQGDQGEDFNJURXQGVHWWRVDPH 0DNHIRUHJURXQGDQGEDFNJURXQG
FRORU GLIIHUHQWFRORUV$GMXVWFRQWUDVW

D-6
6\PSWRP6ROXWLRQ&KDUWFRQWLQXHG
6<03720 3266,%/(&$86( 62/87,21 6
'LVSOD\3UREOHPV
&RQFHDOHGFKDUDFWHUV &RQFHDOFRORUGLIIHUHQWWKDQFXUUHQW 0DNHFRQFHDOFRORUDQGEDFNJURXQG
GLVSOD\LQGLIIHUHQWFRORU EDFNJURXQGFRORUZKHQFKDUDFWHUVZLWK FRORUWKHVDPH
WKDQVFUHHQEDFNJURXQG FRQFHDODWWULEXWHDUHGLVSOD\HG
6WRUHG6FUHHQ3UREOHPV
&DQ
WVHOHFWGHOHWH ([SDQVLRQ0HPRU\)XOO (QWHU6HWXS6FUHHQDQGFKHFNIRU
LQLWLDOL]HRUFRS\WRVWRUHG ([SDQVLRQ0HPRU\IXOOHUURULQ
VFUHHQV 2SHUDWLRQDO6WDWXV:LQGRZ7KHQ
VLPSOLI\RUGHOHWHRQHRUPRUHVWRUHG
VFUHHQV
%HIRUH&DOOLQJ)RU6HUYLFH
7&6KDVGHWHFWHGVRPHVRUWRIHUURU (QWHU6HWXS6FUHHQDQGFKHFN
ZKLFKSUHFOXGHVSURSHURSHUDWLRQ 2SHUDWLRQDO6WDWXV:LQGRZIRUHUURU
PHVVDJHV
&DQ
WVROYHSUREOHPRU &RPPXQLFDWLRQEHWZHHQWKH7&6DQG (QWHU&RPPXQLFDWLRQ0RQLWRUDQGYHULI\
QRQHRIWKHDERYH WKHKRVWLVXVLQJLQFRUUHFWIRUPDWRU WKDWFRUUHFWFRPPDQGVHTXHQFHVDQG
V\PSWRPVDSSO\ FRQWDLQVHUURUV IRUPDWDUHEHLQJH[FKDQJHGEHWZHHQWKH
7&6DQGKRVW
$SDUDPHWHURUIXQFWLRQZLWKLQWKH7&6 ,VVXHDVRIWUHVHWWRIRUFH7&6EDFNWR
KDVEHHQVHWWRDYDOXHZKLFKFDXVHVWKH SRZHUXSVWDWH
SUREOHP
25
,VVXHDKDUGUHVHWWRIRUFH7&6EDFNWR
IDFWRU\GHIDXOWVHWWLQJV

D-7
&20021352*5$00,1*352%/(06
The most common programming problems are associated with the following topics:
• Polled Touch Mode / Read Touchkey Status command

• Reporting Format / End Of Line Character

• Origin Mode / Scrolling Region

• NOCHANGE Attribute Mode / Modify Attribute commands

• Conceal Attribute / Modify Attribute commands

• Editing a stored screen with the Select Screen command

• Mapping Character Fonts

• Power-up Interrupt Mode (Multidrop protocol)

• Dead touchkey types

• Inconsistent communication setup between TCS and host


The next few pages explain how to identify and correct problems with each of these.

