Line Service Commands

failure-string

String that is sent to the serial device when a connection fails. If no string is entered, then the string NO CARRIER will be sent.

host

The target host name.

init-string

You can specify additional vmodem commands that will affect how vmodem starts. The following commands are supported: ATQn, ATVn, ATEn, ATS0, AT&Z1, AT&Sn, AT&Rn, AT&Cn, AT&F, ATS2, ATS12, and ATDS1.

See VModem Initialisation Commands in the IOLAN User’s Guide for a more detailed explanation of the support initialisation commands.

mode

Auto mode establishes the connection when the line becomes active. You must supply the AT command or phone number that will start the connection; see Set Vmodem-Phoneon page 89 for the command parameters to set the AT command or phone number.

port

The port number the target host is listening on for messages.

response-delay

The amount of time, in milliseconds, before an AT response is sent to the requesting device. The default is 250 ms.

signals dcd

Controls the state of the DCD signal.

zalways-high = DCD signal will always stay high.

zfollow-connection = DCD signal will be high when an end to end connection is established and low when it is not.

Since the IOLAN does not have a physical DCD pin, you need to re-map the DTR or RTS signal to DCD to have the signal present. (see next option).

signals dtr

You can specify how the DTR signal pin acts during your modem application connection, as itself (DTR), as DCD, or as RI.

signals rts

You can specify how the RTS signal pin acts during your modem application connection, as itself (RTS), as DCD, or as RI.

Line Commands 87

Page 89
Image 89
Perle Systems CSS manual Failure-string, Response-delay, Signals dcd, Signals dtr, Signals rts

CSS specifications

Perle Systems, a well-established provider of networking and IoT solutions, offers the innovative Perle CSS (ClearSky Services) platform, designed to facilitate efficient and secure device management. This powerful solution aims to address the challenges of managing a diverse range of devices connected to the Internet, particularly in enterprise, industrial, and M2M (Machine-to-Machine) environments.

One of the main features of the Perle CSS is its robust device management capabilities. Administrators can remotely monitor, configure, and control devices in real-time. This means that troubleshooting can be conducted without the need for physical access, significantly reducing operational downtime. Additionally, the platform supports bulk provisioning, allowing organizations to onboard multiple devices simultaneously, which streamlines the deployment process.

Another notable feature is its security architecture. Perle Systems has integrated advanced security protocols to ensure the integrity and confidentiality of data transmitted between devices. The use of virtual private networks (VPNs), secure socket layer (SSL) encryption, and secure shell (SSH) protocols ensures that sensitive information remains protected from unauthorized access while in transit.

The Perle CSS also stands out for its compatibility with various communication protocols, including MQTT, RESTful APIs, and others. This interoperability allows organizations to integrate the CSS platform seamlessly with their existing systems, facilitating efficient data exchange and interoperability between different devices and applications.

Moreover, Perle CSS adopts a cloud-based architecture, which provides users with the flexibility to access device information from any location. This cloud integration enhances scalability, allowing businesses to expand their network capabilities without the need for extensive infrastructure investments.

The platform's user-friendly interface simplifies navigation, allowing users to manage devices effectively without requiring extensive technical expertise. With customizable dashboards and real-time analytics, administrators can gain valuable insights into device performance, network status, and usage patterns.

In summary, Perle Systems' CSS offers a comprehensive solution for managing connected devices in a secure and efficient manner. Its key features, including robust device management, advanced security, protocol compatibility, and a cloud-based architecture make it an ideal choice for enterprises looking to enhance their IoT capabilities and streamline operations in an increasingly connected world.