Casio PDAs Smartphones IT 2000 User Manual

IT-2000W  
(Windows version)  
Technical Reference  
Manual  
(Version 1.00 )  
April 1998  
Casio Computer Co., Ltd.  
Copyright ©1998. All rights reserved.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Overview  
Notes on Developing Application  
Development Environment  
Development Environment  
Application Development Library  
Simulation Driver  
Program Development Procedure  
141  
142  
143  
143  
143  
144  
145  
8.1  
8.2  
8.3  
8.3.1  
8.3.2  
8.3.3  
8.4  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Preface  
The IT-2000 Technical Reference Manual (hereinafter referred to as this document) is provided to  
assist the user in developing programs to run on the Casio IT-2000 (hereinafter referred to as this  
terminal or IT-2000 or HT). Microsoft C/C++ Ver.7.0 or later, and the manuals supplied with it, is  
required to develop programs for this terminal.  
Read Chapter 1 of this manual in its entirety to understand the features of this terminal.  
Important notices to user  
The information contained in this document may be modified without prior notice.  
Casio Computer Co., Ltd. shall not be liable for any outcome that result from the use of this  
document and the terminal.  
Copyright notice  
The contents of this document are protected by the Copyright Law of Japan.  
This document may not be reproduced or transferred in part or in whole, in any form without  
permission from Casio Computer Co., Ltd.  
Copyright © Casio Computer Co., Ltd. All rights reserved.  
About MS-DOS 6.22  
The MS-DOS copyright is the proprietary of Microsoft Corporation in the United States and is  
protected by the United States Copyright Law and International Treaty provisions.  
The MS-DOS software shall not be modified, reverse-engineered, decompiled, or disassembled. Any  
form of reproduction is also absolutely prohibited.  
About MS-Windows  
The MS-Windows copyright is the proprietary of Microsoft Corporation in the United States and is  
protected by the United States Copyright Law and International Treaty provisions.  
The MS-Windows software shall not be modified, reverse-engineered, decompiled, or disassembled.  
Any form of reproduction is also absolutely prohibited.  
About trademarks  
AT and IBM PC/AT are registered trademarks of International Business Machines  
Corporation in the United States.  
MS, MS-DOS, Microsoft C/C++, Visual C ++, Visual Basic, and MS-Windows are registered  
trademarks of Microsoft Corporation in the United States.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
1. Overview  
1.1 Features of System  
1.1.1 Development Concept  
The IT-2000 is a data collection terminal for business use. After years of refinement Casio  
Computer Co., Ltd. has developed its hand-held type terminals so that they yield high speed and  
a high functionality in comparison to general personal computers. This allows improved efficiency  
in software development.  
It has adopted the IBM PC/AT architecture and incorporated an IBM PC/AT compatible BIOS.  
It uses MS-DOS Ver. 6.22 and MS-Windows for its OS. This has drastically improved the software  
development environment and compatibility to IBM PC/AT family applications.  
The adoption of a power-saving type 32-bit CPU, the Intel 80486GX, allows the terminal to operate  
continuously for eight hours (when the backlight is off).  
1.1.2 Hardware  
Global IBM PC/AT architecture standard is adopted.  
Compact design: 85 (W) x 196 (L) x 30 (H) mm, 430 g (approx.)  
Uses a 32-bit CPU (Intel 80486 GX) for 25 MHz high-speed operation.  
High-resolution (192 x 384 pixels), large-size liquid crystal touch panel.  
Supports various interfaces, including RS-232C (8-pin, 14-pin), IR, and PC card.  
High environmental adaptability: Operation temperature at between -5 and 50 , water splash  
proof capability conforms to the IPxII standard, etc.  
Uses a small-size, large capacity lithium-ion battery pack as the main battery.  
Incorporates a large capacity flash ROM drive as the user drive.  
1.1.3 Software  
MS-DOS Ver. 6.22 and MS-Windows as the operating system.  
IBM PC/AT-compatible BIOS makes it easy to develop user application programs.  
Uses APM 1.1, for advanced low-power consumption capability.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
PC card slot conforms to PCMCIA Release 2.1 supporting various PC cards.  
Implements IrDA 1.1 protocol for high-speed infrared communication.  
System menu makes it easy to maintain the IT-2000 and install user application programs.  
Provides various development support tools including C-language libraries and communication  
utilities for developing business application programs.  
1.1.4 Basic Specifications  
IT-2000  
Architecture  
IBM PC/AT architecture  
External dimensions and weight  
Dimensions  
Weight  
: 85 (W) x 196 (L) x 30 (H) mm  
: 430 g (approx.)  
CPU  
Intel 80486GX(32-bit)  
Memory  
DRAM  
: 4 MB  
F-ROM  
MASK ROM  
BIOS ROM  
: 0/4/8/12/16/24 MB (refer to Chapter 1.1.5)  
: 8 MB, Windows file  
: 1 MB (BIOS section: 256 KB, Drive C image: 768 KB)  
Display and input  
LCD panel  
: 192 x 384 dots (FSTN semi-transparent LCD), with EL  
backlight  
Touch panel  
Interface  
: Analog, 192 x 384 dots  
8-pin  
: RS-232C  
14-pin  
: RS-232C  
IrDA  
PC Card  
: Standards 1.0/1.1  
: PCMCIA Release 2.1  
Power supply  
Main battery  
Sub-battery  
Operating hours  
Backup period  
Environment conditions  
Temperature  
: Lithium-ion battery pack (x 1)  
: Lithium-vanadium battery (x 1), lithium battery (x 1)  
: 8 hours (if backlight off)  
: 2 weeks (approximately)  
: Operation -5 to 50  
: Storage -10 to 55  
Water-splash proof  
: Conforms to IPxII standard  
Software  
BIOS  
: IBM PC/AT compatible  
OS  
: MS-DOS Version 6.22, MS-Windows  
F-ROM  
Basic functions  
: NAND flash file system  
: Suspend/Resume, Auto Power OFF, Auto Backlight OFF,  
Auto Backlight ON/OFF with light intensity detection,  
Auto Power ON with timer/ring signal/detection of  
mounted I/O Box, Battery voltage monitoring function  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
1.1.5 Model Name  
The following IT-2000s of Windows version will be available. For price of each model, please  
consult with your local Casio representative.  
Model  
RAM  
FlashROM  
4 Mbytes  
8 Mbytes  
12 Mbytes  
16 Mbytes  
24 Mbytes  
Total  
8 Mbytes  
12 Mbytes  
16 Mbytes  
20 Mbytes  
28 Mbytes  
Remark  
IT-2000W20  
IT-2000W30  
IT-2000W40  
IT-2000W50  
IT-2000W60  
4 Mbytes  
4 Mbytes  
4 Mbytes  
4 Mbytes  
4 Mbytes  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
1.2 System Configuration  
1.2.1 Hardware Block Diagram  
CPU  
i486GX  
Power switch  
1
MASK ROM  
FLASH ROM  
(DINOR)  
BIOS/DOS  
Battery voltage monitoring sensor  
DRAM  
A/D  
converter  
Temperature sensor  
Illumination sensor  
8-pin  
COM 1  
UART/  
SIR  
Buffer  
Key  
RTC  
Keyboard  
controller  
Analog touch  
panel  
ASIC  
RTC  
IrDA 1.1  
IrDA 1.0  
IrDA  
Driver/Receiver  
COM 2  
RS-232C  
driver  
14-pin  
16550  
BUS  
Controller  
PC card  
PC card slot  
controller  
NAND  
interface  
NAND FLASH  
EL Backlight  
BL controller  
LCTC  
VGA  
controller  
LCD  
Lithium-ion  
battery  
PMU  
PMU  
Primary sub-battery  
Secondary sub-battery  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
1.2.2 Supported Software  
The software used with this terminal can be divided into two categories: the system software that  
includes the BIOS, OS, and device drivers and the user software such as the development tools.  
The system software is stored on the DINOR FLASH ROM (1 MB), and the user software is  
supported from the SDK CD-ROM (version 4.0) supplied by Casio at free of charge. The following  
paragraphs describe the software.  
BIOS  
The BIOS program is stored in the DINOR FLASH ROM. 256 KB of DINOR FLASH ROM is  
allocated specifically as the BIOS storage area.  
The BIOS of this terminal consists of the standard PC/AT BIOS section, PEN BIOS for supporting  
the touch panel, extension BIOS for supporting devices inherent to this terminal, and APM BIOS for  
attain the low-power consumption capability.  
MS-DOS Main Part  
The main part of the MS-DOS Ver. 6.22 is stored in drive (C:).  
In drive (C:) 768 KB of memory area in the DINOR FLASH ROM (1 MB) is allocated. Because of  
the capacity limitation, only the essential MS-DOS files are stored in drive (C:). Therefore, if using  
an MS-DOS file that is not included in the main part, copy it from the Backup CD-ROM (title on  
CD-ROM: MS-DOS version 6.22 Software) to the F-ROM drive (D:) or RAM disk (A:).  
For information about each MS-DOS file refer to an MS-DOS manual, commonly available at book  
stores.  
Device Drivers and System Files  
These files must be loaded via CONFIG.SYS or AUTOEXEC.BAT at boot-up. These files are all  
stored in drive (C:).  
File name  
SYSDRV.SYS  
TIME.SYS  
Storage location  
Basic drive (C:)  
Description  
System driver  
Clock control driver  
PC card driver  
Touch-panel enabler  
ATA card-related data  
RAM disk checker  
Basic drive (C:)  
Basic drive (C:)  
Basic drive (C: )  
Basic drive (C:)  
Basic drive (C:)  
CS.EXE, etc.  
CASIOAPM.COM  
ENDATA.COM  
CKRAMDSK.EXE  
CKRAMDSK.DAT  
CALIB.EXE  
SYSMENU.EXE  
HWWMAN.EXE  
KEYPAD.EXE  
KEYPAD.DAT  
Basic drive (C:)  
Basic drive (C:)  
Basic drive (C:)  
Basic drive (C:)  
Calibration  
System Menu  
Hardware window manager  
Keypad  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
TFORMAT.EXE  
Basic drive (C:)  
F-ROM drive formatter  
Windows Driver  
These drivers are necessary for the Windows to run on IT-2000. Download to F-ROM drive (D: ).  
File name  
VGA_C.DRV  
Storage location  
MASK ROM drive (E: )  
Description  
Display drivers  
VGA_NC.DRV  
PENMOUSE.DRV  
VKD.386  
SDK  
SDK  
SDK  
Mouse driver  
Virtual key driver  
IR communication drivers  
IRDA.DLL  
IRCOMM.DRV  
Utilities  
For information about the utilities refer to Chapter 9 "Utility".  
File name  
WCAL.EXE  
Storage location  
SDK  
Description  
Calendar utility  
WCALC.EXE  
WCLOCK.EXE  
WCHKBATT.EXE  
XY.EXE  
FLINK.EXE  
LCDREV.EXE  
SDK  
SDK  
SDK  
Basic drive (C:)  
Calculator utility  
Clock utility  
Power status indication utility  
XY utility (DOS program)  
FLINK utility (DOS program)  
Reverse video utility  
(DOS program)  
SDK  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Development Tool Libraries  
All the libraries of Windows are provided either as Dynamic Link Library (DLL) or as Visual  
BASIC Custom Control (VBX). To use these libraries, download first to a directory in F-ROM  
drive (D: ). The files, *.LIB and *.H, are needed when you develop an application program.  
File name  
LIBSYSW.LIB  
SYSCALL.DLL  
SYSCALLP.DLL  
SYSLIB.H  
Storage location  
Description  
System library  
SDK  
PADCTRL.VBX  
PADCTRL.H  
LIBOBR.LIB  
OBRLIB.H  
SDK  
SDK  
Keypad library  
OBR library  
OBRLIB.DLL  
LIBYMOD.LIB  
YMODEM.DLL  
YMODEM.H  
FLINK.LIB  
SDK  
SDK  
YMODEM utility library  
FLINK utility library  
FLINK.DLL  
FLINK.H  
COM2KEY.EXE  
Basic driver (C: )  
Basic drive (C:)  
COM > KEY for DEBUG  
(DOS program)  
Switching DOZE mode ON/OFF  
(DOS program)  
PMON.COM  
PMOFF.COM  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1.3 Precautions  
If reading the internal clock with INT21h the significant data should include and be limited to  
the seconds digits. On this terminal the time is read directly from the RTC so that the correct  
time can be attained at any moment, even during extended continuous use. As a result the 1/100  
of a second digit is ignored. (refer to Chapter 7.3 “Clock Control Driver”.)  
To count time, the counter of DOS or the function provided for reading time must be used.  
Time tick count of Windows will be behind 1 second in every 2 minutes.  
If it is necessary to reboot the system from an application, use the dedicated system library.  
However, the reboot operation that uses INT19h of the BIOS I/F does not work.  
Many commercial PC programs use a VGA screen (80 (H) x 25 (V)). If these programs are run  
on this terminal (24 (H) x 24 (V)) part of the message may not be displayed on the screen.  
For example, some of messages displayed by Windows appear partly (left side of the messages  
only) on the screen.  
Writing to a PC card should always be performed by terminating the write action through the  
flash-out process. Otherwise, if system operation is suspended while writing to an SRAM card  
or ATA card, the data on the card may be damaged. To activate this flash-out process use the  
“_dos_commit()” function of Visual C/C++ or Commit Function (68h) of DOS.  
VGA controller is installed in IT-2000. Logically, it can display 16 different colors each in  
single color though only 4 colors at a time are distinguishable. In case of development of  
application program in single color, by having four colors, such as RGB (255,255,255), RGB  
(192,192,192), RGB (128,128,128), RGB (0,0,0), will help you create an easy-to-see  
application program.  
Note:  
If you wish to select a dither color, first display it on the screen to make sure. Due to technical  
reasons the display of the B/W LCD may change to reverse video if an application program  
developed by the user on a PC is executed without modification on this terminal. To restore the  
normal display use the Reverse Video Utility (refer to Chapter 9.8 “Reverse Video Utility”).  
Key input operation is disabled for about one second after the Power has been turned off/on.  
This is not a malfunction. This occurs because the monitoring timer starts operating the moment  
the Power switch is turned on and does not allow any key input for about one second until this  
timer expires. Thus, key input is not possible.  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
If an LB1 event (low main battery voltage) occurs, the alarm buzzer starts sounding and system  
operation is suspended about 10 minutes later. If the alarm buzzer starts sounding, terminate the  
current operation as soon as possible and recharge the main battery.  
This system will not execute an alarm indication to be displayed on the LCD screen for an LB2  
event (low sub-battery voltage) or LB3 event (low SRAM card battery voltage). Therefore, the  
application program side must acquire these alarm status via the system library and display an  
appropriate alarm message on the screen.  
If the volume of the buzzer is set to zero by the System Menu or system library, the LB1 (low  
main battery voltage) alarm will not be heard. Also, other sounds issued by the system will be  
inaudible.  
If the system is booted from a PC card and if a large-size program that resides on the card is  
called from AUTOEXEC.BAT, an error may result. To avoid this problem refer to Chapter 4.2  
“How to Write CONFIG.SYS and AUTOEXEC.BAT".  
The time limits that can be set for the Auto Power OFF (APO) function are 0 minute, 1 minute  
and 30 seconds, 2 minutes and 30 seconds, up to a maximum of 15 minutes and 30 seconds.  
This timer has an error of +/-23 seconds.  
Do not open the battery compartment lid while the power is on. If it is opened accidentally, an  
emergency alarm sounds. In case such the event occurs, close the lid at once.  
When you change the main battery, be sure to switch off the power before opening the lid.  
An SRAM card once formatted with the DT-9000 cannot be used or formatted with IT-2000.  
If the battery pack is installed for the first time after purchase, or if it is installed after the  
IT-2000 unit has not been used for a long period of time, install the battery and wait for  
approximately eight seconds before turning the power on. This must be done because it takes  
approximately eight seconds until sufficient power can be raised for the emergency process.  
And, during this interval the power cannot be turned on even if the Power switch is turned on.  
If the power is turned on for the first time after purchase and there is no installed application,  
the System Menu will always appear. To start up the application, the application must be  
installed first on the IT-2000. (refer to Chapter 8.4.4 “Installation of Application Program” )  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The backlight is turned off by means of the ABO (Auto Backlight OFF) function. However, it  
is turned off 1.3 seconds after the setup time. This is because the system has 1.3 seconds of  
monitoring time before the internal timer is started.  
During the process of loading Windows after boot-up, do not press the Power switch.  
Do not press the Power switch because a processing request is issued before the process handler  
is installed, resulting that the processing following the request can no longer be achieved.  
This terminal cannot avoid encountering the bugs inherent to Windows. If, for example, the File  
Manager is used, dates (such as a date of file creation, etc.) on and after the year of 2000 will  
not be displayed correctly. This is caused by a bug within Windows. However, note that the  
internal clock will operate properly after the year 2000.  
The touch panel calibration program is not supported as part of Windows. Therefore, if  
calibrating the touch panel with Windows, terminate Windows and execute the calibration  
program from the DOS prompt screen, then return to Windows.  
The input process from the touch panel should be designed so that every designation can be  
accepted with a single click. On this terminal a double-click can be ignored.  
For this system, the two display drivers of VGA_C.DRV and VGA_NC.DRV are provided.  
The former will display the mouse cursor and the latter will not display the cursor nor the sand-  
glass cursor.  
While a file in SRAM card is being opened under Windows, the operation of the access to the  
card is aborted if suspend is executed. This will cause INT24 error when the access to the  
SRAM card for writing or closing is continued after the resume. When you use an SRAM card  
under Windows, please be sure to perform the operation steps in sequence of “open write  
close”.  
Do not input “^P” from the DOS prompt. If it is input, “^P” requests DOS to redirect console  
output to printer. However, because the IT-2000 does not have a built-in printer, it will enter  
into wait mode.  
For information about the system library, refer to Chapter 8.6.2, "System Library".  
For information about the low voltage alarm notification function refer to Chapter 2.2.4 "Battery  
Voltage Monitoring Process"  
.
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2. Basic Software  
2.1 Overview  
2.1.1 Software Configuration  
The following diagram shows the software configuration of the IT-2000W.  
Application Program  
LibSYSW.LIB  
LibOBRW.LIB  
LibYMOD.LIB  
FLINK.LIB  
Mouse Event  
PenMouse.drv  
Display Req.  
VGA_NC.drv  
MS-Windows  
OBRLIB.DLL  
YMODEM.DL  
PADCTRL.VBX  
FLINK.DLL  
AT Architecture  
&
LibSYSW.LIB  
IrDA Driver  
ROM BIOS  
SysCall.DLL  
VKD.386  
Handy Terminal Original Hardware & ROM BIOS  
Fig. 2.1  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.1.2 Memory Map  
The memory map of the IT-2000 is as follows.  