D-8
,QWHUDFWLRQ%HWZHHQ3ROOHG7RXFK0RGHDQGWKH5HDG7RXFKNH\6WDWXV
&RPPDQG
The host application program can get touch reports from the TCS as follows:
• the TCS can send them spontaneously

• the host can poll the TCS for them


Any given application program should use only one of these methods; Polled Touch Mode
specifies which method will be used. When Polled Touch Mode is set, the TCS holds the first
touch report and discards all subsequent touch reports until polled by the host. The host polls the
TCS by sending the Read Touchkey Status command to retrieve the touch report. When Polled
Touch Mode is reset, touch reports are sent to the host as they occur, and they are not held. If
polled, the TCS would report "0" indicating that no polled touch report is pending.
Problems arise in two circumstances:
1. Polled Touch Mode is set but the application program fails to use the Read Touchkey Status
command to poll the TCS for a touch report.
2. Polled Touch Mode is reset and the application program sends a Read Touchkey Status
command.
In both instances, the touch panel may appear to be dead. In the first case, the host never receives
touch reports because they are never polled for and are never spontaneously sent. In the second
case, touch reports are being sent spontaneously, but are probably ignored by the application
program. Sending a Read Touchkey Status command implies that the programmer wants touch
reports only through polling. In this case, the response to the Read Touchkey Status command
always indicates a touchkey value of zero.

D-9
,QWHUDFWLRQ%HWZHHQ5HSRUWLQJ)RUPDWDQGWKH(QG2I/LQH&KDUDFWHU
The Reporting Format command enables the following three characters to be changed in TCS
reports:
The First Introducer Character (default is <ESC>).
The Second Introducer Character (default is left bracket: [).
The Appended Terminator Character (default is no terminator).
To provide for specific host computer protocols, the Reporting Format command can be used to
redefine the format of reports.
The reporting format interacts with the language used to program applications on the host. For
example in most computer systems, the INPUT statement in BASIC expects inputs to be
terminated with <CR>, 0D Hex. If the appended terminator character has not previously been
defined as <CR>, the program will not process TCS inputs except when the user presses the
RETURN key on the optional keyboard.
Some systems, such as the Fluke 1722A Instrument Controller, permit changing the character
used to indicate End Of Line (EOL) on the RS-232-E interface. For input to be done on a line
basis for each touch report, the TCS reporting format must specify an appended terminator
character that matches the EOL character on the host system.
Another problem can occur when the host system interprets one or both of the introducers as an
EOL character. For example, some VAX/VMS programs use <ESC> (l 8 hex) as a line
terminator. Since <ESC> is also the default first introducer of the TCS, line input is terminated
before any information is received. The information may be read in at the next line input, but the
information will not be synchronous with the event (such as a TCS touch report). The solution is
to redefine the introducer character. In the case of VAX/VMS, change the TCS terminator to any
ASCII character greater than IF Hex.
To be fail-safe, some applications must ensure that touch panel reports can never be duplicated
by keystrokes. By setting the introducers to characters that the keyboard cannot send (such as
extended characters), the host program can be certain that touch reports are not accidentally
simulated at the keyboard.

D-10
,QWHUDFWLRQ%HWZHHQ2ULJLQ0RGHDQG6FUROOLQJ5HJLRQ
The interaction between the setting of the Origin Mode and a Scrolling Region can produce
unexpected results. Note the following points:
• Setting Origin Mode repositions the cursor to row l, column 1 of the current scrolling region.
Resetting Origin Mode repositions the cursor to row 1, column of the entire screen.

• When Origin Mode is set, the scrolling region acts like an independent smaller display.
When Origin Mode is reset, the scrolling region merely specifies which portion of the entire
screen is to scroll.

• Relative cursor movements (such as indexing and line feeds) do not move the cursor out of a
scrolling region, regardless of the setting of the Origin Mode. Absolute cursor positioning
(such as Move Cursor to Absolute Position and Move Cursor to Touchkey) can move the
cursor out of scrolling region, but only when Origin Mode is reset.
The following examples demonstrate some implications:
1. In the simplest case, assume that no scrolling region has been established. In effect, the entire
display area is one large scrolling region. Regardless of the setting of Origin Mode, the
cursor can be moved anywhere in the display.
2. For a slightly more complex case, assume a scrolling region smaller than the entire screen is
set while Origin Mode is reset. The origin remains the upper left corner of the entire screen.
The cursor can be moved anywhere on the entire screen by absolute cursor positioning
commands.

