iPump 6420 User’s Manual
3.1.Monitor & Control Interfaces
3.1.1.Compel
The Compel control system is the premiere control method in the iPump 6420. It is the only user control method that can overrule and lock out control from other sources. In particular, it may set the edge devices, the remote iPump6420s, to have their local control disabled. This will not disable all control capability, but it will essentially prevent the local user from changing the unit settings in order to access some other audio programming. Once disabled by Compel, only Compel itself, or a secured user with debugging access, or a unit that has reverted to Local Control
In-channel Compel Control
Compel is the name of the system used for control of most WEGENER products. It is used in a “star”
This Manual cannot discuss Compel to exhaustion. The user is referred to their Compel Manual and associated Informative Bulletins. However, the basic types of Compel commands, their structure and basic applied rules, and their addressing rules may be briefly reviewed herein.
Command Types:
•Grouping commands: Commands that assign a receiver to a logical group, which, in turn, may be used as an address for other commands, including other grouping commands. A more advanced grouping mechanism, the Group Page, may also be employed. While a receiver may be a member of up to 10,000 groups, it may have only one Group Page membership (generally a value between 1 and 255).
•Receiver state commands: Commands that change a receiver setting and whose new value is retained in Compel’s internal database.
•Meta commands that are a special set of the above state commands: These affect the unit’s ability to process control from Compel or other sources. An examples is the Compel LOCK command, which prevents the receivers from executing any other command except the companion UNLOCK command. Another example is the LOCAL CONTROL enable/disable commands. These serve to block the local user from innocently changing critical receiver settings that would directly affect revenue (though they cannot block malicious actions).
•Receiver action commands: Commands that stimulate a receiver to execute a particular function, usually limited in time. It is assumed that the
www.wegener.com |
| Chapter 3, Page 40 |