Extended Memory  
100000h  
0F0000h  
0E0000h  
0DC000h  
0D8000h  
0C8000h  
0C0000h  
ROM BIOS  
NAND DISK BIOS/VGA BIOS  
Memory Mapped Disk I/F  
PC Card I/F  
EMS Windows 16 KB x 4  
Reserved  
Video Buffer  
128 KB  
0A0000h  
000000h  
System RAM  
640 KB  
Fig. 2.2  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.1.3 Drive Configuration  
The drive configuration differs for each model as described in the following table:  
Drive A:  
RAM disk  
[Read and Write]  
This drive is prepared for use after the RAM disk size is specified from  
the System Menu. The contents of this RAM disk will not be erased  
through a boot process or by pressing the RESET switch.  
Basic drive (DINOR FLASH ROM)  
Drive C:  
[Read Only]  
This drive starts up MS-DOS. The main body of MS-DOS and  
maintenance programs such as the System Menu, etc., are stored in this  
drive.  
Drive D:  
F-ROM drive  
[Read and Write]  
Application programs are stored on this drive. The drive size (storage  
capacity) differs depending on the model.  
Drive E:  
Drive for Windows files  
[Read Only]  
A ROM that stores Windows files is assigned to the drive E.  
This is a reserved drive on IT-2000D models. In this case note that if this  
drive is accessed , an INT24h error will occur.  
Drive for booting up from card  
Drive F:  
[Read Only]  
This read-only drive functions only while a card is being booted.  
For information about the mechanism of booting a card refer to  
Chapter 4.3 “Card Boot”.  
Drive G:  
PC card drive  
[Read and Write]  
This drive is required if the application program accesses the PC card.  
This drive is prepared for use by loading the PC card driver via  
CONFIG.SYS.  
Note:  
The drive letter of each drive is reserved. Therefore, these drive letters are not changed even if the  
RAM disk is not used.  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.2 Basic System Operation  
2.2.1 Overview  
Basic operation of this system on the terminal consists of the suspend/resume process and boot  
process operated by means of the Power switch and RESET switch, as shown in the following  
diagram.  
ON KEY  
OFF STATE  
ON STATE  
Application BOOT  
OFF EVENT  
OFF Process  
RESET SWITCH  
OFF EVENT  
OFF Process  
System Menu BOOT  
ON EVENT  
ON Process  
RESET SWITCH  
System Menu  
SUSPEND  
System Menu BOOT  
STATE  
ON KEY  
INITIAL STATE  
System Menu BOOT  
Fig. 2.3  
During normal operation the system status will move between the ON state and the OFF state,  
shown in the above diagram, by pressing the power key.  
The SUSPEND state is a state from which the previous state can be returned to at any time. The  
process of returning from the SUSPEND state to the ON state is called the resume process.  
The RESET switch is used to either re-start the system or to initiate the System Menu, which is the  
maintenance program. Press this RESET switch to start hardware initialization followed by initiation  
of the System Menu. This process is called the System Menu boot process.  
If an OFF event occurs while the System Menu is operating, the system shifts to the OFF state.  
If the ON key is pressed in the OFF state, the boot process is executed again and an appropriate  
application program will be loaded. This process is called the application boot process.  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
The following table summarizes the power-on processes provided for this terminal.  
System Menu boot  
process  
Always executes CONFIG.SYS and AUTOEXEC.BAT located  
in drive (C:) for starting up the MS-DOS.  
Application boot process Searches for CONFIG.SYS and AUTOEXEC.BAT prepared  
by the user and starts up MS-DOS from the drive where they are  
located.  
Resume process  
Restores the memory conditions that existed before the power  
was turned off and continues operating according to the  
conditions.  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.2.2 Power ON Process  
Overview  
The ON process is provided to make the system ready for use (ON state). The actual process varies  
depending on the settings at that point in time and the last OFF factor (the cause of the OFF action).  
ON factors:  
Pressing the Power switch  
Pressing the RESET switch  
Power ON alarm  
Reception of RING signal  
Mounting on the I/O Box  
OFF factors:  
Pressing the Power switch  
Pressing the RESET switch  
Auto Power OFF (APO)  
Power OFF by software  
Auto Power OFF due to lower battery voltage  
Emergency Power OFF due to lower battery voltage  
Note:  
For more information power OFF factors refer to Chapter 2.2.3 "Power OFF Process".  
This ON process is divided into two processes: the "Resume process" for continuing the previous  
process and the "Boot process" for re-loading MS-DOS. The Boot process can be further broken into  
the "Application boot" and the "System Menu boot" processes.  
Fig. 2.4  
Boot Process  
Application Boot Process  
System Menu Boot Process  
ON Process  
Resume Process  
Application Boot Process  
Searches CONFIG.SYS and AUTOEXEC.BAT files according to the priority given to each  
drive and, if these files are found, sets the drive where these files are located as the current drive.  
(refer to ”Application Boot Process” on the next page).  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
System Menu Boot Process  
Press the RESET switch to set the drive C as the current drive, and load MS-DOS from that  
drive. As a result, the System Menu that includes the maintenance program will be initiated  
(refer to “System Menu Boot Process” on this page).  
Resume Process  
This process restores the conditions that existed before the power was most recently turned off.  
Any application program that was running at that point in time can be continued.  
The contents of the above listed processes will be described in the following sections.  
Application Boot Process  
The application boot process is used to initiate application programs that have been installed in the  
system by the user. The main system will search for CONFIG.SYS and AUTOEXEC.BAT files  
according to the priority given to each of the following drive Gs prior to booting MS-DOS.  
The system assigns the first drive on which they are found as the current drive, and boots MS-DOS  
from it. Consequently, if the CONFIG.SYS and AUTOEXEC.BAT files created by the user are  
located on one drive, MS-DOS will be booted from the drive assigned as the current drive. Under  
factory defaults it is apparent that the CONFIG.SYS and AUTOEXEC.BAT files created by the  
user cannot be found. If this occurs, therefore, the CONFIG.SYS and AUTOEXEC.BAT files  
located in drive C: are selected and the System Menu will be initiated.  
Priority of the drives:  
If the F-ROM drive is installed  
[Card drive (F:)] -> [RAM drive (A:)] -> [F-ROM drive (D:)] -> [Basic drive (C:)]  
If the F-ROM drive is not installed  
[Card drive (E:)] -> [RAM drive (A:)] -> [Basic drive (C:)]  
Note:  
The RAM disk (A:) is valid for use only if the setup is made in the System Menu.  
System Menu Boot Process  
The System Menu boot process is used to initiate the System Menu, which is nothing but a  
maintenance program for this terminal system. The System Menu boot process will be executed only  
if the RESET switch at the rear of the main unit is pressed.  
If, in addition, a power OFF factor is encountered during the execution of the System Menu, the next  
boot process will be the application boot process.  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Note:  
The RESET switch can be used not only for initiating the System Menu but also as the forced  
restart switch when the user application program under development hangs. However, note that  
if the RESET switch is pressed while the disk is being written to, the data may be corrupted.  
Therefore, the RESET switch should be pressed only while the power is off.  
Clock data or information on the RAM disk will not be lost if the RESET switch is pressed.  
Resume Process  
When the power is turned on the resume function resumes system operation under the conditions  
that existed the last time the power was tuned off. Application programs are continued as soon as the  
power is resumed.  
Setup of Resume Process ON/OFF  
The default settings have been made so that every OFF factor encountered during the operation of an  
application program is the objective of the resume process. However, these default setting can be  
modified so that the system reacts differently to OFF factors by means of the system library. For  
example, according to the default settings, pressing the Power switch will suspend and resume the  
execution of an application program. However, it is also possible to simply reboot the system with  
the Power switch without activating the resume function if such a setup is made. However, note that  
this setup is not permanent. The resume process is replaced by the boot process once only right after  
the system library is called.  
.
ON Factors  
Various ON factors used to turn on the system are explained below.  
Pressing the Power switch  
If the Power switch is pressed while the system is off, the system power can be tuned on. When  
the power is turned on the system operation sequence proceeds as described in "Relationship  
between OFF Factors and ON Processes" on page 24.  
Pressing the RESET switch  
Press the RESET switch to turn on the system power. In this case the System Menu will always  
be initiated.  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
This terminal has the Auto Power ON function which automatically starts the system. This Auto  
Power ON function can operate in one of the following three ways:  
Auto Power ON function (only affects the resume process) activated by alarm  
The system power can be turned on (resumed) at the specified time by means of an alarm.  
However, this will not function if the next start-up method is set to the boot process in the system  
library.  
Auto Power ON function activated by the RING signal  
This function can be used if a modem is connected to the 14-pin expansion interface. In this case  
the system power can be turned on by the detection of the RING signal from the modem.  
Remember that Power ON by means of the RING signal is prohibited by default. Execute this  
function using the system library to enable the Power ON function to be activated by the RING  
signal. System operation after the power is turned on follows the sequence described in "  
Relationship between OFF Factors and ON Processes" on this page.  
Auto Power ON activated by mounting on the I/O Box  
The system power can be automatically turned on as soon as this terminal is mounted on the I/O  
Box. However, this function is effective only if power is supplied to the I/O Box. This function is  
enabled by default, however, it can be disabled using the system library. System operation after  
the power is turned on proceeds according to the sequence described in "Relationship between  
OFF Factors and ON Processes".  
Relationship between OFF Factors and ON Processes  
As described in the above overviews, the ON process (the Boot process or Resume process) will run  
differently depending on the last OFF factor (what caused the OFF) and the conditions that existed  
when the power was turned OFF. The following table shows the relationship between the OFF  
factors and the ON processes that take place the next time the power is turned on.  
OFF factor  
Power switch  
Auto Power OFF  
Software OFF  
Low battery voltage  
(LB1)  
If an application is running  
Resume process or application  
boot process (see note below)  
If the System Menu is on  
Application boot process  
Low battery voltage  
(LB0)  
Resume process  
RESET switch pressed  
System menu boot process  
System menu boot process  
Note:  
Depends on whether the resume function is enabled or disabled. With this setup the next boot  
process can be designated as the Application boot process.  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.2.3 Power OFF Process  
Overview  
Turns off the system power. However, the power to all the devices is not turned off and some can be  
used for storing the information required for the next resume operation. This process is called the  
suspend process and the state of the system while off is called the suspend state.  
The suspend process can be divided into two categories: one is the normal suspend process which is  
the usual off method and the other is the critical suspend process to execute the emergency escape  
process for protecting the system from drops or bumps. Either of these suspend processes will be  
selected depending on the OFF factor, as described later.  
Normal Suspend Process  
If the Power switch is held down for more than one second while system is on, the system power  
will be turned off. The process that takes place at this time is the normal suspend process. Before  
this suspend process is executed, the application currently running is informed of the suspend  
request (OFF factor) by the system. Then the system stores the information required for resumption  
and turns off the power.  
Hereinafter the suspend process (or OFF process) refers to the normal suspend process.  
For information about the method used by each application to detect the occurrence of an OFF factor  
(suspend event), refer to Chapter 9.5 “Remaining Battery Voltage Display Utility”.  
Critical Suspend  
This is a suspend process that takes place in an emergency. Since this critical suspend process should  
achieve its escape process with very little power in the system, only essential information can be  
retained.  
The system will not inform the application currently running of the fact that it is critically  
suspended. However, the application will be informed of the fact that it was critically suspended at  
resumption.  
For information about the method used by each application to receive this information, refer to  
Chapter 9.5 “Remaining Battery Voltage Display Utility”.  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
OFF Factors  
The OFF factors refer to various causes that make the system enter the OFF state (suspend state), as  
follows:  
OFF factor  
Description  
Suspend  
Power switch  
System operation can be suspended by holding down the Normal  
Power switch for more than a second. (see note)  
Auto Power OFF  
(APO)  
System operation automatically shifts to the suspend state Normal  
if key or touch panel operation is not performed for a  
specified period of time.  
The duration until Auto Power OFF occurs can be set and  
modified through the System Menu or system library.  
Power OFF by  
Software  
The system can be made to enter the suspend state by  
calling the system library from the application program.  
Normal  
Power OFF due to  
time-out of low  
battery voltage  
(LB1) alarm  
The system will issue an alarm (buzzer) if the remaining Normal  
battery voltage falls below the low main battery voltage  
alarm level. If this occurs, recharge the battery or replace  
it within ten minutes. If the battery is not charged or  
replaced the system automatically shifts to the suspend  
state to protect the data.  
If main battery  
voltage falls to an  
inoperable level  
(LB0)  
If the terminal is used while the LB1 alarm, mentioned Critical  
above, is sounding, the main battery voltage may reach  
the LB0 level. If this occurs the system will execute the  
critical suspend process and forcibly turn off the power.  
Therefore, if the LB1 alarm sounds, recharge or replace  
the battery as soon as possible.  
Power OFF due to  
RESET switch  
pressed  
Press the RESET switch to forcibly turn off the system Restart  
power. If this is attempted to initiate the System Menu, it  
is strongly recommended to complete the application  
running at present then turn off the system power with the  
power switch before hand.  
For more information about LB0 and LB1, refer to Chapter 2.2.4, "Battery Voltage Monitoring  
Process".  
For information about the system library refer to Chapter 8.6.2. “System Library”.  
For information about the System Menu refer to Chapter 3 “System Menu”.  
For information about the method used by each application to acquire a power ON/OFF event, refer  
to Chapter 9.5 “Remaining Battery Voltage Display Utility”.  
Note:  
Hold down the Power switch for more than one second until the power is off. This is done to  
prevent the power from accidentally being turned off by the user. In addition, key input will not  
be enabled for approximately one second after the Power switch has been pressed.  
This occurs because the monitoring timer starts operating the moment the Power switch is  
pressed and does not allow key input for about one second until this timer expires.  
After this interval, key input becomes possible.  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.2.4 Battery Voltage Monitoring Process  
This terminal uses a main battery (lithium-ion battery pack) for driving the main unit, and a primary  
sub-battery (lithium battery) and a secondary sub-battery (lithium-vanadium battery) for backup.  
Application programs can acquire the status of these batteries through the APM BIOS or system  
library. Refer to Chapter 9.5 “Remaining Battery Voltage Display Utility”.  
Battery Operation Scheme  
The following diagram shows how each battery operates within the system.  
Monitors main battery  
Main battery  
voltage (LB1 LB0)  
[A]  
[A](During ON)  
[A] Charge  
Sub-battery  
Monitors  
primary  
sub-battery  
voltage.  
(LB2)  
(During ON)  
SRAM Card  
Monitors  
SRAM card  
voltage. (LB3)  
Secondary sub-battery  
(Rechargeable)  
Primary  
sub-battery  
[A]  
PC Card Slot  
Main circuit  
[C]  
[B]  
Objective devices of backup  
(DRAM, etc.)  
(CPU and controllers, etc.)  
Fig. 2.5  
[A] This is the power supply route where the fully charged main battery is installed.  
While the power is on, the main battery supplies power to all the devices, including the main circuit,  
PC card slot and DRAM, and, at the same time, it charges the secondary sub-battery.  
In the suspend state, it stops the supply of power to the main circuit and PC card, but continues to  
supply power to the DRAM and charge the secondary sub-battery. In this route neither the primary  
nor the secondary sub-batteries are used.  
[B] This is a power supply route operating where the main battery is absent or not fully charged.  
The DRAM is back-upped by the voltage of the secondary sub-battery. The primary sub-battery is  
not used.  
[C] This power supply route operates if the main battery and secondary sub-batteries are not fully  
charged. The DRAM is backed-up by the voltage of the primary sub-battery. If the voltage of this  
primary sub-battery falls below the limit level, an LB2 event occurs.  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Low Voltage Level  
The IT-2000 continuously monitors the voltage of the main battery, the primary sub-battery, and the  
SRAM card battery. This allows an application program to determine through the system library if  
the voltage of each battery reaches a warning level.  
The following table summarizes the low battery voltage warning levels, which application programs  
can acquire through the system library.  
Name  
Abbreviat-  
ion  
Objective  
battery  
Description  
Low main battery  
voltage warning  
level  
LB1  
Main battery Indicates that the main battery voltage has  
reached a limit level that requires a warning to  
be issued. The system sounds the buzzer to  
issue an alarm. If this occurs, the user must  
replace the main battery within ten minutes. If  
the battery is not changed within ten minutes,  
the system automatically executes the suspend  
process.  
Low sub-battery  
voltage warning  
level  
LB2  
LB3  
Sub-battery Indicates that the sub-battery voltage has  
reached a limit level that requires a warning to  
be issued. Since the system does not issue an  
alarm, the application program must execute a  
warning by acquiring the status from the  
system library.  
The sub-battery must be replaced according to  
the procedure described later.  
SRAM card Indicates that the SRAM card battery voltage  
Low SRAM card  
battery voltage  
warning level  
battery  
has reached a limit level that requires a  
warning to be issued. Since the system does  
not issue an alarm, the application program  
side must execute a warning by acquiring the  
status from the system library.  
The SRAM card battery must be replaced  
according to the procedure described later.  
There is also a main battery inoperable level (LB0). This is the status of the main battery when its  
voltage falls below LB1. If this happens, the system executes an emergency power off (critical  
suspend). Therefore, this level is also referred to as the emergency escape process level.  
This status cannot be acquired from the application side, since the system turns off the power as  
soon as the voltage reaches LB0.  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Main Battery Voltage Monitoring  
If the main battery voltage reaches LB1, the system issues a warning buzzer. If this warning buzzer  
sounds, either start recharging the battery or replace it with a fully charged battery as soon as  
possible. If one of these measures is not taken within ten minutes, the system will forcibly turn off  
the power for safety. The following diagram shows the main battery voltage against the time axis.  
Main  
Generate warning buzzer  
Battery  
voltage  
Voltage level to operate.  
(a)  
LB1  
LB0  
Turn the power OFF.  
(b)  
Start recharge.  
(c)  
(e)  
(d)  
Time  
10 minutes  
Fig. 2.6  
(a) If the main battery voltage reaches LB1, the low battery voltage warning alarm sounds.  
(b) Unless the main battery is either replaced or recharged within ten minutes, the system power is  
automatically turned off to protect the data.  
(c) If the main battery voltage falls further and reaches LB0, the system automatically shuts off the  
power to the main unit (critical suspend).  
(d) If the main battery voltage drops below LB0, the main unit power cannot be turned on even if  
the power switch is pressed.  
(e) If the main unit is mounted on the I/O Box or connected to the AC adaptor, charging of the  
battery is initiated and the main battery voltage will gradually increase.  
(f) Once the main battery voltage has been recharged to an operable level, it is possible to turn on  
the power to the main unit.  
For information about the method used to replace the main battery refer to Chapter 2.2.6 “  
How to Replace or Recharge Batteries”.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Sub-battery Voltage Monitoring  
The sub-batteries are used for system backup while the main battery is being replaced. The sub-  
batteries consists of two units: the primary sub-battery (button-type lithium battery) and secondary  
sub-battery (button-type lithium-vanadium battery). The secondary sub-battery is recharged by the  
voltage of the main battery.  
While the fully charged main battery is installed , the entire system is backed-up by the main battery,  
and the secondary sub-battery is charged by the voltage of the main battery. If the main battery is  
removed, the job of system backup shifts to the secondary sub-battery. If the secondary sub-battery  
voltage drops below the required level while the main battery is removed, the backup job shifts to  
the primary sub-battery (refer to “Battery Operation Scheme” on page 27.).  