Once the cursor enters the scrolling region, relative cursor movement commands that attempt
to leave the scrolling region stop at the edge of the region. After an absolute cursor
movement command has moved the cursor out of the scrolling region, then relative cursor
commands can move the cursor while it remains outside the region. However, once it crosses
back inside the scrolling region, relative movement commands are once again limited to the
region.
3. Finally, suppose Origin Mode is set while there is no scrolling region. The cursor moves to
the upper left corner (home) of the entire screen. Now create a scrolling region in the middle
of the screen; the cursor repositions to the upper left corner of the scrolling region. It can be
moved at will around the scrolling region, but can never leave, even by an absolute cursor
movement command. While Origin Mode remains set, the scrolling region acts as if it were a
miniature display all its own. All displayed data is restricted to within the region, and line
numbers are relative to the scrolling region.

Commands that specify line 1 now affect the first line of the scrolling region, and the edges
of the region act just like the edges of the screen because display data and cursor movements
are limited to the area within the region. Thus, host programs can treat the scrolling region as
if it were the entire screen without overwriting screen data outside the region.
This last case illustrates the most useful (yet potentially the most troublesome) interaction
between these two TCS functions, the ability to create a scrolling region and the ability to choose
the top of the scrolling region as the origin for absolute cursor movements. To avoid difficulty,
remember:
D-11
• A scrolling region acts like a smaller independent screen when Origin Mode is set.

• Setting Origin Mode moves the cursor to the home position of the current scrolling region.
Lines are numbered relative to the top of the scrolling region.

• Resetting Origin Mode moves the cursor to the home position of the entire screen. Lines are
numbered relative to the top of the entire screen.

D-12
,QWHUDFWLRQ%HWZHHQ12&+$1*($WWULEXWH0RGHDQG$WWULEXWH&RPPDQGV
Confusion can arise from assuming that the NOCHANGE Attribute Mode prohibits changes to
attributes under all circumstances. This is not the case. The purpose of NOCHANGE Attribute
Mode is to prevent commands that indirectly call for attribute changes from having an effect, at
the same time permitting directly commanded attribute changes to occur. NOCHANGE Attribute
Mode permits attributes to be treated in a "field-like" manner rather than being associated with
characters as they are displayed.
For example, the Modify Attributes in a Region command directly calls for changes to attributes.
When the TCS receives this command, the specified attributes change, regardless of the setting
of the NOCHANGE Attribute Mode. However, when the NOCHANGE Attribute Mode is set,
actions which indirectly change displayed attributes are prohibited from changing the attributes
already displayed. An example of such an action occurs if the host sends for display any
characters which normally use the attributes previously determined by the Set Character
Attributes command. In this case, attributes associated with the newly placed characters would
remain unchanged.
To use the NOCHANGE Attribute Mode most effectively, refer to Chapter 5 of this manual,
which includes several other examples. It is important to note that directly commanded attribute
changes are not affected by this command.

D-13
,QWHUDFWLRQ%HWZHHQWKH&RQFHDO$WWULEXWHDQG&RPPDQGVWKDW0RGLI\
$WWULEXWHV
Using the conceal attribute, entire sections of the display can be made to temporarily disappear.
Later, the hidden portion of the display can be made to reappear with its original characters and
associated attributes.
A typical application would use the conceal attribute as follows:
• The host displays information in a region or touchkey.

• Based on some event, the host program causes the now unnecessary information to disappear
temporarily by turning on the conceal attribute for all characters within the region or
touchkey.

