updated March 18, 2002

DTR Operation: A DTR signal becomes inactive when the system is not ready to receive data (for example, at power-on reset or when its buffer is full).

XON/XOFF Control

XON Definition:

= DC1

(X'11')

XOFF Definition:

= DC3

(X'13')

During XON/XOFF control, the printer transmits an XON every 3 seconds after a power on reset (POR) completes to indicate the printer is ready to receive data. When the first message is received, the printer stops transmitting the XON signal. The printer transmits an XOFF when the RS-232 input buffer is 80% full after which it transmits one XON when the buffer is 20% full.

XON/XOFF Transparent Mode Operation

This is the default mode. See “Message from the Printer” on page 160 for the format of printer to system messages, which include a byte count, status bytes, and optional extended status bytes or user data.

XON and XOFF signals are always transmitted independently and are not inside any part of the message, including the byte count, status bytes, or user data. When a message includes optional user data, the byte count (bytes 1 and 2) can include X'10', X'11', or X'13'. When X'10', X'11', or X'13' occur in transparent XON/XOFF mode, the byte count is bit-exclusive-OR’ed with X'21' and is prefixed by the DLE (X'10') character to become:

Value in Message

Becomes

X'10'X'1031'

X'11'X'1030'

X'13'X'1032'

User data with X'10', X'11', or X'13' is also treated this way in transparent XON/XOFF mode. The byte count is not incremented for such extra characters.

Determining XON/XOFF Control

You can determine whether XON/XOFF control is being used by sending the extended address command and checking the feature byte, bit 3. If this bit is set, the printer is in XON/XOFF mode. (See “Extended Address Command – Request Printer ID” on page 107.

Disabling XON/XOFF Transparent Mode

You can disable transparent XON/XOFF mode as described in “Real-Time Requests” on page 156. When disabled, X'10', X'11', or X'13' can occur within messages. However, because such values are actual count bytes or data bytes and are not XON or XOFF characters (DLE, XON, and XOFF characters do not occur within messages), no transform takes place. The values are not bit-exclusive-OR’ed with X'21' because no transform occurs for such values within messages as it does during transparent XON/XOFF mode. DLE, XON, or XOFF occur only before or after a message.

24SureMark DBCS User’s Guide

Page 48
Image 48
IBM TM7, TI5, TF7, TG5 manual XON/XOFF Control

TI5, TG5, TM7, TF7 specifications

IBM has long been a pioneer in the field of technology and enterprise solutions, consistently delivering innovations that redefine industry standards. In line with this tradition, IBM has unveiled its latest offerings: TF7, TM7, TG5, and TI5. Each of these models is designed to cater to specific needs within the growing arena of data processing and management.

The TF7 system stands out for its remarkable performance and efficiency in managing large datasets. It harnesses AI-driven analytics to provide insights at unprecedented speeds. The architecture is built on IBM’s Power10 technology, which enhances computational power while reducing energy consumption. This model supports a hybrid cloud strategy, making it versatile for organizations looking to integrate on-premise capacities with cloud solutions seamlessly.

On the other hand, the TM7 is geared towards transactional workloads, particularly in industries that demand high availability. With its robust security features and built-in redundancy, the TM7 ensures that transactions are processed reliably even in high-stress scenarios. Moreover, the system employs advanced encryption protocols that safeguard sensitive information, making it an ideal choice for financial institutions handling vast amounts of transactions.

For businesses that prioritize graphics-intensive applications, the TG5 is a game-changer. It comes equipped with powerful GPUs, offering lightning-fast rendering and superior graphic capabilities. The TG5 leverages AI tools for enhanced visualization and modeling, making it suitable for sectors like gaming, animation, and scientific simulations. Its modular architecture allows easy upgrades, enabling users to stay ahead in a rapidly evolving technological landscape.

Lastly, the TI5 model excels in delivering high-velocity data processing. It features IBM’s latest quantum-safe cryptography, ensuring long-term data protection against evolving threats. The TI5 is optimized for Internet of Things (IoT) applications, allowing organizations to process and analyze real-time data from connected devices swiftly. Its scalability makes it perfect for businesses looking to expand their IoT footprint without compromising performance.

In conclusion, IBM’s TF7, TM7, TG5, and TI5 systems exemplify cutting-edge technology tailored to meet diverse industry needs. Each model integrates robust features, advanced security measures, and efficient processing capabilities, ensuring organizations can thrive in an ever-changing digital landscape. Whether for data management, transaction processing, graphics rendering, or IoT applications, these solutions pave the way for a more connected, efficient, and secure future.