Application programs are permitted, through the system library, to monitor this primary sub-battery  
voltage and determine if it is lower than the warning level (LB2). However the system side will not  
issue a warning about the low voltage level (LB2) of the primary sub-battery. Therefore, the  
application program must monitor the primary sub-battery voltage via the system library and inform  
the user that it must be replaced.  
For information about the method used to replace the sub-battery refer to Chapter 2.2.6 “How to  
Replace or Recharge Batteries”.  
SRAM Card Battery Voltage Monitoring  
This function monitors the SRAM card battery voltage. Application programs are permitted, through  
the system library, to monitor this voltage and determine if it is lower than the warning level (LB3).  
However, the system side will not issue a warning about the low voltage level (LB3) of the SRAM  
card battery. Therefore, the application program must monitor the SRAM card battery voltage via  
the system library and inform the user that it must be replaced.  
For information about the method used to replace the SRAM card battery refer to Chapter 2.2.6 “  
How to Replace or Recharge Batteries”.  
Acquiring Power Status through APM BIOS  
This terminal has APM 1.1 installed. This makes it possible for application programs to obtain  
information, such as the percentage of battery voltage remaining or the connector status, via the  
APM BIOS. For more information refer to Chapter 9.5 “Remaining Battery Voltage Display  
Utility”.  
Acquiring Power Status through Battery Status Acquisition Utility  
With the battery status acquisition utility the user can be advised of the current remaining voltage of  
the main battery, sub-battery status, or connector status in real time. For more information refer to  
Chapter 9.5 “Remaining Battery Voltage Display Utility”.  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.2.5 Low Consumption Current Process  
This terminal has the APM BIOS installed to provide a low-power consumption capability.  
It works in combination with POWER.EXE from Microsoft Corporation. The low-power  
consumption capability is further enhanced by the use of unique power management functions,  
including Auto Power OFF (APO) function, Auto Backlight OFF (ABO) function, and DOZE/RUN  
transit function.  
Advanced Power Management Process (APM)  
The APM process, which is an interface between the hardware and application programs, has been  
developed by the Intel Corporation and Microsoft Corporation for power control purposes.  
APM consists of four layers. The layers include hardware, APM BIOS, APM Driver, and the  
application, as shown below. With respect to the PC card which is a removable device, the APM  
functions are provided from the specific APM driver (CS_APM.EXE).  
Applications Layer  
OS Layer  
APM-aware Applications  
APM Driver (POWER.EXE)  
APM BIOS  
PC Card APM Driver  
(CS_APM.EXE)  
BIOS Layer  
Hardware Layer  
APM BIOS Controlled Device  
Fig. 2.7  
PC Card (Add-in Device)  
Basically, APM functions in the following two ways:  
APM BIOS, which is in the background, controls the power conditions of each device.  
Applications can call the APM BIOS functions to obtain or control the power conditions.  
An application that uses the APM BIOS function is called an APM-aware Application. If an  
application acquires information related to power conditions via the system library (refer to  
Chapter 8.6.2 “System Library”), APM BIOS is actually called within the system library.  
It is also possible to directly call APM BIOS from applications. For more information refer to  
the APM BIOS manual.  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Auto Power OFF Function (APO)  
This function automatically shifts the system to the OFF state (suspend state) if no event has taken  
place for a specified period of time from the touch panel, the keyboard, COM1, or a file.  
This time interval has been set to one minute by default. It can be modified using the System Menu  
or system library.  
About the activity  
Any access to the touch panel, key, COM1, or file that causes results in Auto Power OFF is  
defined as "an activity", and it is said that "an activity occurs" if one of these devices is accessed.  
In other words, the Auto Power OFF function can be said to have shifted the system to the  
suspend state if no activity has occurred for a specified period of time.  
The term "activity" is also used in the later description of the ABO function, but it has a different  
meaning.  
Activity monitored by APO:  
Touch panel input  
Key input  
Access to files  
Access to COM1  
Auto Backlight OFF Function (ABO)  
This function automatically turns off the backlight if it no access to the touch panel or keys has been  
attempted for a specified period of time. This time interval has been set to twenty seconds by default.  
It can be modified using the System Menu or system library. Touch panel or key sensing is  
performed by the keyboard controller. This keyboard controller not only processes key input or  
touch panel input, but it also simultaneously detects activity while executing various background  
processes. Consequently, the limit value set as the Auto Backlight OFF time will not be accurate  
down to the seconds. The accuracy of this setup value is 10 percent.  
Activity monitored by ABO:  
Touch panel input  
Key input  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DOZE/RUN Transit Function  
On this terminal the system will reduce the clock speed of the built-in CPU if no activity (access to  
the touch panel, keys, COM1, or file) has occurred for a specified period of time (four seconds).  
The state in which the CPU clock speed has been reduced is called the "DOZE state" and the state in  
which the CPU is operating at full speed is called the "RUN state". If an activity occurs in the  
DOZE state, the system returns to the RUN state. The DOZE/RUN transit function automatically  
switches between the DOZE and RUN states.  
Touch panel  
No activity for  
Key  
a specified period  
COM1  
of time  
File access  
RUN  
DOZE  
Full speed  
Low speed  
Touch panel  
Key  
Generation of  
Activity  
COM1  
File access  
Fig. 2.8  
Usually, application programs do not have to anxious about the RUN/DOZE state.  
The user may tolerate the operation speed since the system shifts to the RUN state whenever the user  
attempts an action.  
However, the clock speed is quickly reduced and CPU operation is slow if high-speed processing is  
attempted intentionally or if system operation continues without user action (e.g. in a long  
calculation). In order to avoid this, disable the power management function by means of the system  
library (refer to Chapter 8.6.2 “System Library”.).  
Activity causing RUN/DOZE transition:  
Touch panel input  
Key input  
Access to files  
Access to COM1  
Note:  
If the power management function is disabled by the system library, the Auto Power OFF function  
(APO) is also disabled. This is because both the power management function and Auto Power OFF  
function use the same activity processing routine.  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.2.6 How to Replace or Recharge Batteries  
Replacement of Batteries  
The method used to replace the main battery, sub-battery, and SRAM card battery are explained here  
Failure to observe the correct battery replacement procedure may result in a loss of data. Always  
observe the following steps in battery replacement.  
Main battery replacement  
Hold down the Power switch for more than one second to turn off the main unit power.  
Make sure that two sub-batteries are installed, then open the battery compartment lid.  
Replace the fully charged main battery, the close the battery compartment lid.  
Note:  
Make sure that both sub-batteries are installed. If either of the sub-batteries is not installed, the  
data may be lost.  
Do not open the battery compartment lid while the power is on. If it is opened accidentally, an  
emergency alarm sounds. In case such the event occurs, close the lid at once.  
Sub-battery replacement  
Hold down the Power switch for more than one second to turn off the main unit power.  
Make sure that the fully charged main battery is installed.  
Replace the primary sub-battery (button-type lithium battery) with a new one.  
Note:  
Make sure that the main battery is installed. If the primary sub-battery is removed without  
the main battery being in place, data will be lost.  
The secondary sub-battery (button-type lithium-vanadium battery) does not have to  
be replaced.  
SRAM card battery replacement  
Make a backup of the SRAM card on the F-ROM drive or on some other device.  
Remove the SRAM card from the PC card slot of the main unit.  
Replace the battery of the SRAM card.  
Insert the SRAM card into the PC card slot.  
If the data has been lost, format (refer to Chapter 2.3.6 “PC Card”) the SRAM card then  
restore the data on it from the backup device.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Note:  
The SRAM card is supplied power by the main battery when it is installed in the main unit.  
This means that the SRAM card can be used normally as long as it is in the slot, even if the  
voltage of the card battery is zero.  
In this case, however, the data on the SRAM card will be lost when the card is removed from the  
main unit slot. Since the Casio SRAM card is provided with two batteries, the data will not be  
lost a short while even if one of them is removed. However, it is recommended that the SRAM  
card battery be replaced only after making a backup of the data to avoid accidental loss.  
Main Battery Recharge  
The main battery can be recharged using either of the following methods:  
Recharging with the charger  
According to the "Main battery replacement" procedure described on the previous page, remove  
the main battery and place it on the charger.  
Recharging with the AC adaptor  
While keeping the main battery to be recharged in the main unit, insert the AC adaptor plug in  
the charging jack located on the side of the main unit. This starts the recharging operation.  
Recharging with the I/O Box  
If the main unit is mounted on the I/O Box while the main battery to be recharged is in the main  
unit, the charging operation starts.  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.3 Supported Devices  
2.3.1 Display Unit  
Hardware Configuration  
LCD  
FSTN semi-transparent liquid crystal display  
Resolution  
192 x 384 dots  
Tone  
B/W 16 gray scales (4 gray scales are identifiable)  
Method  
VRAM  
VGA compatible  
512 KB  
RAM for hardware window  
32 KB  
Note:  
With B/W liquid crystal displays the actual display colors will be changed to reverse video.  
About the Display Screen  
Since this terminal has a VGA controller, it can internally control the entire VGA (640 x 480 dots)  
screen. However, only the 192 x 384 dots, which corresponds to the upper left portion of the VGA  
screen, can be displayed.  
Fig. 2.9  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Software Functions  
Standard Video BIOS is supported. This supports the following video modes:  
Mode No  
00h  
Mode Type Characters  
Resolution  
320 x 200  
320 x 200  
640 x 200  
640 x 200  
320 x 200  
320 x 200  
640 x 200  
640 x 350  
320 x 200  
640 x 200  
640 x 350  
640 x 480  
640 x 480  
Colors  
16  
16  
16  
16  
4
4
2
2
16  
16  
16  
2
Memory Segment  
B800h  
Text  
Text  
Text  
Text  
40 x 25  
40 x 25  
80 x 25  
80 x 25  
01h  
02h  
03h  
04h  
05h  
06h  
07h  
0Dh  
0Eh  
10h  
11h  
12h  
B800h  
B800h  
B800h  
B800h  
B800h  
B800h  
B000h  
A000h  
A000h  
A000h  
A000h  
A000h  
Graphics  
Graphics  
Graphics  
Text  
80 x 25  
Graphics  
Graphics  
Graphics  
Graphics  
Graphics  
16  
Hardware Window  
The hardware window provides the superimpose function for the VGA controller.  
With this hardware window a pop-up screen can be displayed without affecting the operation of  
the application program. This hardware window is used in the keypad driver and various utility  
programs.  
Contrast Adjustment  
The contrast of the liquid crystal display automatically compensates for temperature changes.  
The user can adjust the offset value (refer to Chapter 6 “Keyboard Controller”) for the automatically  
adjusted contrast in the following ways.  
Press the 8 key after the Fn key to increase the contrast offset one step.  
Press the 9 key after the Fn key to decrease the contrast offset one step.  
Call the system library to increase/decrease the contrast offset.  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.3.2 EL Backlight  
Overview  
This terminal has the following functions to control the backlight. For more information refer to  
Chapter 6 “Keyboard Controller”.  
Manual Backlight ON/OFF function  
Auto Backlight OFF function (ABO)  
Auto Backlight Control function (ABC)  
Manual Backlight ON/OFF Function  
The backlight can be turned on and off with the following methods.  
Press the 7 key after the Fn key to turn on or off the backlight.  
Call the system library to turn on or off the backlight.  
Auto Backlight OFF Function  
This function automatically turns off the backlight when no key or touch panel input has been  
occurred in the specified period of time. The time interval until the backlight is automatically turned  
off can be set with the System Menu or the system library.  
Auto Backlight Control Function  
This function detects the intensity of ambient light and automatically turns on or off the backlight  
accordingly. This function is set to off by default, however, it can be set to on using the System  
Menu or system library. For more information about the system library refer to Chapter 8.6.2 “  
System Library”.  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.3.3 Touch Panel  
Hardware Configuration  
Method  
Resolution  
: Analog type touch panel  
: 192 x 384 dots  
Software Function  
To enable application programs to acquire touch panel coordinates, the following two pieces of  
software are provided:  
PENMOUSE.COM  
With this PENMOUSE.COM application programs can acquire touch panel input through the  
mouse I/F. (refer to Chapter 7.5 “PenMouse Driver”.)  
KEYPAD.EXE  
With this keypad driver application programs can perform character input through the touch  
panel. However, it cannot be used concurrently with PENMOUSE.COM. (refer to Chapter 7.4  
“Keypad Driver / Hardware Window Manager”.)  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.3.4 Disk  
Types of Disk  
Type  
RAM disk  
Basic drive  
F-ROM disk  
PC card  
Drive name  
Capacity  
A
C
D
0 to 1920 Kbytes  
768 Kbytes  
0, 4, 8, 12, 16 or 24 Mbytes  
SRAM card, ATA card  
G or F  
Note:  
The drive name of the PC card varies for each model. For more information refer to Chapter 2.1.3  
“Drive Configuration”.  
RAM Disk  
Part of the main RAM can be assigned on the RAM disk using System Menu.  
The contents of the RAM disk will not be erased if the power switch is turned on and off, since they  
are backed-up by the main battery and the sub-batteries. The contents of the RAM disk are not  
affected by pressing the RESET switch either. Since this RAM disk permits the use of INT13h, it  
can be used as the built-in fixed disk. Its drive name is A.  
Note:  
Since the RAM disk shares part of the main memory installed in the main unit, a large-RAM disk  
size may affect the operation of application programs.  
Basic Drive  
Part of the DINOR FLASH ROM is used as the basic drive. It cannot be written to.  
Disk capacity : 768 KB  
Since the basic drive supports the INT13h (Read Only) interrupt, it can be used as the built-in fixed  
drive. Its drive name is C.  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
F-ROM Drive  
The F-ROM drive is supported as a disk for which both read and write operations are possible (only  
for models with the F-ROM drive). Various disk capacities are supported for each model:  
Disk capacity: 0 (models without F-ROM), 4M, 8M, 12M, 16M or 24 MB.  
To format the F-ROM drive use the System Menu. For information about the formatting method  
refer to Chapter 3 “System Menu”. In this process the System Menu will call TFORMAT.EXE from  
drive (C:) to format the F-ROM drive.  
For more information about the TFORMAT.EXE operation refer to Appendix A TFORMAT.  
Since this F-ROM drive supports the INT13h interrupt, it can be used as the built-in fixed drive. Its  
drive name is D.  
PC Card Drive  
If either an SRAM card or ATA F-ROM card is inserted in the PC card slot, it can be used as the  
drive G (Drive F for models without the F-ROM drive). If the ATA F-ROM card is inserted in the  
card slot, the system can boot up according to the CONFIG.SYS/AUTOEXEC.BAT files included  
on this card. This start-up method is called "card boot".  
For more information about card boot refer to Chapter 4.3 “Card Boot”.  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.3.5 Serial Communication  
Available Interfaces  
Port  
I/O Address  
Name  
Uses  
Remark  
COM1 3F8h-3FFh  
8-pin serial I/F Connection with a barcode  
reader or PC  
COM2 2F8h-2FFh  
14-pin serial I/F Connection with an  
expansion I/F device  
Can be switched  
via the system  
library.  
IrDA 1.0  
Communication with an I/O  
Box or between two IT2000s  
Modem card  
COM3 3E8h-3EFh (Modem card)  
COM4 2E8h-2EFh IrDA 1.1  
If a modem card is  
used.  
Direct control not  
Communication with an I/O  
Box or between two IT2000s possible  
COM1  
This is a COM port for RS-232C communication. This port can be used after turning on the power to  
the 8-pin serial I/F via the system library. The 8-pin serial I/F is located on the side panel of the main  
unit.  
Pin assignment  
Pin 1. SD  
Pin 2. RD  
Pin 3. RS  
Pin 4. CS  
Pin 5. Vcc  
Pin 6. GND  
Pin 7. ER  
Pin 8. DR  
Fig. 2.10  
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
COM2  
Either the 14-pin serial I/F or IrDA 1.0 can be assigned to this COM2 port depending on the system  
library setup. Both the 14-pin serial I/F and IrDA 1.0 can be used as a normal RS-232C interface. By  
default, the COM2 channel is not assigned to either device. Therefore, always use the system library  
to designate either the 14-pin serial I/F or IrDA, then turn on the power. The 14-pin serial I/F is  
located on the rear of the panel.  
Pin 1. GND  
Pin 2. GND  
Pin 3. N.C.  
Pin 4. SD  
Pin 5. RD  
Pin 6. RS  
Pin 7. ER  
Pin 8. CS  
Pin 9. CI  
Pin 10. DR  
Pin 11. CD  
Pin 12. EXTSW  
Pin 13. VH  
Pin 14. VH  
Pin assignment  
8
1
9
2
10  
3
11  
4
12  
5
13  
6
14  
7
Fig. 2.11  
COM3  
A modem card, if one is inserted in the PC card slot, can be used as the COM3 port.  
(refer to Chapter 2.3.6 “PC Card”.)  
COM4  
The COM4 port is dedicated for IrDA 1.1. It is used internally by the FLINK Utility. Therefore, it  
cannot be directly controlled by application programs.  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.3.6 PC Card  
Hardware Overview  
Standard  
Conforms to PCMCIA Release 2.1  
Register compatibility Has register compatibility with Intel 82365SL Step  
Slot  
1 slot TYPE II  
Power supply  
Card lock switch  
Vcc : 5V (not operable at 3.3V)  
Has a card lock switch  
Recommended PC Cards  
Type  
Model  
SRAM card  
DT-635MC (256 KB)  
DT-636MC (512 KB)  
DT-637MC ( 1 MB)  
DT-9031FMC ( 2.5 MB)  
DT-9032FMC ( 5 MB)  
DT-9033FMC (10 MB)  
DT-9034FMC (20 MB)  
ATA Flash ROM card  
How to Format SRAM Card and ATA F-ROM Card  
To format, call FORMAT.COM in the basic drive (C:). Then, in the DOS prompt screen that  
appears, execute the following command to format the SRAM card or ATA F-ROM card.  
FORMAT.COM can also be called as a child process.  
FORMAT G:  
COM Port of Modem Card  
COM Port  
IRQ  
COM3  
11  
I/O Address  
3E8h to 3EFh  
Notes:  
This port is not applicable for a 3.3V card, CardBus, or a ZV port.  
Neither turn off the power nor remove the card while accessing the card. If this is done, system  
operation becomes unstable.  
Before using each type of PC card the PC card driver should be installed by means of the  
CONFIG.SYS file. For information about the method used to write CONFIG.SYS refer to  
Chapter 4.2 “How to Write CONFIG.SYS and AUTOEXEC.BAT”.  