• When the original information is required again, the host turns off the conceal attribute for
the characters within the region or touchkey and the original information reappears, complete
with its associated attributes.
When using the conceal attribute, note the following:
• To turn the conceal attribute on or off within a region or touchkey, use the Reverse Character
Attributes in a Region or Reverse Character Attributes in a Touchkey commands rather than
the Modify Character Attributes in a Region or Modify Character Attributes in a Touchkey
commands. The former commands only change the state of the conceal attribute without
affecting the state of any of the other attributes in the region or touchkey. The latter
commands change the state of the conceal attribute and set all other attributes as determined
by the last Select Character Attributes Command. This usually has the effect turning off any
other attributes in the region or touchkey so that when the characters are unconcealed, they
no longer appear with all their previous attributes.

• Whenever the conceal attribute is set, the character at that location and all other attributes
are temporarily suppressed. Areas that were previously highlighted or blinking no longer
appear highlighted or blink once they have been concealed.

• If the conceal attribute is accidentally applied to the entire display, it will appear totally
blank. In addition, if the Set Character Attributes Command was used to set the conceal
attribute, sending characters or otherwise changing the contents of the display will have no
visual affect.

D-14
(GLWLQJD6WRUHG6FUHHQZLWKWKH6HOHFW6FUHHQ&RPPDQG
The Select Screen Command provides a convenient way for the host to select any screen for
editing. Usually, the host selects the Displayed Screen in which case editing changes are visible
as they are made.
Sometimes the host may select a stored screen to be edited. This is a very powerful capability
since a stored screen can be edited invisibly to the user. Even though the host is editing the stored
screen, the user only sees the Displayed Screen which is not changing.
When selecting a stored screen for editing using the Select Screen Command, keep the following
points in mind:
• While a stored screen is selected by the Select Screen Command, all screen-dependent
editing commands sent to the TCS affect only the invisible stored screen. The contents of the
Displayed Screen do not change. Therefore, it may appear that the editing commands are not
taking affect. In fact they are, but the results become visible only when the stored screen is
copied into the Displayed Screen.

• If memory is nearly full and the host is already editing another stored screen which is too
large to be stored , then an Expansion Memory Full error occurs. Unless the host is polling
the TCS using the Request Error Status command or the Error Interrupt Mode is set, the host
will not be aware of the error. Screen-dependent editing commands which follow will not be
sent to the stored screen since the Select Screen Command did not take affect. Instead, the
editing commands affect the previous stored screen which remains selected. To select any
other screen, the stored screen which has become too large must be simplified, or another
stored screen must be deleted to make more room .

NOTE
Expansion Memory refers to the 96K of nonvolatile memory available for Screen and
Dynamic Font Storage.

D-15
0DSSLQJ&KDUDFWHU)RQWV
Any of the four character fonts can be mapped into either the Standard or Extended Character
Sets. This provides a method to rearrange the contents of the character sets or to display custom
characters. The mapping between the character fonts and character sets can vary from screen to
screen (screen-dependent). Whenever a stored screen is copied into the Displayed Screen, the
mapping between the character fonts and the character sets can change automatically to match
that specified by the stored screen.
When using the Down-Line Load Character Font Command to load custom characters into
dynamic character fonts, note the following:
• If either of the dynamic character fonts is currently mapped into the Standard or Extended
Character Set within the Displayed Screen, the display immediately reflects the new contents
of the dynamic character font. If the custom characters were incorrectly specified by the
Down-Line Load Character Font Command, the appearance of the display may become
unreadable since the pixel patterns representing each character change.

• Whenever a stored screen is copied into the Displayed Screen, the character font mapping
may be automatically changed. Normally this is not a problem as the dynamic character fonts
contain default information initialized from the static character fonts or properly down-line
loaded custom characters from the host. However, if the custom characters were incorrectly
specified by the Down-Line Load Character Font Command, the appearance of the display
may become unreadable since the pixel patterns representing each character change.
To restore characters on the display to their default representations, the host could perform any
one of the following steps. They are listed in order of minimal loss of data or programming:
• Use the Map Character Font command to map the Static ASCII Character Font and the Static
Special Character Font into the Standard and Extended Character Sets, respectively.

• Use the Initialize Screen command to reinitialize the Displayed Screen.

• Issue a Soft Reset command.