If the PC card is inserted in the slot and the card is locked, a card recognition sound (buzzer) will  
be issued. Since the card is locked, a short period may be required until the recognition sound is  
actually issued. Therefore, it is necessary to confirm this recognition sound in advance if  
accessing to the card. An error may occur if the card is accessed before the recognition sound is  
issued.  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Card Lock Switch  
The IT-2000 has a card lock switch to prevent accidental removal of the card. Any card can be made  
usable only after it has been inserted in the slot and the switch has been locked properly. However,  
since some types of cards do not allow this card lock switch to be closed, a library routine to disable  
this switch is supported. For more information refer to Chapter 8.6.2 "System Library”.  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2.3.7 Clock Timer  
Clock BIOS  
00h to 07h of the INT1Ah function is compatible with the IBM PC/AT.  
Since INT1Ah can be called in the C language, an alarm operation using the clock can be set with  
the system library.  
Alarm  
If an alarm operation is set using the INT1Ah or system library, it is possible to cause an INT4Ah  
interrupt at the specified time to issue the alarm. Normally a buzzer sounds if an INT4Ah occurs,  
however, the application program side can hook this interrupt and perform its unique alarm process.  
It is also possible to automatically turn on the power at the specified alarm time by means of the  
system library (refer to Chapter 8.6.2 “System Library”).  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.3.8 Buzzer  
This terminal is provided with a buzzer function that is compatible, via an appropriate interface, with  
the IBM PC. The application side can sound this buzzer by controlling the I/O port assigned to 61h.  
It is also possible to modify the sound frequency by controlling channel 2 of the timer.  
For information about the method used to modify the frequency refer to the hardware manual of the  
PC/AT compatible machine.  
Use of Buzzer From the System  
The IT-2000 system uses the buzzer in the following cases:  
At power on (boot).  
If the power is turned off by the Power switch.  
If the PC card is inserted/removed.  
If a key input is accepted (for matrix key and keypad). Enable/disable can be set with the system  
library. (refer to Chapter 8.6.2 “System Library”)  
If the key buffer is full.  
At a low battery voltage (LB1).  
If an alarm interrupt (INT4Ah) occurs.  
When the battery lid is opened while the power is on.  
At a hardware anomaly.  
For calibration and System Menu operation.  
Setting Volume of Buzzer  
The buzzer volume can be set with System Menu or from the system library.  
The volume can be set to one of the four levels: OFF/Small/Medium/Large.  
For more information about System Menu and the system library refer to Chapter 3 “System Menu"  
and Chapter 8.6.2 “System Library” respectively.  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.3.9 Barcode Reader  
Overview  
The IT-2000 supports the following two Casio OBR (Optical Barcode Reader) models:  
DT-9650BCR ( Pen scanner )  
DT-9656BCR ( CCD scanner)  
Connect the OBR to the COM1 (8-pin) port of this terminal, and set up the interface as follows.  
Synchronization  
Baud rate  
Data bit  
Asynchronous  
9600 bps  
8 bits  
Parity bit  
none  
Stop bit  
1 bit  
For communication between the OBR and this terminal use the OBR library. The various settings  
such as an objective readout codes can be set up by transmitting the set up commands from this  
terminal to the OBR.  
Notes:  
The OBR power is controlled by the OBR library function.  
Before connecting the OBR to this terminal, turn off the main power.  
Every OBR can write the current setup values in the EEPROM built into each OBR.  
This ensures that the setup data is retained even when the power is off.  
For more information about the OBR library, refer to Chapter 8.6.4 “OBR Library”.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.3.10 Infrared Communication (IR)  
The infrared communication function of this terminal supports the protocol of IrDA 1.0  
(see note below) and IrDA 1.1 standards. IrDA 1.0 can be used as the COM port for a general  
RS-232C. IrDA 1.1 can provide communication at a maximum rate of 4 Mbps by means of  
the dedicated utility (FLINK utility).  
IrDA 1.0  
Item  
Synchronization  
Baud Rate  
Specification  
Asynchronous  
115.2 Kbps max.  
COM2  
Remark  
Conforms to IrDA1.0  
COM Port  
IrDA 1.1  
Synchronization  
Frame synchronization  
Conforms to IrDA1.1  
(see note below)  
Baud Rate  
COM Port  
4 Mbps max.  
COM4  
Cannot be controlled directly  
from the application.  
Note:  
The distance between the two ports must not be more than 60 cm (or 23.6 inches) apart.  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.3.11 Keys  
Hardware Overview  
Key configuration  
IRQ  
5 (column) x 3 (row) keys  
IRQ1  
Key repeat function  
available  
Simultaneous pressing of multiple keys not available  
Roll-over function  
not available  
Key Layout  
See the following key layout.  
Fn  
0
7
4
1
8
5
2
9
6
3
-
CLR  
Fig. 2.12  
Fn key  
The "Fn" key should be used in combination with the numeric key. Hold down the "Fn" key and  
press a numeric key.  
Fn ->  
0
Function key F10  
Fn -> 1 to 6  
Function key F1 to F6  
Backlight on/off  
Increase the contrast  
Decrease the contrast  
Fn ->  
Fn ->  
Fn ->  
7
8
9
For more information refer to Chapter 6 “Keyboard Controller”.  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2.3.12 Sensors  
The IT-2000 has the following three types of built-in sensors:  
Illumination  
sensor  
Attached to the upper section of this terminal and used to sense the ambient  
light intensity. It is used for the Auto Backlight Control (ABC) function. It  
cannot be controlled directly from the application.  
(For more information about the system library refer to Chapter 6 “Keyboard  
Controller”.)  
Temperature  
sensor  
Attached to the inside of the main unit and used to detect the ambient  
temperature. It is used for Automatic Brightness Adjustment (ABA) of the  
liquid crystal display. It cannot be controlled directly from the application.  
(For more information about the system library refer to Chapter 6 “Keyboard  
Controller”.)  
Battery voltage  
level sensor  
Detects the voltage levels of the main battery, sub-batteries, and card  
battery. It is used by the system to take action against low battery voltges. The  
system manages low voltage through this battery electric potential sensor.  
Applications can acquire the information from this battery voltage level sensor  
via the system library or APM BIOS.  
(Refer to Chapter 2.2.4 “Battery Voltage Monitoring Process”.)  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3. System Menu  
3.1 Overview  
The system menu is a program and used to perform various setups (system clock, contrast of  
liquid crystal display, etc.) and implement (downloading) application programs, all of which  
are necessary to use this terminal.  
To start up the system menu press the reset switch located at the back of the main unit.  
When the reset switch is released a short beep will sound and, after a short while, a screen as  
shown in Fig. 3.1 will appear.  
The calibration (touch panel adjustment) program is initiated first and it must be executed  
before entering to the system menu selection stage. If this terminal is used for the first time or  
if the touch screen is out of line, adjust the touch panel using this calibration program.  
(For information about adjusting the touch panel refer to Chapter 3.9 “Touch Panel Calibration”)  
If the “ 1” key is pressed the system menu will be initiated as shown in Fig. 3.2.  
Fig. 3.1  
Fig. 3.2  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.2 Basic Operation  
In the system menu a common set of key operations are used. The following list shows the  
keys that can be used in the system menu.  
Current Condition  
Line cursor is on  
Key Operation  
Operation Process  
8
2
CLR  
Moves the line selection cursor up one line.  
Moves the line selection cursor down one line.  
Moves the line selection cursor to the upper  
menu area, if it is located in the lower menu area.  
Confirms and executes the currently selected  
menu item.  
RET  
Others  
0 to 9  
RET  
CLR  
Selection of an item or entry of a numeric value.  
Confirms the currently selected execution item.  
Cancels the currently selected execution item.  
If "FILE TRANSFER" or "MAINTENANCE" is selected for the first time after the system  
menu is initiated, the operator is required to enter a password for system security purposes.  
For information about password entry refer to Chapter 3.17 “Password Entry".  
3.3 List of Functions  
Command Screen  
Description  
Switch ON or OFF the key click sound.  
Set volume of buzzer.  
Adjust the brightness of contrast.  
Set the control of auto backlight.  
Set auto power off.  
Adjust the calibration on touch panel.  
Start up the YMODEM utility.  
Start up the FLINK utility.  
Set date and time.  
SYSTEM SETUP  
Key Click Sound  
Buzzer Volume  
LCD Contrast  
Auto Backlight  
Auto Power OFF  
Calibration  
FILE TRANSFER  
(requires password)  
MAINTENANCE  
(requires password)  
Ymodem Batch  
FLINK (IrDA)  
Set Date/Time  
MS-DOS Command Set the command entry mode.  
RAM Disk Size  
Format Disk  
Change the size of RAM DISK.  
Format on user disk.  
Default Setting  
Start up the system initialization.  
EXIT (power off)  
For information about each function in the list above refer to the following pages.  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
3.4 Key Click Sound Setup  
Function  
Sets the key click sound ON and OFF. If it is set to ON, a key click sound is heard when a key  
is pressed or when the keypad is touched. It does not sound if it is set to OFF.  
Fig. 3.3  
Operation  
Select ON/OFF with the “ 0” or “ 1 “ key, then confirm the selection with the “RET” key.  
Key Operation  
0 key  
Function  
Sets the key click sound to OFF.  
1 key  
Sets the key click sound to ON.  
. (decimal) key  
RET key  
CLR key  
Others  
Toggles to ON and OFF of the key click sound.  
Confirms the current setup and exits the current operation.  
Cancels the setup and exits the current operation.  
Invalid.  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.5 Buzzer Volume Setup  
Function  
Sets the volume of the buzzer (beep). One of the four levels (OFF/Small/Medium/Large) can  
be selected.  
Fig. 3.4  
Operation  
Make a selection with a key, “ 0” to “ 3 “, and confirm the selection with the “ RET” key.  
Key Operation  
0 to 3 keys  
. (decimal) key  
RET key  
Function  
Selects the corresponding number.  
Toggles between two selections.  
Confirms the currently selected setup and exits this operation.  
Cancels the currently selected setup and exits this operation.  
Invalid.  
CLR key  
Others  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.6 Contrast Adjustment  
Function  
Adjusts the contrast of the liquid crystal display.  
Fig. 3.5  
Operation  
Press the “8 “ key to increase the contrast or press the “ 2” key to decrease the contrast.  
Press the “ RET” key to confirm the setting.  
Key Operation  
8 key  
Function  
Increase the contrast.  
Decrease the contrast.  
2 key  
RET key  
Confirms the currently selected contrast setup and exits this  
operation.  
CLR key  
Others  
Cancels the currently selected contrast setup.  
Invalid.  
Note:  
Depending on whether the parameters are being modified, the CLR key activates differently.  
For example, if the CLR key is pressed while a parameter is being changed, that parameter  
will be reset to the previous value.  
However, if the CLR key is pressed while no parameter is being changed, the setup process will  
be aborted and exited at that point.  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.7 Auto Backlight Setup  
Function  
Sets the auto backlight control ON or OFF (refer to Chapter 6 “Keyboard Controller").  
Fig. 3.6  
Operation  
Select ON/OFF with the “ 0” or “ 1” key, then confirm the selection with the “RET” key.  
Key Operation  
0 key  
Function  
Turns the auto backlight control to OFF.  
Sets the auto backlight control to ON.  
Toggles to ON and OFF of the auto backlight control.  
Confirms the current setup and exits this operation.  
Cancels the current setup and exits this operation.  
Invalid.  
1 key  
. (decimal) key  
RET key  
CLR key  
Others  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.8 Auto Power OFF Setup  
Function  
Sets the time-out period of the auto power off function (APO) (refer to Chapter 2.2.3 “Power OFF  
Process"). This time-out period is the interval between when no key entry or no entry on the  
touch panel is made and when the power of system is shut off automatically.  
Fig.3.7  
Operation  
Set the APO time out period with the “ 2” or “ 8 “ key, then confirms the setting with the “ RET”  
key.  
Key Operation  
8 key  
Function  
Increase the APO timeout period.  
2 key  
Decrease the APO timeout period. If "DISABLE" appears,  
the APO function is disabled.  
RET key  
CLR key  
Others  
Confirms the current setup and exits this operation.  
Cancels the current setup and exits this operation.  
Invalid.  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.9 Touch Panel Calibration  
Function  
Adjusts the calibration of touch panel. If an inconsistency is noted between the target position and  
the position actually touched on the touch panel, correct it by performing this calibration adjustment.  
Fig. 3.8  
Operation  
Adjustment of the calibration :  
First make sure that the arrow points to  
the center of this with the stylus provided.  
When the buzzer sounds, release the stylus from the touch panel.  
After the in the upper left corner disappears and the arrow moves to the  
in the upper left corner of the screen, then touch  
in the upper  
right corner, touch it in the same way.  
Do the same for the s in the lower left and lower right corners.  
When all four s are touched by the stylus, the touch panel calibration is completed.  
If any improper operation has been done, press the “1” key to perform the touch panel  
calibration again.  
If the “2” key is pressed after the four positions have been touched, the calibration  
adjustment result takes effect and the menu screen is restored.  
If the “ 2 “ key is pressed before finishing on the fourth position, the adjustment process  
performed so far will be canceled.  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Note:  
If an  
mark does not disappear and the arrow does not move to the next position even if the  
mark has been touched by the stylus, an incorrect position was likely touched.  
Touch the correct position.  
Key Operation  
1 key  
Function  
Adjusts the touch panel calibration starting from the beginning.  
Returns to the menu screen.  
2 key  
Others  
Invalid  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.10 YMODEM Utility  
Function  
Used to achieve a file transfer via the COM cable.  
Communication can be established either between an AT-compatible machine (PC) and an  
IT-2000 (main unit), referred to as "PC-to-HT communication". A dedicated 9-pin DSUB-8-pin  
cross-type cable (DT-9689AX) is required to connect both the terminals. This utility does not have  
functions to allow communication between HT and HT. Use the FLINK function for the HT-to-HT  
communication.  
Fig. 3.9  
Fig. 3.10  
Fig. 3.11  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Note:  
When the cable comes off while the communication takes place:  
If the connection cable is accidentally unplugged while communication between the IT-2000 and  
PC is taking place, a communication error results and communication is interrupted. In this case  
the communication software on the PC will display an error message and interrupt  
transmission/reception, however, some data may remain in the transmission buffer. If an attempt  
is made to restart communication in this condition, the XY utility may receive illegal packets,  
hampering normal communication. If this occurs, terminate the communication software on the  
PC side then restart it to restore normal communication.  
About time stamping of files:  
This utility supports the function to exchange time stamp information between the transmitted file  
and received file. The time stamp information to be exchanged will be processed assuming that it  
is Greenwich standard time. In contrast, the time used by the IT-2000 is the local time, and the  
time stamp of IT-2000 files are accordingly controlled based on the local time.  
The XY utility, for file transmission/reception by means of the YMODEM protocol, will convert  
a time stamp in Greenwich standard time to a time stamp in local time, or vice versa. This time  
conversion is achieved according to the environment variable, TZ. In communication between  
two IT-2000 terminals, if, for example, TZ of the transmission side is "JST+5", the time stamp of  
a file to be transmitted will have five hours added. In this case the reception side will create a file  
by subtracting five hours from the time stamp of the received file.If the environment variable TZ  
is not set, this time conversion is not performed.  
The time stamp made at XMODEM communication uses the system time of the reception side.  
Transmission side  
Reception side  
IT-2000(TZ=none)  
IT-2000(TZ=GMT)  
IT-2000(TZ=JST+5)  
IT-2000(TZ=none)  
IT-2000(TZ=GMT)  
IT-  
12:00  
12:00  
12:00  
0
0
+5  
12:00  
12:00  
17:00  
0
0
-5  
12:00  
12:00  
12:00  
2000(TZ=JST+5)  
PC  
IT-  
IT-2000(TZ=JST+5)  
PC  
+5  
?
?
-5  
12:00  
12:00  
17:00  
??:??  
??:??  
(??-5):??  
2000(TZ=JST+5)  
About key input during communication  
Do not press any key during communication, otherwise file transmission/reception may be  
hampered.  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Operations  
(1) SEND FILE TO HT (one file transmission from IT-2000 to IT-2000)  
This function may be available in future (as of now, not available). It is not allowed to use the  
function. If the file transmission between IT-2000s is needed, FLINK utility may be used (refer to  
Chapter 3.11 “FLINK Command”.).  
(2) SEND FILE TO PC (one file transmission from IT-2000 to PC)  
This function is used to copy an optional file from an IT-2000 to PC. To do this, use  
commercial terminal emulation software on the PC side. The destination directory of this  
copy should be specified by the terminal emulation software on the PC side.  
Connect one end of the serial cable (cross-type) to the 8-pin COM port of the IT-2000 and  
connect the other end to the COM port of the PC.  
Select "SEND FILE TO PC" on the transmission side.  
On the PC side initiate the terminal emulation software to prepare for download.  
Select a baud rate of 9600 bps, and specify the YMODEM Batch protocol.  
When the file name input screen appears on the IT-2000 side, specify the transmitted file with  
its full path name (including the drive name), then press the “RET” key.  
Pressing the “RET” key starts file transfer. When the "Normal End" message is displayed, file  
transmission has been completed.  
If the “CLR” key is pressed during file transfer, transfer will be interrupted. It will take about  
10 seconds for communication to completely stop.  
(3) SEND ALL TO HT (transfer all files in the user drive of IT-2000 to IT-2000)  
This function may be available in future (right now, not available). It is not allowed to use the  
function. If the file transmission between IT-2000s is needed, FLINK utility may be used (refer to  
Chapter 3.11 “FLINK Command”.).  
(4) RECEIVE FILES (file reception)  
The function is used to receive one file from the PC. On the PC side commercial terminal emulation  
software can be used. In this operation the copy destination directory cannot be specified.  
Connect one end of the serial cable (cross-type) to the 8-pin COM port of the IT-2000 and  
connect the other end to the COM port of the PC.  
Move the cursor to " RECEIVE FILES ", then press the “ RET” key to prepare for reception.  
Start upload with the terminal emulation software on the PC side.  
Select a baud rate of 9600 bps, and specify the YMODEM Batch protocol.  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
When the "Normal End" message is displayed on the IT-2000 side, file reception has been  
completed. For information about the copy destination directory refer to the following table.  
If the “CLR” key is pressed during communication, file reception will be interrupted. It will  
take about 10 seconds for communication to completely stop.  
The following table shows the possible destination drive/directory for copy purposes.  
FROM drive (D:)  
Installed  
RAM disk (A:)  
Installed  
Not installed  
Copy destination drive/directory  
FROM drive (D:)  
FROM drive (D:)  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.11 FLINK Command  
Function  
Files can be transferred by infrared communication (IR). This can be implemented either as PC-to-  
HT (AT-compatible machine to IT-2000) communication or as HT-to-HT (between two IT-2000  
terminals) communication.  
To perform PC-to-HT communication an I/O Box for IT-2000 and a PC-side communication utility  
"LMWIN.EXE" is required.  
Fig. 3.13  
Fig. 3.12  
Fig.3.14  
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Note:  
If the identical file name exists on the reception side, this command overwrites the existing file.  
At this time, the system does not unconditionally overwrite the existing file but creates a temporary  
file on the reception-side disk and attempts the overwrite after file transmission has been competed.  
This protects file data even if transmission of the file fails.  