D-16
,QWHUDFWLRQ%HWZHHQ3RZHU8S,QWHUUXSW0RGHDQG0XOWLGURS3URWRFRO
The Power-Up Interrupt Modes provides a means for the host to be notified automatically
whenever the TCS regains power after an unexpected power loss. When Power-Up Interrupt
Mode is set, the TCS automatically generates an interrupt to the host indicating that power has
just been restored. This allows the host to take suitable actions to restore proper communication
with the user.
When the Multidrop Address is set to anything other than “none” indicating that the TCS and
host are to communicate using the Multidrop Protocol, then the Power-Up Interrupt M may not
operate as expected. When the TCS regains power when it was previously operating using the
Multidrop Protocol, there is no way for the TCS to tell whether it is still addressed by the host.
Even if the TCS knows it was previously addressed, it has no way of knowing how long it has
been without power and whether the host has unaddressed it in favor of another responding TCS.
Therefore, when the TCS regains power, it cannot safely connect its transmitter to the serial link
because it may corrupt communication between the host and another addressed TCS. Instead, the
TCS queues up the power-up interrupt in its output buffer and waits until it is readdressed before
transmitting the interrupt to the host.
For the host to use the Power-Up Interrupt Mode during multidrop operation, it must periodically
readdress the TCS to allow it to send its Power-Up Interrupt in case the TCS just regained power.
A preferred alternative would be to reset Power-Up Interrupt Mode and poll the TCS using the
Request Power Status command.

D-17
,QWHUDFWLRQ%HWZHHQ'HDG7RXFKNH\VDQG7RXFK2SHUDWLRQ
The host can selectively disable touch reporting from touchkeys that do not correspond to touch
targets by programming a touchkey type to be "dead." This simplifies touch report decoding for
the host because the TCS does not generate any touch reports from dead touchkeys.
However, if the Touchkey Type command is incorrectly sent with the dead parameter, especially
if it is applied to the entire touch panel, touch reporting may appear to be defective or Touch
Lockout Mode may seem to be set because no touch reports occur. If it is suspected that the TCS
is not generating touch reports due to dead touchkeys (rather than the other common touch-
related problems described in this appendix), the host could do any of the following steps. They
are listed in order of minimal loss of data or programming:
• Use the Touchkey Type command to set all touchkey types to auto-repeat (the default type).

• Use the Initialize Screen command to reinitialize the Displayed Screen.

• Issue a Soft Reset command.

D-18
,QFRQVLVWHQW&RPPXQLFDWLRQ6HWXS%HWZHHQ+RVWDQG7&6
To make interfacing as trouble-free as possible, the TCS features easily configured
communication parameters. This configurability takes some care to manage. Usually a report in
the Operational Status Window of the Setup Screen provides a tip if there are any problems, but
sometimes the communication link is not properly established, and yet no message appears.
Assume the host is configured to communicate using 7 data bits and ignoring parity. Even though
parity is ignored, the bit is still present, so the host sends and expects to receive 8 bits (7 data bits
+ l parity bit). Setting the TCS to use 8 data bits and no parity does not cause a Framing Error
message, because the framing formats actually do match−they are both set for 8 bits. Neither end
uses parity, so a Parity Error is not reported either. This kind of mistake can be avoided by
having all applications set the host parameters and TCS parameters to exactly match.
Other possible communication problems that generate no messages include:
• Setting multidrop addresses but never using multidrop protocol or hardware

• Not setting multidrop addresses, then trying to use multidrop protocol or hardware

• Using a minimum 3-wire RS-232-E cable and attempting to implement control line
handshaking

• Connecting to the host using a null modem cable when a straight-through cable is required or
vice-versa

• Setting XON/XOFF mode to OFF, then attempting to use software handshaking. (This
eventually could result in a Buffer Overflow error.)

• Setting the TCS for LOCAL operation, then attempting to communicate with it from a
remote host

• Setting a multidrop address but not saving it. If the host program now sends a Soft Reset
command, the address reverts the “none” (default).

D-19
&2002123(5$725352%/(06
6DYLQJ'LVSOD\$FWLYLW\DV2))
Saving the Display Activity parameter as OFF (in the Setup Screen) can be mistaken for TCS
failure when the unit is next powered up or reset and there is no display activity. Anytime the
display is unexplainably dark, and remains so after a brief warm-up period, check the Set Up
Screen first. If the TCS is operating properly, the Setup Screen will always display, regardless of
the setting of Display Activity. However, if any operator lockouts are in effect, the Setup Screen
may not be accessible through the keyboard or the SET UP switch and may require a command
from the host, or power to be cycled.
For example, it is possible for the operator to enter the Setup Screen at power up and save
Display Activity OFF. Then a program sets the Setup Lockout Mode (<ESC> [> 5 h). There will
be no display activity, and attempts to enter the Setup Screen are ignored. If this is suspected to
be the case, first reset the Setup Lockout Mode (<ESC> [ > 5 l), or cycle power. Then try again
to enter the Setup Screen. If there is still no display activity, there may be a hardware failure
within the TCS.
Similarly, if Display Activity is saved as OFF, then the host sends a Keyboard Lockout command
(<ESC>[ 2 h), the keyboard Set Up key will not function. However, in this case, the Setup Screen
is still accessible by way of the rear-panel SET UP switch.

,QFRUUHFWO\6HOHFWLQJ2WKHU6HWXS6FUHHQ3DUDPHWHUV
In addition to Display Activity, any other Setup Screen parameters could be selected incorrectly
by an operator. The Setup Lockout command ensures that Setup parameters are not inadvertently
changed, which could result in errors. When Setup Lockout mode is not used, the operator has
access to all the communication parameters (baud rate, stop bits, and so on), and therefore could
disrupt TCS-host communications. Follow these precautions to ensure this does not occur.
1. Make operators aware of the importance of leaving the Setup Parameters as they are.
2. Use the Setup Lockout Mode command early in all programs.

7RXFKLQJWKH'LVSOD\GXULQJ7UDQVLWLRQ
Touching the display while the TCS is in transition between stored screens or to a new set of
touchkey programming can result in unexpected behavior, specifically:
• If a stored screen is copied to the Displayed Screen while an automatic visual response is in
progress because a press or auto-repeat touchkey is being pressed, the visual response is
prematurely terminated. In the case of auto-repeat touchkeys, auto-repeating is also
terminated.

• When a stored screen is copied to the Displayed Screen and the touch panel is pressed
throughout the transition to the new screen, the user’s finger must be lifted and the touch
panel pressed again for any touch reports to be sent or for responses to occur on the new
screen.
The TCS behaves in a manner consistent with the usual expectations of both the programmer and
the user. It is best to avoid using auto-repeat touchkeys to initiate screen copy operations.

D-20
23(5$7,21$/67$7865(32577$%/(
This table explains the reports that can be displayed in the Operational Status Window of the
Setup Screen. Also shown are the messages that can be communicated to the host via the Request
Error Status command or the Error Interrupt Mode command.
NOTE
The term ’Expansion Memory’ is used in several of the following messages and refers to the 96K of
nonvolatile memory available for Screen and Dynamic Font storage.

OPERATIONAL STATUS REPORT HOST MESSAGE

6HOIWHVWV2.DPRXQW!W\SH!([SDQVLRQ0HPRU\ (6&!>!Q
The TCS has performed all power-up self tests without detecting any errors. The <amount>
and <type> are always set to 96K and nonvolatile RAM.

([SDQVLRQPHPRU\LVYRODWLOH (6&!>!2Q
This message indicates that data was not preserved within Expansion Memory. This normally
occurs the first time the TCS is powered up or the memory is re-initialized from the setup
screen.