Therefore, if the identical file name exists on the reception side, the reception-side disk must have a  
space large enough for the transmitted file. If there is insufficient space, either delete unnecessary  
files in advance on the reception side or use the file delete command (on page 253) to delete them.  
Operation  
SEND FILE to HT (One file transmission from IT-2000 to IT-2000)  
This function is used to copy one file from one IT-2000 to another IT-2000. This file will be copied  
to a destination directory that has a name that is identical to the source directory.  
Place the two IT-2000 units so that their IR windows face each other.  
Select "SEND FILE TO HT" at the transmission side.  
Select "REMOTE SERVER" at the reception side to prepare for reception.  
If the file name input screen appears at the transmission side, specify the transmitted file by its  
full pathname (including the drive name), then press the “ RET” key.  
Press the ”RET” key to start file transfer. If the "Normal End" message is displayed, file  
transmission has been completed.  
Note:  
If the “CLR” key is pressed during file transfer, transfer will be interrupted. It will take about 10  
seconds for communication to completely stop.  
SEND ALL to HT (Transfer of all files in the F-ROM drive of IT-2000 to IT-2000)  
This function is used to mirror-copy the F-ROM drive. All files existing on the F-ROM drive of the  
copy source side are copied to the F-ROM drive of the destination side. Since this process does not  
attempt either file deletion or formatting on the copy destination side, it is necessary to confirm in  
advance that the F-ROM drive of the destination side has sufficient free space.  
Place the two IT-2000 units so that their IrDA interface windows face each other.  
Select "REMOTE SERVER" on the reception side to prepare for reception.  
On the transmission side move the cursor to "SEND ALL TO HT" and press the “ RET” key.  
File transfer begins.  
If the "Normal End" message is displayed, file transmission has been completed.  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Note:  
If the “CLR” key is pressed during file transfer, transfer will be interrupted. It will take about 10  
seconds for communication to completely stop.  
REMOTE SERVER (remote server mode )  
The remote server mode is used by the system which assigns the right of issuing a transmission  
request to the partner side and enters the wait state for a request from the partner.  
To facilitate communication between two IT-2000 terminals, set the reception side to this mode.  
For HT-to-PC communication set the IT-2000 side to this mode and perform the entire operation on  
the PC side.  
Move the cursor to "REMOTE SERVER" and press the “ RET” key.  
If the "Hit Any Key!" message appears, file transmission has been completed.  
Note:  
If the “CLR” key is pressed during file transfer, transfer will be interrupted. It will take about 10  
seconds for communication to completely stop.  
About communication with PC  
To achieve communication between a PC and IT-2000 it is necessary to prepare an I/O Box for  
IT-2000 and PC-side communication utility "LMWIN.EXE (Windows version)". The following  
procedure shows the steps required for communication with a PC.  
Connect the I/O Box and PC using a communication cable. Turn on the power of I/O Box.  
Mount the IT-2000 on the I/O Box.  
Select "REMOTE SERVER" on the IT-2000 side to enter the wait state.  
On the PC side initiate the PC-side communication utility, LMWIN.EXE.  
Operate the PC-side communication utility to perform reception or transmission. For information  
about the operation of the PC-side communication utility refer to the "IT-2000 Upload/Download  
Utility Manual" available separately.  
If the "Hit Any Key!" message appears on the IT-2000 side, file transmission has been  
completed.  
Note:  
If the “CLR” key is pressed during file transfer, the transfer will be interrupted. It will take about 10  
seconds for communication to completely stop.  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.12 System Date/Time Setup  
Function  
This is used to set (modify) the date and time of the built-in timer in the IT-2000 unit.  
Fig. 3.15  
Operation  
Enter in the following order: year -> month -> day -> hour -> minute. Press a numeric key and the  
corresponding number will appear in the cursor position. Press the “ RET” key to advance to the  
next setting. If the “RET” key is pressed without making a numeric entry, the cursor will advance to  
the next setting without affecting the previous value. If the “ RET” key is pressed when the cursor is  
positioned on the minute setting, the current setup is confirmed.  
Note that the seconds can not be specifically set. When the date and time is modified, the seconds  
will be set to 0. The year can be set to between 1980 and 2099. If the entered value includes an  
invalid number, the setup operation will result in an error when the entire entry has been completed.  
If this occurs, reenter from the beginning.  
Key Operation  
0 to 9 keys  
RET key  
Function  
Enters the corresponding digit in the cursor position.  
Moves to the next input item. When the cursor is in the minute  
setting, the current setup is confirmed.  
CLR key  
Others  
Cancels the currently selected setting and exits this operation.  
Invalid.  
Operations on the touch panel are not permitted.  
68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.13 Command Prompt  
Function  
This is the MS DOS command prompt screen. An appropriate DOS command can be inputted  
through the keypad.  
This DOS command prompt is the result of calling COMMAND.COM as a child process from the  
system menu. Consequently, if the EXIT command is entered, operation returns to the system menu.  
Fig. 3.16  
69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.14 RAM Disk Size Change  
Function  
This screen is used to set the RAM DISK size (capacity). The setting will become valid after the  
system has rebooted.  
Fig. 3.17  
Operation  
Setting up the RAM disk  
Adjust the RAM disk size with the “8” and “2” keys.  
Confirm the setup with the “ RET” key.  
When the "Hit Any Key... " message is displayed, press any key other than the “Fn” key.  
The IT-2000 is turned off. After making sure that it turns off, press the reset switch on the  
IT-2000 again.  
After the IT-2000 is turned on again, the format confirmation screen, as shown below, will be  
displayed during system start-up. Then press the “1” key. This properly formats the RAM disk.  
After formatting the RAM disk is usable.  
RamDisk is broken.  
Format? YES:1/NO:0  
70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Key Operation  
8 key  
Function  
Increases the RAM disk size.  
Decreases the RAM disk size.  
2 key  
RET key  
Confirms the currently selected RAM disk size and exits this  
operation.  
CLR key  
1 key  
0 key  
Cancels the currently selected RAM disk size.  
Formats the RAM disk (Format confirmation screen).  
Aborts formatting of the RAM disk.  
Invalid.  
Others  
Operations with the touch panel are not permitted.  
71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.15 Disk Format  
Function  
Formats the RAM disk and F-ROM drive.  
Fig. 3.18  
Operation  
In the screen shown above, use the “2” or “8” key to select whether the RAM disk or user drive is to  
be formatted, then press the “RET” key. This makes the following screen appear. In this screen press  
the “1” key to move the cursor onto "YES" and press the “RET” key to start formatting. If either the  
“RET” key is pressed while the cursor is on “NO”, or “CLR” key is pressed while the cursor is on  
“YES”, the formatting operation will be canceled.  
Fig. 3.19  
Fig. 3.20  
72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Key Operation  
2 or 8 key  
0 key  
Function  
Selects the objective item (drive selection screen).  
Does not perform formatting (formatting start screen).  
Starts formatting (formatting start screen).  
Toggles YES and NO options of formatting.  
Confirms the current setting.  
1 key  
. (decimal) key  
RET key  
CLR key  
Others  
Cancels the current setting.  
Invalid.  
73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.16 System Initialization  
Function  
Sets all the system setups to their default settings.  
Fig. 3.21  
Operation  
The following table shows the available key operations.  
Key Operation  
Function  
Does not initialize the system.  
Initializes the system.  
0 key  
1 key  
. (decimal) key  
RET key  
CLR key  
Others  
Toggles YES and NO options of initialization.  
Confirms the current setting.  
Cancels the current setting and exits this operation.  
Invalid.  
74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.17 Password Entry  
Function  
When "FILE TRANSFER" or "MAINTENANCE" is selected for the first time after the system  
menu is initiated, the operator is requested to enter a password.  
Fig. 3.22  
Operation  
With the keypad enter "system" (lowercase letter), then press the “RET” key. If the “CLR” key is  
pressed without entering a character, the password entry operation will be canceled. If the “CLR”  
key is pressed with characters having been entered, the characters entered so far will be canceled,  
and the password entry operation must be performed again.  
This password will, if it is accepted once, be valid and will not have to be entered again unless the  
system menu is re-started.  
Key  
Function  
RET key  
CLR key  
Others  
Confirms the entry.  
Either clears or cancels the entered characters.  
Inputted as a character comprising the password.  
Touch Panel  
BS key  
Arrow key  
INS key  
DEL key  
SP key  
Function  
Clears one character entered.  
Invalid.  
Others  
Inputted as a character comprising the password.  
75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
4. MS-DOS  
4.1 Overview  
In general, if a personal computer is booted-up with a floppy disk in the drive, first an attempt will  
be made to read MS-DOS from the floppy disk, and if a copy of MS-DOS does not reside on the  
floppy it is loaded from the hard disk (C:).  
However, this method cannot be used on this terminal since its basic drive (C:), which corresponds  
to the hard disk of a PC, is defined as a read-only device. The MS-DOS on the boot drive (C:) can  
be loaded initially provided that no PC card is inserted in the slot, but, in this case, it is not possible  
to add the start-up code for user programs to the AUTOEXEC.BAT file. This problem is solved on  
the terminal as follows.  
At boot-up this terminal searches each drive to locate the CONFIG.SYS and AUTOEXEC.BAT  
files and sets it as the current drive, then MS-DOS is loaded into the main memory. As a result,  
the CONFIG.SYS and AUTOEXEC.BAT files in the current drive can be processed through  
MS-DOS.  
The CONFIG.SYS and AUTOEXEC.BAT files will be searched in the following order:  
PC card drive -> RAM disk -> F-ROM drive -> Basic drive  
The CONFIG.SYS and AUTOEXEC.BAT files on the basic drive will be executed only if the  
RESET switch is pressed. As a result, the System Menu, which is the maintenance program for  
this terminal, will be initiated.  
Since the main part of MS-DOS is always loaded from the basic drive (C:) in this case, it is not  
necessary to install MS-DOS and COMMAND.COM on the user drive.  
LOADING MS-DOS  
Fig. 4.1  
YES  
NO  
RESET BUTTON  
was pressed?  
Specifies the basic drive as the current  
drive.  
Specifies the drive on which CONFIG.SYS and  
AUTOEXEC.BAT reside as the current drive.  
Load MS-DOS.  
Executes CONFIG.SYS and  
AUTOEXEC.BAT in the current drive.  
76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
As described above, if the system power is turned on without an application installed (i.e. the  
conditions just after purchase), the CONFIG.SYS and AUTOEXEC.BAT files locating on the basic  
drive will be executed automatically. This inevitably initiates the System Menu (maintenance  
program). Therefore, if not only CONFIG.SYS and AUTOEXEC.BAT, but also an application  
program are installed on the user drive, it is possible for the application program to be automatically  
initiated from the user drive.  
Example 1  
In the following example MS-DOS is loaded from the RAM disk which has been designated as the  
current drive, since the system finds the CONFIG.SYS and AUTOEXEC.BAT first in the RAM  
disk.  
Basic Drive  
ATA CARD  
NO CARD  
RAM DISK  
F-ROM  
CONFIG.SYS  
AUTOEXEC.BAT  
APPLICATION  
CONFIG.SYS  
AUTOEXEC.BAT  
APPLICATION  
CONFIG.SYS  
AUTOEXEC.BAT  
APPLICATION  
Fig. 4.2  
Example 2  
In the following example the RAM disk contains only CONFIG.SYS. As a result, MS-DOS is  
loaded from the F-ROM drive designated as the current drive.  
Basic Drive  
ATA CARD  
NO CARD  
RAM DISK  
F-ROM  
CONFIG.SYS  
APPLICATION  
CONFIG.SYS  
AUTOEXEC.BAT  
APPLICATION  
CONFIG.SYS  
AUTOEXEC.BAT  
APPLICATION  
Fig. 4.3  
Example 3  
The following example shows a case where there is no F-ROM drive. The search order is also the  
same in this case. However in this case, CONFIG.SYS and AUTOEXEC.BAT in the basic drive  
will be executed, and System Menu will be initiated.  
NO CARD  
CONFIG.SYS  
APPLICATION  
CONFIG.SYS  
AUTOEXEC.BAT  
APPLICATION  
Fig. 4.4  
77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.2 How to Write CONFIG.SYS and AUTOEXEC.BAT  
This section explains how to write the CONFIG.SYS and AUTOEXEC.BAT files mentioned in the  
previous section. A basic explanation of the CONFIG.SYS and AUTOEXEC.BAT is not given here.  
For further information about these files refer to the MS-DOS manual or appropriate technical  
documents. Observe the following notes when writing a CONFIG.SYS file.  
The System Driver (SYSDRV.SYS) is required to operate this terminal. Always include a line  
through which to load the System Driver in the CONFIG.SYS.  
As described above, MS-DOS, which is in the basic drive, is always loaded. Consequently,  
C: COMMAND.COM is used as the command interpreter. Therefore, set a path to  
COMMAND.COM to be reloaded in CONFIG.SYS using the SHELL command.  
Within CONFIG.SYS the MENU command can be used. Note however, that no power off  
command is included in the MENU selection screen. This is to prevent the power from being  
accidentally turned off while loading the drivers. The Power switch is also disabled until the  
CASIOAPM.COM program is initiated from AUTOEXEC.BAT, etc. In other words, the MENU  
command should only be used in the application program development processes.  
Example of CONFIG.SYS  
The following example shows a typical CONFIG.SYS file script. Since this example assumes that  
the system is booted from either the RAM disk or NAND F-ROM drive, it is necessary to partially  
modify it if booting up from the ATA card.  
For information about booting from the ATA card refer to Chapter 4.3 "Card Boot".  
FILES=30  
1
Not required  
Not required  
Required (1)  
Required (2)  
Required (3)  
Required (4)  
Required (4)  
2 BUFFERS=20  
3 DOS=HIGH, NOUMB  
4 DEVICE=C: SYSDRV.SYS  
5 DEVICE=C: HIMEM.SYS /M:2  
6 DEVICE=C: POWER.EXE  
7 DEVICE=C: TIME.SYS  
8 DEVICE=C: EMM386.EXEFRAME=C800X=C000-C7FFX=D800-DFFFI=C800-D7FF Required (5)  
9 SHELL=C: COMMAND.COM C: /P /E:1024  
10 DEVICE=C: CARDSOFT SS365SL.EXE /SKT=1  
11 DEVICE=C: CARDSOFT CS.EXE /POLL:1  
12 DEVICE=C: CARDSOFT CSALLOC.EXE  
13 DEVICE=C: CARDSOFT ATADRV.EXE /S:1  
14 DEVICE=C: CARDSOFT MTSRAM.EXE  
15 DEVICE=C: CARDSOFT MTDDRV.EXE  
16 DEVICE-C: CARDSOFT MTDAPM.SYS  
17 DEVICE=C: CARDSOFT CARDID.EXE  
18 INSTALL=C: CARDSOFT CS_APM.EXE  
Required  
Required (6)  
Required (6)  
Required (6)  
Required (6)  
Required (6)  
Required (6)  
Required (6)  
Required (6)  
Required (6)  
78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
(1) DOS=HIGH,NOUMB  
This specifies that the main part of DOS is to be loaded in the HMA and, consequently, the  
UMB (Upper Memory Block) is not used. This terminal does not support a memory space for  
UMB if the EMS memory is to be used. Therefore, always specify NOUMB when using the  
EMS.  
(2) DEVICE=C: SYSDRV.SYS  
This driver is required to operate this terminal. Always install it before all other drivers.  
(3) DEVICE=C: HIMEM.SYS /M:2  
Never fail to specify the "/M:2" option.  
(4) DEVICE=C: POWER.EXE  
DEVICE=C: TIME.SYS  
This driver is required to enable the APM function. TIME.SYS must follow immediately after  
POWER.EXE.  
(5)  
(6)  
DEVICE=C: EMM386. EXE FRAME=C800 X=C000-C7FF X=D800-DFFF I=C800-D7FF  
Always specify the above options if using the EMS. Options other than the X option can be  
eliminated if the EMS is not used.  
DEVICE=C: CARDSOFT SS365SL.EXE /SKT=1  
DEVICE=C: CARDSOFT CS.EXE /POLL:1  
DEVICE=C: CARDSOFT CSALLOC.EXE  
DEVICE=C: CARDSOFT ATADRV.EXE /S:1  
DEVICE=C: CARDSOFT MTSRAM.EXE  
DEVICE=C: CARDSOFT MTDDRV.EXE  
DEVICE=C: CARDSOFT MTDAPM.SYS  
DEVICE=C: CARDSOFT CARDID.EXE  
INSTALL=C: CARDSOFT CS_APM.EXE  
This driver is required if the PC card driver is used. However, if the SRAM card is not used, the  
lines following ATADRV.EXE can be modified as follows. This saves a memory space as large as  
that used for the SRAM card driver. For more information refer to Appendix B "PC Card Driver".  
DEVICE=C: CARDSOFT ATADRV.EXE /D:1  
DEVICE=C: CARDSOFT MTDAPM.SYS  
DEVICE=C: CARDSOFT CARDID.EXE  
INSTALL=C: CARDSOFT CS_APM.EXE  
79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Example of AUTOEXEC.BAT  
The following example shows a typical AUTOEXEC.BAT script. Since this example assumes that  
the system is booted from either the RAM disk or the NAND F-ROM drive, it is necessary to  
partially modify it if booting up from the ATA card.  
For information about booting from the ATA card refer to Chapter 4.3 "Card Boot".  
Required (1)  
Required (2)  
Optional  
1: C: ENDATA  
2: C: CASIOAPM  
3: (Environment variables setup and application call, etc.)  
Note:  
(1) C: ENDATA  
Disables the card boot function in the BIOS. For more information refer to Chapter 4.3, "Card  
Boot".  
(2) C: CASIOAPM  
Enables the touch panel and power switch operations. The touch panel and power switch  
operations cannot be used until this program has been executed. This program only needs to be  
called once when booting the system.  
80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.3 Card Boot  
Basically the "card boot" operation boots MS-DOS from the ATA card, just like it is booted from a  
floppy disk. For this terminal the boot operation looks the same as this case. However, this terminal  
uses a boot process greatly different from a general card boot so that the MS-DOS in the drive C is  
always loaded, in such a way that MS-DOS not residing in the card is booted.  
Usually, in order to access the ATA card, a specific card driver is required. This card driver should  
be registered as an MS-DOS block device for the MS-DOS and added as a new drive to the system.  
Then the user can read from and write to the disk via the added drive by this device driver.  
BIOS  
Physical  
Drive  
MS-DOS  
Application  
CARD  
Driver  
ATA CARD  
G
Fig. 4.5  
However, in order to achieve a card boot, readout from the ATA card must be enabled before  
MS-DOS is loaded into the main memory. To solve this conflict the terminal has a function in its  
BIOS that can directly read the data from the ATA card. This function is assigned to the drive F (  
drive E for models without an F-ROM) and the ATA card looks, from MS-DOS, like a physical  
drive. As a result, when BIOS recognizes the presence of an ATA card during the boot process,  
it will search for CONFIG.SYS and AUTOEXEC.BAT in the ATA card prior to loading MS-DOS.  
If these files are found, the BIOS will load MS-DOS into main memory and shift control to  
MS-DOS after designating the drive F as the current drive. Subsequently, MS-DOS will execute the  
CONFIG.SYS and AUTOEXEC.BAT files in the current drive (drive F). This completes the load  
process.  
The mechanism determining which drive is specified as the one to be used by an application that  
accesses the card is explained below. The drive G (drive F for models without F-ROM), which is a  
drive specifically reserved for applications, will be enabled by CARDID.EXE which is loaded into  
the main memory. It is loaded when CARDID.EXE is loaded and when both the drive F and drive G  
are being enabled. If this is the case, note that if an attempt is made to access the drive F,  
81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
the drive G, which is currently enabled, will be disabled.  
This problem arises from the fact that the hardware conditions established by initialization with  
CARDID.EXE are lost since access to the drive F was executed by means of specific codes  
included in the BIOS. To avoid this problem, these specific codes in BIOS should be disabled.  
ENDATA.COM is used to do this. If ENDATA.COM is executed with the two drives mentioned  
above enabled, the specific codes (program) in BIOS are disabled, and the drive G can be retained  
as the only valid card drive. Below are example CONFIG.SYS and AUTOEXEC.BAT scripts  
used to boot a card.  
Example of CONFIG.SYS  
FILES=30  
BUFFERS=20  
DOS=HIGH,NOUMB  
DEVICE=C: SYSDRV.SYS  
DEVICE=C: HIMEM.SYS /M:2  
DEVICE=C: POWER.EXE  
DEVICE=C: TIME.SYS  
DEVICE=C: EMM386.EXE FRAME=C800 X=C000-C7FF X=D800-DFFF I=C800-D7FF  
SHELL=C: COMMAND.COM C: /P /E:1024  
DEVICE=C: CARDSOFT SS365SL.EXE /SKT=1  
DEVICE=C: CARDSOFT CS.EXE /POLL:1  
DEVICE=C: CARDSOFT CSALLOC.EXE  
DEVICE=C: CARDSOFT ATADRV.EXE /S:1  
DEVICE=C: CARDSOFT MTSRAM.EXE  
DEVICE=C: CARDSOFT MTDDRV.EXE  
DEVICE=C: CARDSOFT MTDAPM.SYS  
Example of AUTOEXEC.BAT  
@ECHO OFF  
C:  
CD  
C: CARDSOFT CARDID.EXE  
C: ENDATA.COM  
C: CARDSOFT CS_APM.EXE  
PROMPT $p$g  
PATH C:  
C: CASIOAPM.COM  
For the moment concentrate on the positions of CARDID.EXE and ENDATA.COM. CARDID.EXE  
can be registered as a device driver. In fact, this CARDID.EXE is registered as a device driver in  
82  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIG.SYS which resides on the drive C. However, CARDID.EXE cannot be registered as a  
device driver at a card boot. If this CARDID.EXE is registered as a device driver, two drives may  
be enabled concurrently if MS-DOS executes CONFIG.SYS. In addition, if ENDATA.COM is  
called with the INSTALL command, the drive G is enabled exclusively. However, since MS-DOS is  
operating under the assumption that the drive F is the current drive, an access error with the drive F,  
which does not actually exist, occurs because the AUTOEXEC.BAT file has been opened.  
Then how about calling ENDATA.COM from AUTOEXEC.BAT? It is apparent that this is also not  
successful. Although two drives are enabled by executing CONFIG.SYS, the drive G having been  
enabled by CARDID.EXE is disabled when MS-DOS accesses the drive F to execute the  
AUTOEXEC.BAT file.  
Next, the problem where a large program cannot be directly initiated from AUTOEXEC.BAT is  
explained. The explanation discusses the restrictions that apply to a card boot. This can be the  
situation when an attempt is made to read AUTOEXEC.BAT from the drive F while it is being  
disabled. COMMAND.COM consists of two independent parts called the resident part and non-  
resident part. The non-resident part will be overwritten by a large application program if it is loaded  
into the main memory. The resident part checks if the non-resident part has been destroyed at the  
termination of an application program, and will, if it is found to have been destroyed, reload the non-  
resident part again from the disk. In this case, accessing the drive F would not cause an error since  
the COMMAND.COM file to be read at this time was designated by the SHELL command in the  
CONFIG.SYS file. However, an error will result when an attempt is made by the reloaded  
COMMAND.COM file to open the AUTOEXEC.BAT file in order to continue its process. This  
problem can be avoided by shifting control priority from the AUTOEXEC.BAT file to another  
appropriate batch file in the drive G.  
Example of AUTOEXEC.BAT  
@ECHO OFF  
C: CARDSOFT CARDID.EXE  
C: ENDATA.COM  
----  
G:  
Other.bat  
In the above example the current drive is moved to the drive G, and the Other.bat file in the drive G  
is called. Since execution of the Other.bat file is performed under the assumption that the drive G is  
the current drive, no problem occurs if an attempt is made to open the same batch file in the course  
of reloading the non-resident part. But, it is prohibited to use a CALL statement to invoke the  
Other.bat file from AUTOEXEC.BAT. This will cause an error when control is returned to the  
AUTOEXEC.BAT file.  
83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5. MS-Windows  
5.1 Overview  
The MASK ROM drive (E:) of this terminals has MS-Windows installed in it.  
However, MS-Windows cannot be booted directly from this MASK ROM drive. This is because  
MS-Windows will overwrite some of the INI files at start up. However, since all files including the  
INI files are initially located in the MASK ROM drive, they cannot be overwritten, therefore an  
error will result. To avoid this problem, it is necessary to copy some of the files in the write-permit  
drive (D:) before booting MS-Windows (refer to the description about WINST.EXE). This  
installation method is called “network install” and is employed if multiple users share MS-Windows  
on the network. With respect to the MS-Windows operating environment of this terminal (as shown  
in Fig. 5.1 below), D: WINDOWS is considered the disk of a local computer and E: WINDOWS  
is considered the shared directory on the network.  
D: WINDOWS  
E: WINDOWS  
WIN.COM  
Various INI files  
Other  
MS-Windows  
Device drivers  
etc.  
Referencing the path  
IT-2000  
Fig. 5.1  
The advantage of this method is that a limited disk space can be used efficiently by allocating a very  
large volume of the main part of MS-Windows, various drivers programs, and INI files to write  
setups to the user drive while referencing the inside of the MASK ROM.  
84  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
5.2 Installation of MS-Windows  
As explained on the previous page, it is necessary to move (copy) some files onto the write-permit  
drive before booting MS-Windows. This section will describe this copy operation The following is  
an example of manually installing necessary files so that the user can determine the contents.  
A utility program (WINST.EXE) can be used to reduce the work load.  
For more information about this installation utility refer to Chapter 9.10 "Windows Installation  
Utility".  
5.2.1 Demonstration Installation  
For this terminal it is recommended to initiate the application program at the same time  
MS-Windows is started. The program manager can also be initiated during the development of  
application programs or for the purpose of demonstration. To initiate the program manager for the  
above purpose use the following procedure:  
Create the D: WINDOWS directory.  
Copy the entire content of E: WINDOWS LOCAL onto the created directory.  
The following files are to be copied:  
WIN.COM  
WIN.INI  
WIN.CLN  
WFWSYS.CFG  
MOUSE.INI  
SERIALNO.INI  
MAIN.GRP  
STARTUP.GRP  
SYSTEM.CLN  
SYSTEM.INI  
PROGMAN.INI  
CONTROL.INI  
ACCESSOR.GRP  
WINVER.EXE  
SHARES.PWL  
Create the CONFIG.SYS and AUTOEXEC.BAT files. Remember to add "D: WINDOWS;  
E: WINDOWS" to the existing path. Then specify “win.com” to boot MS-Windows at the end  
of the AUTOEXEC.BAT file.  
Copy the created CONFIG.SYS and AUTOEXEC.BAT files onto D:  
.
The above procedures complete the demonstration installation of MS-Windows. MS-Windows will  
be automatically booted if the terminal is re-started by pressing the RESET switch.  
85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Note:  
The contents of the latest version of E: WINDOWS LOCAL may be released as SDK. If this is  
the case, use the files in SDK instead of those stored in E: WINDOWS LOCAL.  
5.2.2 Application Installation  
For this terminal it is recommended to initiate the application program at the same time  
MS-Windows is started. This can be achieved by modifying the shell line included in the “boot”  
section of system.ini. The default setup script of this shell line is "shell=progman.exe", which is for  
initiating the program manager. If "progman.exe" is replaced by the application program name to be  
initiated at boot up, the application program, rather than "progman.exe", will be initiated at the same  
time MS-Windows is started.  
Create the D: WINDOWS directory.  
Copy the entire contents of E: WINDOWS LOCAL onto the created directory.  
To edit “system.ini” on a personal computer copy D: WINDOWS SYSTEM.INI onto the  
ATA or SRAM card.  
Open “system.ini” with the editor and insert the application program name to be initiated in the  
shell line of the “boot” section.  
Create the CONFIG.SYS and AUTOEXEC.BAT files. Remember to add "D: WINDOWS;  
E: WINDOWS" to the existing path. Then specify “win.com” to boot MS-Windows at the end  
of the AUTOEXEC.BAT file.  
Copy the created CONFIG.SYS and AUTOEXEC.BAT files onto D: , and copy the edited  
“system.ini” and application program onto D: WINDOWS.  
The above procedures complete application installation of MS-Windows. The application program  
will be automatically initiated if the terminal is re-started by pressing the RESET switch.  
Note:  
The contents of the latest version of E: WINDOWS LOCAL may be released as SDK. If this is  
the case, use the files in SDK instead of those stored in E: WINDOWS LOCAL.  
86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
6. Keyboard Controller  
6.1 Overview  
This terminal is equipped with a sub-CPU dedicated to controlling the keyboard, touch panel,  
backlight, and various sensors. This chapter describes major tasks assigned to this sub-CPU.  
LCD Brightness  
El Backlight  
Temperature Sensor  
Illumination Sensor  
Command  
Data  
Main CPU  
Sub-CPU  
Battery Voltage  
Sensor  
Buzzer  
Keyboard  
Volume  
Touch Panel  
Fig. 6.1  
87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
6.2 Keyboard Control  
The keyboard control of IT-2000 is compatible with the IBM PC/AT. The keyboard controller  
senses if a key has been pressed and sends a MAKE or BREAK code to the main CPU.  
Application Program  
Primary/Secondary Code  
Function Process  
Keyboard  
BIOS  
Input Buffer  
Hardware Interrupt Process  
System Scanning Code  
Sub-CPU  
Keyboard  
Fig. 6.2  
System Scanning Code  
Each keyboard scanning code generated from the keyboard main unit will be converted to the  
keyboard system scanning code through the controller.  
MAKE code : Code generated when the corresponding key is pressed.  
BREAK code : Code generated when the corresponding key is released.  
Primary/Secondary Code  
A code generated if an INT09h interrupt occurs will be converted to a primary code and a secondary  
code through the BIOS and set in the key buffer. They can be acquired from the application program  
by calling INT16h.  
Primary code  
Basically a character code (refer to the code table on the next page) is assigned to each key,  
except that 00h is assigned to function keys (Fn+ 0 to Fn+ 6), which must be recognized together  
with a secondary code as a set.  
88  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Secondary code  
Basically a system scan code is assigned to each key, however, for some keys, different codes  
will be assigned depending on the Fn key.  
Code Table  
The following diagram shows the relationship between the keyboard keys and primary codes.  
37  
34  
31  
38  
35  
32  
39 2D  
36  
33 0D  
2E  
30  
1B  
Fn  
0
7
4
1
8
5
2
9
6
3
-
Fn key not pressed  
CLR  
003E 003F 0040  
0044 003B 003C 003D  
Fn key pressed  
Fig. 6.3  
Fn key  
The Fn key is used to generate a system scanning code for the function key if it is pressed  
together with a numeric key. For example, Fn+1 keys generate a system scanning code for the  
F1 key, and Fn+0 keys generate a system scan code for the F10 key. However, Fn+7 to 9 keys  
will not generate a system scanning code that corresponds to any function keys because they  
have already been assigned to the following internal functions to be executed internally.  
Operation  
Fn + 7  
Function  
Toggles the backlight on and off.  
Fn + 8  
Fn + 9  
Increases the LCD screen contrast by one increment.  
Decreases the LCD screen contrast by one increment.  
89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6.3 Touch Panel Control Function  
The keyboard controller has incorporated a program for acquiring the touch coordinates of the touch  
panel. This program compensates these acquired coordinates with the values obtained through  
calibration so that correct coordinate values can be calculated. The calculated coordinates will be  
passed to a ROM-resident program called PEN BIOS when mouse interrupt occurs.  
The following diagram shows an operational flow until the coordinates acquired by the keyboard  
controller are passed to the application program as a mouse event.  
Touch Panel  
Keyboard  
Controller  
IRQ12 and P260  
(Coordinate)  
ROM BIOS  
Mouse Event  
User Program  
PENMOUSE.DRV  
MS-Windows  
Fig. 6.4  
90  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
6.4 Sensor Control  
This terminal has the following three types of sensors installed to serve as dedicated devices for  
handy terminal.  
Sensor  
Purpose of Use  
Temperature sensor  
Detects the temperature inside the main unit. This result will be  
used to automatically compensate the LCD brightness.  
Detects the ambient light intensity to automatically turn on and  
off the backlight.  
Illumination sensor  
This function is called the Auto Backlight Control (ABC)  
function, and it can be enabled or disabled with the System  
Menu or application programs.  
Remaining battery voltage  
sensor  
Used to acquire the remaining battery voltage. Application  
programs can obtain this value via the APM BIOS.  
91  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
6.5 Backlight Control  
This terminal has incorporated two types of automatic backlight control functions: ABO (Auto  
Backlight OFF) and ABC (Auto Backlight Control). The ABO function is used to turn off the  
backlight if no key or touch panel input has been made for a given period of time, and the ABC  
function is used to automatically turn on and off the backlight depending on the intensity of the  
ambient light. These operations are performed by the keyboard controller.  
ABC (Auto Backlight Control)  
The ABC function automatically turns on or off the backlight by detecting the ambient light  
intensity. Every second it determines the amount of light received by the illumination sensor and  
automatically turns on or off the backlight depending on whether the amount of light is less than the  
given amount or more than the given amount.  
Amount of Light  
Backlight OFF  
Light  
Backlight ON  
Margin to  
turn OFF  
Margin to  
turn ON  
Dark  
Fig. 6.5  
In the above graph, the marginal light amount across which the backlight is turned ON is at a setting  
less than if the backlight is OFF. If these two levels are identical, the backlight will flicker if it  
detects a small variation in the incident light on the illumination sensor. To avoid this problem an  
appropriate hysterisis is provided.  
92  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Transition of Backlight Control Methods  
The concept of ABC lies in automating user operations. However, automatic control depends on the  
illumination sensor. It cannot be perfect because various types of light, sunlight or room light for  
example, may be incident to the sensor. Consequently, this requires manual ON/OFF control even if  
under ABC control. This leads to a further problem wherein the user may forget to turn it on or off.  
To avoid these problems this system employs the following rules for transition between ABC,  
manual operation (ON function/OFF function), and ABO.  
ABO time or  
OFF function  
OFF  
ON  
ON function  
ABC ON  
OFF function  
ABC OFF  
OFF function  
or ABO time  
ABC Control  
Fig. 6.6  
93  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Press F7  
key  
ABO  
time-up  
2
ABC  
Enable  
ABC  
Disable  
---  
Becomes  
dark  
Ignore  
Becomes  
light  
Ignore  
1
2
3
4
5
ABC  
2
3 or 4  
disabled  
Backlight  
ON state  
ABC  
disabled  
Backlight  
OFF state  
ABC  
enabled  
Backlight  
ON state  
ABC  
enabled  
Backlight  
OFF state  
ABC  
*1  
---  
Ignore  
---  
---  
Ignore  
Ignore  
4
1
6
5
4
3 or 4  
*1  
Ignore  
---  
2
Ignore  
Ignore  
---  
2
3
---  
3
2
3
temporaril  
y disabled  
Backlight  
ON state  
ABC  
*3  
---  
*4  
---  
6
Ignore  
3
2
4
temporaril  
y disabled  
Backlight  
OFF state  
*4  
Note:  
*1: The backlight turns ON or OFF depending on the current light intensity.  
*2: ABO event does not occur during ABC. However, if the terminal is left in a dark place,  
the APO (Auto Power OFF) function will turn off the backlight.  
*3: Since the backlight is presently ON, the normal state can be restored by jumping to step “3”.  
*4: Cancels the sole condition of "ABC temporarily disabled".  
94  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7. Drivers  
7.1 Overview  
The following drivers are supplied for this terminal. Install them as required for operation.  
Driver  
File name  
Purpose  
System driver  
SYSDRV.SYS  
Driver required to operate the system. This driver  
must be installed.  
Clock control driver TIME.SYS  
Executes the process that restores the clock  
condition at a resume-boot in cooperation with  
POWER.EXE. This driver must be installed.  
Driver that controls the hardware window. It is  
called from the keypad driver.  
Hardware window  
manager  
HWWMAN.EXE  
Keypad driver  
KEYPAD.EXE  
PENMOUSE.DRV  
VKD.386  
Driver that adds the keypad function to the system.  
This driver is called from applications via the  
keypad library.  
Driver to simulate the Microsoft mouse driver  
operation on the touch panel.  
PenMouse driver  
Virtual keyboard  
driver  
Driver that enables access to the keyboard  
controller. It is installed automatically by the  
installer.  
System library  
Display driver  
SYSCALL.DLL  
This library can be called by application program  
or utility which use the library.  
VGA_C.DRV  
VGA_NC.DRV  
Display driver for Windows that can meet the size  
of display, 192 x 384 dots. Two types of the  
display driver are available, one to display mouse  
cursor and the other not to display the cursor. It is  
installed automatically by the installer.  
For information about the drivers associated with MS-DOS refer to the MS-DOS reference manual  
or other technical reference documents published separately by third party.  
95  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
7.2 System Driver  
7.2.1 Function  
The system driver (SYSDRV.SYS) must be installed because it executes critical processes in this  
terminal. The system driver mainly performs the following processes.  
LB1 monitoring and warning  
Monitors the main battery conditions and sounds a warning buzzer if an LB1 event is detected.  
It also forcibly turns off the system, if the battery voltage has not recovered within ten minutes of  
the buzzer sounding.  
Alarm notification  
When alarm (INT4Ah) occurs, the driver will hook the interrupt and ring the buzzer. And, the  
driver will notify to the user.  
Adjustment of the number of display lines  
On a general VGA screen twenty five lines (if video mode=03h) of text are displayed. However,  
on this terminal, it is limited to twenty four lines because of the screen size.  
To make display possible the system driver modifies the number of allowable lines to twenty  
four. The number of display columns has not been modified.  
7.2.2 Startup Method  
This driver is loaded by defining the DEVICE statement in the CONFIG.SYS file. SYSDRV.SYS  
is stored in the basic drive (C:).  