5$0WHVWHUURUDWDGGUHVVDGGUHVV!GHYLFH! (6&!>!Q
An error was detected when the TCS was executing its RAM test. In the Operational Status
Report, <address> indicates the address where the failure occurred, and <device> is the
reference designator of the failing device.

1RQYRODWLOHPHPRU\FKHFNVXPHUURUVXP!GHYLFH! (6&!>!Q
When the TCS executed the Nonvolatile Memory Checksum Test or Recall Command,
nonvolatile memory contained an incorrect checksum and the contents have been corrupted. If
this error occurs in the nonvolatile setup memory device, the TCS automatically reverts to the
factory default values.

520FKHFNVXPHUURUVXP!GHYLFH (6&!>!Q
The TCS has detected an invalid checksum within one of the program ROM devices during a
ROM Checksum Test. In the Operational Status Report, <sum> indicates the invalid sum, and
<device> is the reference designator of the failing device.

7RXFKGLVDEOHGWRXFKFORVXUHDWFHOOQXP! (6&!>!Q
7RXFKGLVDEOHGWZRFORVXUHVLQVDPHURZ
The TCS detected one or more touch cells as closed during the Touch Panel test. When this
type of error occurs, the touch panel is automatically disabled (until subsequent reset or
power-up) to avoid flooding the Host with invalid touch reports.

D-21
&RPPXQLFDWLRQVIUDPLQJHUURU (6&!>!Q
The TCS received a code from the host but did not detect a stop bit. The code is lost, and an
FE character is printed in its place. The host interface may not be configured to the proper
framing format (see Communication Commands).

&RPPXQLFDWLRQVRYHUUXQHUURU (6&!>!Q
A code received from the host was overwritten by a subsequent code before it could be
consumed. The code is lost, and an 0E character is printed in its place.

&RPPXQLFDWLRQVSDULW\HUURU (6&!>!Q
The TCS has received a code from the host with incorrect parity. The code is lost, and a ~E
character is printed in its place. The host interface may not be configured to the proper
framing format (see Communication Commands).

&RPPXQLFDWLRQVEXIIHURYHUIORZ (6&!>!Q
One or more codes received from the host overflowed the input buffer and were lost. It may
also indicate that scrolling was locked and local input overflowed the local input buffer. This
would only be the case if Local/Remote Mode was set to Local or if Local Echo was enabled.
When this Report occurs, the codes are lost, and a single B0 character is printed in their place.
The host may not be responding to flow control generated by the TCS. See the discussion on
Host Interface Flow Control in Chapter 2.

([SDQVLRQPHPRU\IXOOHUURU (6&!>!Q
A command cannot be completed properly because optional Expansion Memory is full. The
error can occur whenever a command requires more Expansion Memory than is currently
available. This happens whenever Expansion Memory is full or an attempt is made to
reference a stored screen when there is no Expansion Memory installed. To resolve this error
condition, simplify or delete one or more stored screens.
The following situations can cause Expansion Memory Full errors:
COPY SCREEN
The source or a destination screen does not yet exist, and there is not enough room to create it.
The command prematurely terminates, and the screen that caused the error is not created.
As screens increase in complexity, they require more memory space. If the screen being
copied to becomes so complex that it causes a memory overflow error to occur, the command
prematurely terminates, and the screen is left unchanged.
SELECT SCREEN
The selected screen does not yet exist and there is not enough room to create it. The selected
screen is not created, and the previously selected screen remains selected.
-or
The previously selected screen has increased enough in complexity while being edited that
there is no longer enough room to store it. The previously selected screen remains selected.

D-22
([SDQVLRQPHPRU\XQLQLWLDOL]HGHUURU (6&!>!Q
The TCS has encountered a nonvolatile Expansion Memory device that has never been
programmed or is improperly programmed for the current configuration.
An Expansion Memory Uninitialized error can only occur during power-up or reset when the
TCS reads the Expansion Memory configuration and performs automatic self-tests. During
normal operation, the error should never occur following a Reset command.

D-23

S-ar putea să vă placă și