Format  
DEVICE=C: SYSDRV.SYS  
Start option  
None  
Note:  
SYSDRV.SYS must be loaded before any device drivers.  
96  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
7.3 Clock Control Driver  
7.3.1 Function  
This driver adjusts the system time on this terminal. This driver must be installed.  
On a general PC a timer interrupt occurs every 55 ms to update the clock tick counter, which is one  
of the BIOS system variables, and the clock overflow counter. The clock tick counter is incremented  
each time the timer interrupt occurs and read out from the real-time clock (RTC) when the PC power  
is turned on, and disappears when the power is off. However, in the case of a handheld terminal,  
since the suspend/resume state is frequently cycled, the clock tick counter is initialized only once, at  
the initial boot. Therefore, the clock time may be slightly off if the terminal is operated for a long  
period of time. To avoid this problem the terminal uses this driver to control the clock in cooperation  
with POWER.EXE so that the time can be directly read from the RTC. This ensures that the correct  
time can always be obtained, irrespective of the length of operation. However, since the time is read  
from the RTC in seconds, the 1/100 of a seconds digit will be ignored if the time is read using  
INT21h(2Ch).  
The relationship between the clock control driver and application programs is shown in the  
following diagram.  
Application Program  
Int21h  
MS-DOS  
Clock control driver  
POWER.EXE  
Int1Ah  
Real Time Clock (RTC)  
Fig. 7.1  
97  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
7.3.2 Startup Method  
This driver is loaded by defining the DEVICE statement in the CONFIG.SYS file. TIME.SYS is  
stored in the basic drive (C:).  
Format  
DEVICE=C: TIME.SYS  
Start option  
None  
Note:  
TIME.SYS must be loaded immediately after POWER.EXE.  
98  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
7.4 Keypad Driver/Hardware Window Manager  
7.4.1 Function  
The keypad driver (KEYPAD.EXE) is used to add the keypad function to the system. Application  
programs can use the keypad by calling the keypad driver functions via the keypad library (refer to  
Chapter 8.6.3 “Keypad Library”).  
This keypad driver internally calls the hardware window manager that enables the use of the  
hardware window. Therefore, the use of the keypad driver requires the residence of the hardware  
window manager. The keypad driver is also used by some utilities (refer to Chapter 9 “Utility”.)  
supported for this terminal. Therefore, before executing an application program or utility that uses  
the keypad driver, make it reside in the main memory.  
The relationship between the keypad driver/hardware window manager and application programs is  
shown by the following diagram.  
Application Program (system menu)  
Keypad Driver  
PEN BIOS  
Hardware Window Manager  
Hardware Windows  
Touch Panel  
Fig. 7.2  
99  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
7.5 PenMouse Driver  
7.5.1 Overview  
The PenMouse driver (PENMOUSE.DRV) simulates the operation of the mouse driver specific to  
the personal computer using inputs received from the touch panel. The PenMouse driver makes it  
possible to run an application on the IT-2000 terminal that was designed for use with a mouse driver  
on the personal computer.  
However, perfect simulation cannot be achieved because of the physical difference between the  
mouse and touch panel. For example, no touch panel operation can simulate a right mouse button  
click. However, application developers do not have to be particularly concerned with this difference.  
This is because a right mouse button click can be recognized as a "Pen UP" state.  
The relationship between the PenMouse driver and application programs is shown by the following  
diagram.  
Application Program  
Windows  
PenMouse Driver  
PEN BIOS  
Touch Panel  
Fig. 7.3  
100  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
7.5.2 Startup Method  
The PenMouse driver can be loaded by specifying as follow at [boot] section of SYSTEM.INI.  
However, it is loaded automatically to F-ROM drive (D: ) when Windows is installed by using the  
Windows installer. SYSTEM.INI is also created automatically. The driver is supplied as an SDK.  
Format:  
[boot]  
......  
mouse.drv=penmouse.drv  
Note:  
If the above format is deleted from SYSTEM.INI or from PENMOUSE.DRV, the mouse operations  
on Windows cannot be performed.  
101  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
7.6 Virtual Keyboard Driver  
7.6.1 Function  
The Virtual Keyboard Driver (VKD.386) is a driver that enables access to the keyboard controller  
on Windows (refer to Chapter 6 "Keyboard Controller"). This driver is only called from the system  
library. Since this driver has no chance of being directly called from the application program, the  
user does not have to be aware of its existence. Some of the system libraries use the functions of the  
keyboard controller. However, Windows applications cannot directly access the hardware.  
Therefore, they use this virtual keyboard driver to access the keyboard controller assuming that it is  
a virtual machine. The relationship between the virtual keyboard driver and application programs is  
shown in the following diagram.  
Application Program  
Windows  
System Library  
Virtual Keyboard Driver  
Keyboard Controller  
Fig. 7.4  
102  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
7.6.2 Startup Method  
The Virtual Keyboard Driver can be loaded by making the following specification in the “386Enh”  
section of SYSTEM.INI. VDK.386 is included in SDK. If Windows is installed by the installer,  
VDK.386 will be automatically copied into the F-ROM drive (D:) and SYSTEM.INI will also be  
automatically created. Therefore, the user does not have to be concerned with this setup process.  
Format:  
[386Enh]  
.....  
keyboard=vkd.386  
Note:  
If the above script is deleted from SYSTEM.INI or if VDK.386 is removed, Windows may not  
operate properly.  
103  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
7.7 System Library (main program file)  
7.7.1 Function  
SYSCALL.DLL is a dynamic link library that constitutes the main program of the system library  
(refer to Chapter 8.6.2 "System Library"). Before executing an application that calls the system  
library it is necessary to locate this file in the Windows directory (or other directory to which the  
path is established). Some of the system libraries use the functions of the keyboard controller.  
However, Windows applications cannot directly access the hardware. Therefore, they use the virtual  
keyboard driver to access the keyboard controller assuming that it is a virtual machine.  
The relationship between the virtual keyboard driver and application programs is shown in the  
following diagram.  
Application Program  
Windows  
System Library  
Virtual Keyboard Driver  
Keyboard Controller  
BIOS and Hardware  
Fig. 7.5  
7.7.2 Operation Method  
Copy the SYSCALL.DLL file into the directory to which the path is established. The setup file does  
not need to be modified at all. If Windows is installed by the installer, SYSCALL.DLL will be  
automatically copied into the "D: WINDOWS" directory.  
For information about the method used to call SYSCALL.DLL from applications refer to Chapter  
8.6.2 "System Library".  
104  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
7.8 Display Driver  
7.8.1 Function  
Display driver (VGA_C.DRV, VGA_NC.DRV) is a Windows display driver for a screen size of  
192 x 384 dots. If this driver is used, maximized or iconized windows will not extend beyond the  
screen size and dialog boxes can be displayed in the center of the screen.  
The relationship between the Display driver and application programs is shown in the following  
diagram.  
Application Program  
Windows  
Display Driver  
VGA Controller  
LCD Display  
Fig. 7.6  
There are two types of display driver for various display modes.  
VGA_C.DRV  
Displays a mouse cursor.  
VGA_NC.DRV  
Does not display a mouse cursor.  
7.8.2 Startup Method  
Display Driver can be loaded by making the following specification in the [boot] section of  
SYSTEM.INI. VGA_C.DRV or VGA_NC.DRV are included in SDK. If Windows is installed by  
the installer, VGA_C.DRV will be automatically copied into the F-ROM drive (D:) and  
SYSTEM.INI is also automatically created. Therefore, the user does not have to be concerned with  
this setup process.  
Format:  
[boot]  
....  
display.drv=vga_c.drv or display.drv=vga_nc.drv  
105  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Note:  
If the above script is deleted from SYSTEM.INI or PENMOUSE.DRV is removed, no display  
operation is permitted on Windows.  
106  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.9 COM Driver for IrDA  
7.9.1 Overview  
The IrDA Driver consists of IRDA.DLL and IRCOMM.DRV. The former is processes the protocol  
section and the latter processes the port emulation and frame sections.  
It is possible to set up parameters to define the operation of the IrDA section by writing them in the  
WIN.INI file.  
Application  
Windows API  
IRCOMM.DRV  
IRDA.DRV  
Port Emulation Layer  
IrCOMM Layer  
TTP Layer  
IrLAP/IrLMP Layer  
Frame Layer  
IRCOMM.DRV  
SIR  
FIR  
Fig. 7.7  
This IrDA Driver supports three connection methods: 3-Wire Raw, 3-Wire, and 9-Wire.  
Frame Layer  
The frame layer is defined by the installed hardware (H/W). IrDA-SIR (Infrared Data Association-  
Serial Infrared Interface) conforms to UART 16550, and IrDA-FIR (Infrared Data Association-First  
Infrared Interface) uses the CASIO gate array with NEC CB-C8VM NAFIRL.  
IrLAP/IrLMP Layer  
The IrLAP (Infrared Link Access Protocol) layer supports only one connection link, and IrLMP  
(Infrared Link Management Protocol) layer can support a maximum of three connection links. (In  
practice, only one connection link is for users, since IAS of the IrCOMM Layer uses two connection  
links.)  
107  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
IrCOMM Layer (including TinyTP Layer)  
The IrCOMM (Infrared COMM) layer includes TinyTP (Tiny Transport Protocol) layer. IrDA  
protocol can be used through this IrCOMM (TinyTP) layer. Three connection methods are  
supported: 3-Wire Raw, 3-Wire, and 9-Wire. The credit size of TinyTP is fixed to five (and it cannot  
be modified).  
3-Wire Raw Can only perform transmission/reception of user data.  
3-Wire  
Includes RS-232C setup, communication error, and break signal handling functions  
in addition to being able to perform transmission/reception of user data.  
Includes both the 3-Wire functions and signal line control functions. Signal lines  
will be emulated as follows:  
9-Wire  
IrDA connection partner  
DTR  
IrDA driver in IT-2000  
DTR  
DSR  
DCD  
RI  
RTS  
RTS  
CTS  
Fig. 7.8  
IAS will respond with the following data:  
Parameters  
0x00, 0x01, Wire type // This wire type can be set by WIN.INI.  
0x01, 0x01, 0x01  
0x02  
// Port type  
IrDA:IrLMP:LsapSel  
IrDA:TinyTP:LsapSel 0x03  
108  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.9.2 Windows 3.1 Communication Functions  
To perform communication with IrDA use API of MS-Windows. The following table lists the  
specifications of the available communication functions.  
List of communication functions  
Function  
BuildCommDCB  
ClearCommBreak  
CloseComm  
Description  
Page  
110  
111  
112  
Sets the control codes to the device control block (DCB).  
Clears the break state of the communication device.  
Transmits the current contents of the buffer, then closes the  
communication device.  
EnableCommNotification  
Permits or prohibits the posting of WM_COMMNOTIFY to  
the window.  
113  
EscapeCommFunction  
FlushComm  
GetCommError  
GetCommEventMask  
OpenComm  
GetCommState  
ReadComm  
SetCommBreak  
SetCommEventMask  
Orders the device to execute the expanded functions.  
Transmits characters from the communication device.  
Reads the communication status into the buffer.  
Acquires the event mask, then clears it.  
Opens the communication device.  
Reads the device control block into the buffer.  
Reads data from the communication device into the buffer.  
Sets the communication device to the break state.  
Acquires the event mask from the communication device, then  
sets the event mask.  
115  
116  
117  
120  
121  
123  
124  
125  
126  
SetCommState  
Sets the communication device to the state specified by the  
device control block.  
Place the specified character at the head of the transmission  
queue.  
128  
132  
TransmitCommChar  
UngetCommChar  
WriteComm  
Designates a character to be read next.  
Reads data from the buffer and writes it to the communication  
device.  
133  
134  
109  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
BuildCommDCB  
int BuildCommDCB(lpszDef, lpdcb)  
LPCSTR lpszDef; /* Address of the device control character string */  
DCB FAR *lpdcb; /* Address of the device control block */  
The BuildCommDCB function converts the device definition character string to the corresponding  
serial device control block (DCB) codes.  
< Parameter >  
lpszDef: Pointer to a character string that specifies the device control information and ends with a  
NULL character. This character string must have the same format as the parameters used  
for MS-DOS commands.  
lpdcb : Pointer to the DCB structure that receives the converted character string. This structure  
defines the control setups to be sent to the serial communication device.  
< Return value >  
Returns zero if the function is terminated normally. Otherwise it returns -1.  
Note:  
The BuildCommDCB function simply stores a value in the buffer. The application program side  
should set the value on the port using the SetCommState function. By default this BuildCommDCB  
function is set so that XON/XOFF and hardware flow controls are disabled. To enable these flow  
controls use the application to make the appropriate setting in the DCB structure.  
Note on IrDA:  
No special restriction on use of the function.  
110  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ClearCommBreak  
int ClearCommBreak (idComDev)  
int idComDev; /* Device with canceled break state */  
The ClearCommBreak function cancels the break state of the communication device and restores it  
so it is ready for character transmission.  
< Parameter >  
idComDev: Identifies the communication device for which the break state is to be canceled.  
The OpenComm function will return this value.  
< Return value >  
Returns zero if the function is terminated normally. If an valid device was not identified by  
idComDev parameter, -1 is returned.  
Note:  
The function cancels the break state of the communication device that was set with the  
SetCommState function.  
Note on IrDA:  
This will only function if the 9-Wire or 3-Wire connection is established. It will not function for  
3-Wire RAW connection. If this is attempted, the ClearCommBreak function will be terminated  
normally.  
111  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CloseComm  
int CloseComm(idComDev)  
int idComDev; /* Device to be closed */  
The CloseComm function will close the specified communication device and release the memory  
area assigned to the transmission and reception queues of the device. All characters in the  
transmission queue will be flushed out before the communication device is closed.  
< Parameter >  
idComDev: Specifies the device to be closed. The OpenComm function returns this value.  
< Return value >  
Returns zero if the function is terminated normally. Otherwise it returns a value less than zero.  
Note on IrDA:  
The CloseComm function performs disconnection of the IrDA protocol. It takes between a few  
seconds and 20 to 30 seconds before communication is actually disconnected. This disconnection  
time varies depending on the connection partner, threshold time, number of transmitted data pieces  
in the user-defined transmission queue and reception queue, and number of transmitted data pieces  
in the transmission buffer and reception buffer in the IrDA driver. If the number of transmitted data  
pieces in the transmission queue and transmission buffer is equal to or greater than one, that data will  
be transmitted. If the number of data pieces reaches zero, this function will be terminated normally.  
However, if the number of data pieces in the transmission queue and transmission buffer does not  
reach zero within a given period of time, this function will be terminated normally after it clears the  
transmission queue and transmission buffer. In other cases where the reception queue and reception  
buffer contains at least one character of data, this function will be terminated normally after it erases  
them. Since this CloseComm function does not perform OFF control of the IrDA power, it should be  
separately handled by the user.  
112  
Download from Www.Somanuals.com. All Manuals Search And Download.  
EnableCommNotification  
BOOL EnableCommNotification(idComDev, hwnd, cbWriteNotify, cbOutQueue)  
int idComDev;  
int hwnd;  
/* Communication device identifier */  
/* Handle of window that receives the message */  
/* Number of bytes written before notification */  
/* Minimum number of bytes of the output queue */  
int cbWriteNotify;  
int cbOutQueue;  
EnableCommNotification will enable or disable the posting of the WM_COMMNOTIFY message  
to the specified window.  
< Parameter >  
idComDev  
Specifies the communication device that posts the notification message to the  
window identified by the hwnd parameter.  
The OpenComm function returns this idComDev parameter value.  
hwnd  
Identifies the window to which the posting of WM_COMMNOTIFY message  
is enabled or disabled. If this parameter is NULL, EnableCommNotification  
will disable the posting of the message to the current window.  
cbWriteNotify  
Specifies the number of bytes to be written in the input queue of the application  
with the COM driver before the notification message is transmitted.  
A message requesting it to read the information from the input queue will be  
sent to the application.  
cbOutQueue  
Specifies the minimum number of bytes of the output queue. If the number of  
bytes in the output queue is less than this value, the COM driver will send a  
message to the application requesting it to write the information in the output  
queue.  
< Return value >  
Returns a value other than zero if the function is terminated normally. Otherwise it returns zero to  
indicate that an invalid COM port identifier was specified, the port is not opened, or a function that  
is not supported by RSCOMM.DRV was specified.  
113  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Note:  
If the application specifies -1 for the cbWriteNotify parameter, the WM_COMMNOTIFY message  
will be sent to the specified window in the case of CV_EVENT notification or CN_TRANSMIT  
notification, but it will not be sent in the case of CN_RECEIVE notification. If the application  
specifies -1 for the cbOutQueue parameter, CV_EVENT notification or CN_RECEIVE notification  
will be made, but CN_TRANSMIT notification will not be made. It a time-out occurs before the  
number of bytes specified by the cbWriteNotify parameter is written in the input queue, a  
WM_COMMNOTIFY message with a set CN_RECEIVE flag will be sent. In this case, the next  
message will not be sent until the number of bytes in the input queue is less than the value specified  
by the cbWriteNotify parameter. Similarly, a WM_COMMNOTIFY message with a set  
CN_RECEIVE flag will be sent only if the data size of the output queue is greater than the number  
of bytes specified by the cbOutQueue parameter.  
Note on IrDA:  
There is no particular restriction on use.  
114  
Download from Www.Somanuals.com. All Manuals Search And Download.  
EscapeCommFunction  
LONG EscapeCommFunction(idComDev, nFunction)  
int idComDev;  
int nFunction;  
/* Identifier of the communication device */  
/* Code of the expanded function */  
The EscapeCommFunction is used to specify the communication device used to execute the  
expanded function.  
< Parameter >  
idComDev  
Specifies the communication device used to execute the expanded function.  
The OpenComm function returns this value.  
nFunction  
Specifies the function code of the expanded function. It will be one of the following:  
CLRDTR  
Clears the DTR (data terminal ready) signal. This will function if  
a 9-Wire connection is established.  
CLRRTS  
Clears the RTS (request to send) signal. This will function if a  
9-Wire connection is established.  
GETMAXCOM  
Returns the maximum value of the COM port identifier supported  
by the system. This value ranges between 0x00 and 0x7F. 0x00  
corresponds to COM1, 0x01 corresponds to COM2, and 0x02  
corresponds to COM3, and so on.  
GETMAXLPT Not supported.  
RESETDEV  
SETDTR  
Not supported.  
Sends a DTR (data terminal ready) signal. This will function if a  
9-Wire connection is established.  
SETRTS  
Sends an RTS (request to send) signal. This will function if a  
9-Wire connection is established.  
SETXOFF  
SETXON  
Not supported.  
Not supported.  
< Return value >  
Returns zero if the function is terminated normally. Otherwise it returns a value less than zero.  
Note on IrDA:  
Some nFunction parameters are not supported at present. Those which are currently supported will  
function if a 9-Wire connection is established. They will not function for a 3-Wire or 3-Wire-Raw  
connection. If these parameters are specified, the EscapeCommFunction function will be terminated  
normally.  
115  
Download from Www.Somanuals.com. All Manuals Search And Download.  
FlushComm  
int FlushComm(idComDev, fnQueue)  
int idComDev;  
int fnQueue;  
/* Identifier of the communication device */  
/* Queue to be flushed */  
The FlushComm function is used to flush out all characters from the transmission queue or reception  
queue of the communication device.  
< Parameter >  
idComDev: Specifies the communication device to be flushed. The OpenComm function returns  
this value.  
fnQueue: Specifies the queue to be flushed. If this parameter is set to 0, the transmission queue  
is flushed, and if set to 1, the reception queue is flushed.  
< Return value >  
Returns zero if the function is terminated normally. If the device specified by the idComDev  
parameter is not valid, or if the queue specified by the fnQueue parameter is not valid, a value other  
than zero is returned. If the specified device has an error, a positive value will be returned.  
For more information about the error values refer to the GetCommError function description.  
Note on IrDA:  
Data transmission will take place only after the transmitted characters have been passed from the  
transmission queue to the buffer in the IrDA driver. Even if the transmission/reception buffer  
contains zero bytes, untransmitted data or received data may remain in the IrDA driver.  
116  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GetCommError  
int GetCommError(idComDev, lpStat)  
int idComDev;  
/* Communication device ID */  
/* Address of the device status buffer */  
COMSTAT FAR *lpStat;  
The GetCommError function is used to acquire the last error value and current status of the specified  
device. If a communication error occurs, Windows will lock the communication port until the  
GetCommError function cancels the error.  
< Parameter >  
idComDev: Specifies the communication device for which the status is to be checked.  
The OpenComm function returns this value.  
lpStat:  
This is a pointer to the COMSTAT structure that receives the device status.  
If this parameter is NULL, this function returns the error value.  
< Return value >  
If the function is terminated normally, the error value of the communication function which called  
the specified device most recently is returned.  
< Error values >  
CE_BREAK  
Indicates that the break state is detected. This functions if 9-Wire or 3-Wire  
connection is established.  
CE_CTSTO  
CE_DNS  
Not supported.  
Not supported.  
CE_DSRTO  
CE_FRAME  
Not supported.  
Indicates that a framing error is detected. This functions if 9-Wire or 3-Wire  
connection is established.  
CE_IOE  
Not supported.  
CE_MODE  
CE_OOP  
Not supported.  
Not supported.  
CE_OVERRUN  
Indicates that the previous character could not be read before the next character  
was received. The previous character will be lost. This functions if 9-Wire or  
3-Wire connection is established.  
CE_PTO  
Not supported.  
CE_RLSDTO  
CE_RXOVER  
CE_RXPARITY  
Not supported.  
Not supported.  
Indicates that a parity error is detected. This functions if 9-Wire or 3-Wire  
connection is established.  
117  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CE_TXFULL  
Not supported at present. The data will be passed from the transmission queue to  
the transmission buffer according to the IrDA protocol. It will be performed  
asynchronously with the write timing of the transmission queue by the  
WriteComm function. For example, if 2 kilobytes of data is written in a  
transmission buffer 2 kilobytes in size, the transmission buffer becomes full.  
This function is not supported because it is considered inappropriate for  
CE_TXFULL to be used in such a case.  
Note on IrDA:  
Some of the above listed error values are not supported at present. Those which are currently  
supported will function only if 9-Wire connection is established or if both 9-Wire and 3-Wire  
connections are established. Some other functions are currently not supported.  
Refer to the description of the DCB structure of the GetCommState function. For information about  
the COMSTAT structure refer to the next page.  
118  
Download from Www.Somanuals.com. All Manuals Search And Download.  
COMSTAT structure  
typedef struct tagCOMSTAT {  
BYTE status;  
/* cmst */  
/* transfer status */  
UNIT cbInQue;  
/* Number of characters in the reception queue */  
/* Number of characters in the transmission queue */  
UNIT cbOutQue;  
} COMSTAT;  
The COMSTAT structure is used to store information about the communication device.  
< Members >  
status  
Indicates the transfer status. This member consists of the following flags.  
CSTF_CTSHOLD  
CSTF_DSRHOLD  
CSTF_RLSDHOLD  
CSTF_XOFFHOLD  
CSTF_XOFFSENT  
CSTF_EOF  
Not supported  
Not supported.  
Not supported.  
Not supported.  
Not supported.  
Not supported.  
Not supported.  
CSTF_TXIM  
cbInQue  
cbOutQue  
Indicates the number of characters in the reception buffer.  
Indicates the number of characters in the transmission buffer.  
119  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GetCommEventMask  
UNIT GetCommEventMask(idComDev, fnEvtClear)  
int idComDev;  
/* Communication device ID */  
int fnEvtClear;  
/* Event to be cleared in the event word */  
The GetCommEventMask function will acquire the bit specified by the fnEvtClear mask in the event  
word, then clear it.  
< Parameter >  
idComDev  
:
Specifies the communication device for which the event word is to be checked.  
The OpenComm function returns this value.  
fnEvtClear: Specifies the event to be cleared in the event word. For a list of event values refer  
to the description about the SetCommEventMask function.  
< Return value >  
Returns a value that indicates the current event word of the specified communication device if the  
function is terminated normally. Each bit of the event word represents whether the specified event  
occurred. If the event actually occurred, the corresponding bit is set to 1.  
Note:  
The application must enable the event using the SetCommEventMask function before the  
GetCommEventMask function records the occurrence of an event. If the communication device  
event shows a line status error, the application should call the GetCommError function after  
calling the GetCommEventMask function.  
Note on IrDA:  
Some of the events are not supported at present. refer to the description of the SetCommEventMask  
function.  
120  
Download from Www.Somanuals.com. All Manuals Search And Download.  
OpenComm  
int OpenComm(lpszDevControl, cbInQueue, cbOutQueue)  
LPCSTR lpszDevControl; /* Address of the device control information */  
UNIT cbInQueue;  
UNIT cbOutQueue;  
/* Size of the reception queue */  
/* Size of the transmission queue */  
The OpenComm function will open the communication device.  
< Parameter >  
lpszDevControl: Pointer to a character string that ends with a NULL. This character string is the  
device name in the format of COMn (n denotes the device number).  
cbInQueue:  
Specifies the size of the reception queue in bytes.  
Specifies the size of the transmission queue in bytes.  
cbOutQueue:  
< Return value >  
Returns a value that identifies the opened device if the function is terminated normally. Otherwise it  
returns a value less than zero.  
< Error values >  
IE_BADID  
The device ID is invalid or not supported.  
The device baud rate is not supported.  
The specified byte size is invalid.  
IE_BAUDRATE  
IE_BYTESIZE  
IE_ DEFAULT  
The default parameter is incorrect.  
IE_HARDWARE The hardware is not available (locked by another device).  
IE_MEMORY  
IE_NOPEN  
IE_OPEN  
The function cannot assign a queue.  
The device is not open  
The device is already open. If calling this function by specifying zero for the  
size of both the queues, IE_OPEN or IE_MEMORY will be returned  
depending on whether the device is already open.  
Note:  
For Windows COM ports 1 through 9 are available. If the device driver does not support these  
communication port numbers, execution of the OpenComm function fails. The communication  
device is initialized by the default settings. To set other values for the device use the SetCommState  
function. The reception and transmission queues are used for the interrupt-driven type device driver.  
121  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Note on IrDA:  
The OpenComm function does not support the LPT device. Since the OpenComm function does not  
control the power block of IrDA, the user should turn the power block to ON before executing this  
function. On the IT-2000 the IrDA interface is assigned to COM2 port, therefore the COM2 port  
should be specified. The OpenComm function operates differently depending on whether the  
terminal operates as the primary station or the secondary station. The WIN.INI file is used to specify  
the station type. If the terminal operates as the primary station, the XID command can be used to  
perform the discovery operation for the required number of times. If this is done when the terminal is  
successfully connected to the secondary station, it operates as the primary station after this function  
is terminated normally. In other cases, if the terminal fails to connect with the secondary station (e.g.  
specified class or attribute is absent) or if the specified number of discoveries are completed before  
the connection is established, this function is terminated normally and the terminal operates as the  
secondary station and waits for a connection specification from the primary station until the  
CommClose function is executed.  
For information about the WIN.INI file refer to Chapter 7.9.3 "Setting Up WIN.INI File".  
122  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GetCommState  
int GetCommState(idComDev, lpdcb)  
int idComDev;  
/*Communication device ID */  
/* Address of the device control block structure */  
DCB FAR * lpdcb;  
The GetCommState function will acquire the device control block of the specified device.  
< Parameter >  
idComDev: Specifies the device for which the DCB is to be checked. The OpenComm function  
returns this value.  
lpdcb:  
This is a pointer to the DCB structure that receives the current device control block.  
The DCB structure defines how to control the device.  
< Return value >  
Returns zero if the function is terminated normally. Otherwise it returns a value less than zero.  
Note on IrDA:  
This function will read the parameter values set by the SetCommState function for functions that are  
not currently supported.  
123  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ReadComm  
int ReadComm(idComDev, lpvBuf, cbRead)  
int idComDev;  
void FAR * lpvBuf;  
int cbRead;  
/* ID of the device to be read */  
/* Address of the buffer from which bytes are read */  
/* Number of bytes to read */  
The ReadComm function will read the byte data from the specified communication device and  
assume the specified number is the maximum bytes.  
< Parameter >  
idComDev:  
lpvBuf:  
cbRead:  
Specifies the device to be read. The OpenComm function returns this value.  
Pointer to the buffer from which the bytes are read.  
Specifies the number of bytes to read.  
< Return value >  
This function returns the number of bytes having been read if the function is terminated normally.  
Otherwise it returns a value less than zero, and the absolute value of the return value indicates the  
number of bytes that were read.  
Note:  
If an error occurs, the user can survey the cause of the error by acquiring the error value and status  
via the GetCommError function. Since an error may occur if no bytes are present in the buffer,  
always make sure that an error has not occurred using the GetCommError function, even if the  
return value is 0. The return value can be less than the number specified by the cbRead parameter  
only if it is greater than the received number of bytes in the queue. If the return value is equal to  
cbRead, some additional bytes for the device may remain in the device queue. If the return value is  
0, no bytes remain.  
Note on IrDA:  
Since the communication flow is controlled according to IrDA protocol, the reception buffer will not  
cause an overflow.  
124  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SetCommBreak  
int SetCommBreak(idComDev)  
int idComDev; /* Device to interrupt communication */  
The SetCommBreak function is used to interrupt character transmission and set the communication  
device to the break state.  
< Parameter >  
idComDev: Specifies the communication device to be interrupted. The OpenComm function returns  
this value.  
< Return value >  
Returns zero if the function is terminated normally. Otherwise a value less than zero will be  
returned.  
Note:  
The communication device continues to be interrupted until the application calls the  
ClearCommBreak function.  
Note on IrDA:  
The SetCommBreak function will operate only if 9-Wire or 3-Wire connection is established. It will  
not function if 3-Wire RAW connection is established. If this is the case, the SetCommBreak  
function will be terminated normally.  
125  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SetCommEventMask  
UNIT FAR *SetCommEventMask(idComDev, fuEvtMask)  
int idComDev;  
/* Communication device to be enabled */  
/* Event to be enabled */  
UNIT fuEvtMask;  
The SetCommEventMask function will enable the event included in the event word of the specified  
communication device.  
< Parameter >  
idComDev Specifies the communication device to be enabled. The OpenComm function  
returns this value.  
fuEvtMask Specifies the event to be enabled. This parameter consists of any combination of  
the following values.  
EV_BREAK  
EV_CTS  
Set if a break state is detected at data input. This functions if  
9-Wire or 3-Wire connection is established.  
Set if the status is changed by the CTS (clear to send) signal.  
This functions if the 9-Wire connection is established.  
EV_CTSS  
EV_DSR  
EV_ERR  
Set if the current status of the CTS signal is indicated.  
This functions if the 9-Wire connection is established.  
Set if the status is changed by the DSR (data set ready) signal.  
This functions if the 9-Wire connection is established.  
Set if the line status error occurs. The line status error will be  
either CE_FRAME, CE_OVERRUN or CE_RXPARITY.  
This functions if the 9-Wire or 3-Wire connection is established.  
EV_PERR  
EV_RING  
Not supported.  
Set if the ring indicator status is indicated during the last modem  
interrupt. This functions if the 9-Wire connection is established.  
EV_RLSD  
Set if the status is changed by the RLSD (receive line signal detect)  
signal. This functions if the 9-Wire connection is established.  
EV_RLSDS  
Set if the current status of the RING signal is indicated. This  
functions if the 9-Wire connection is established.  
EV_RXCHAR  
EV_RXFLAG  
Set if a character is received and placed in the reception queue  
Not supported.  
EV_TXEMPTY Set if the last character in the transmission queue is send out.  
< Return value >  
Returns a pointer that indicates the current event word of the specified communication device if the  
function is terminated normally. Each bit of the event word represents whether the specified event  
occurred. If the event actually occurred, the corresponding bit is set to 1.  
126  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Note:  
The application must enable the event using the SetCommEventMask function before the  
GetCommEventMask function records the occurrence of an event. If the communication device  
event shows a line status error, the application should call the GetCommError function after calling  
the GetCommEventMask function.  
Note on IrDA:  
Some of the events are not supported at present. Some of the supported functions will operate only if  
9-Wire connection is established or if both 9-Wire and 3-Wire connections are established.  
127  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SetCommState  
int SetCommState(lpdcb)  
const DCB FAR * lpdcb;  
/* Address of the device control block */  
The SetCommState function will set the communication device to the state that is specified by the  
device control block.  
< Parameter >  
lpdcb: Pointer to the DCB structure that stores the communication settings for the device.  
Specify the device name for the Id member of the DCB structure.  
< Return value >  
Returns zero if the function is terminated normally. Otherwise it returns a value less than zero.  
Note:  
This function will re-initialize all the control items defined by the DCB structure, but will not clear  
the transmission and reception queues.  
Note on IrDA:  
Some of the control items defined by the DCB structure are not supported at present. Some of the  
supported functions will operate only if the 9-Wire connection is established or if both the 9-Wire  
and 3-Wire connections are established. If at attempt is made to define the functions not supported,  
the SetCommState function will be terminated normally. For information about the DCB structure  
refer to the next page.  
128  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DCB structure  
typedef struct tagDCB  
{
/* DCB */  
BYTE Id;  
/* internal device ID */  
/* Baud rate */  
UNIT BaudRate;  
BYTE ByteSize;  
/* Number of bits per byte (4-8) */  
BYTE Parity;  
/* 0 = None, 1 = Odd, 2 = Even, 3 = Mark, 4 = Space */  
/* 0 = 1 bit, 1 = 1.5 bits, 2 = 2 bits */  
/* Timeout of RLSD set */  
BYTE StopBits;  
UNIT RlsTimeout;  
UNIT CtsTimeout;  
UNIT DsrTimeout;  
UNIT fBinary;  
UNIT fRtsDisable;  
UNIT fParity;  
UNIT fOutxCtsFlow;  
UNIT fOutxDsrFlow;  
UNIT fDummy;  
/* Timeout of CTS set */  
/* Timeout of DSR set */  
/* Binary mode (without EOF check) */  
/* Ignores RTS at initialization. */  
/* Enables the parity check. */  
/* CTS handshake at output */  
/* DSR handshake at output */  
UNIT fDtrDisable;  
UNIT fOutX;  
/* Ignores DTR at initialization. */  
/* Enables XON/XOFF at output. */  
/* Enables XON/XOFF at input. */  
UNIT fnInX;  
UNIT fPeChar;  
UNIT fNull;  
/* Execute replacement because of a parity error. */  
/* Enables Null stripping. */  
UNIT fChEvt;  
/* Enables the transmission character event. */  
/* DTR handshake at input */  
UNIT fDtrflow;  
UNIT fRtsflow;  
UNIT fDummy2;  
char XonChar;  
char XoffChar;  
UNIT XonLim;  
/* RTS handshake at input */  
/* Reserved */  
/* XON character for transmission and reception */  
/* XOFF character for transmission and reception */  
/* XON threshold at transmission */  
/* XOFF threshold at transmission */  
/* Replacement character to be used at parity error */  
/* Delimiter of the input characters */  
/* Received event character */  
UNIT XoffLim;  
char PeChar;  
char EofChar;  
char EvtChar;  
UNIT TxDelay;  
} DCB;  
/* Delay time between characters */  
129  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The DCB structure defines the control setups of serial communication.  
< Members >  
Id  
Identifies the communication device. This value is set by the device driver.  
If the most significant bit (MSB) is set, the DCB structure is used for a parallel  
communication device.  
BaudRate  
values  
Indicates the baud rate representing the processing speed of the communication  
device. If the upper byte is 0xFF, the lower byte indicates the baud rate index  
This index takes one of the following  
CBR_9600, CBR_19200, CBR_38400, CBR_56000, CBR_128000, and  
CBR_256000. If the upper byte is has a value other than 0xFF, this parameter  
indicates the actual baud rate. If a baud rate index other than one described above  
is used, SetCommState results in error. This function operates only if both  
the 9-Wire and 3-Wire connections are established.  
ByteSize  
Parity  
Indicates the number of bits to be transmitted/received. The value of the ByteSize  
member ranges between 5 and 8. A value of 4 is not supported.  
This function operates if both the 9-Wire and 3-Wire connections are established.  
Indicates the parity check method to be used. This member takes one of the  
following values. This function operates if both the 9-Wire and 3-Wire  
connections are established.  
EVENPARITY  
Even number  
MARKPARITY Mark  
NONPARITY  
ODDPARITY  
No parity check  
Odd number  
StopBits  
Indicates the number of stop bits to be used. This member takes one of the  
following values. A value of 1.5 bits is not supported. This function operates if  
both the 9-Wire and 3-Wire connections are established.  
ONESTOPBIT  
1 bit  
TWOSTOPBITS  
2 bits  
RlsTimeout  
CtsTimeout  
DsrTimeout  
fBinary  
Not supported.  
Not supported.  
Not supported.  
Indicates the binary mode. Non-binary mode is not supported.  
fRtsDisable  
Indicates whether to disable the RTS (request to send) signal. If the fRtsDisable  
member is set, the RTS signal will be kept being turned off. Or, the member is  
cleared, the signal will be turned on if the device is opened, and will be turned off  
if the device is closed. This function operates if the 9-Wire connection is  
established.  
fParity  
Indicates whether or not to perform a parity check. If the fParity member is set,  
the parity check is performed and an error is reported, if one occurs.  
This function operates if both the 9-Wire and 3-Wire connections are established.  
130  
Download from Www.Somanuals.com. All Manuals Search And Download.  
fOutxCtsFlow  
fOutxDsrFlow  
fDummy  
Not supported.  
Not supported.  
Reserved.  
fDtrDisable  
Indicates whether to disable the DTR (data terminal ready) signal. If this  
member is set, the DTR signal is not used and remains off. If this member is  
cleared, the DTR signal will be sent if the device is opened, and will be turned  
off if the device is closed. This function operates if the 9-Wire connection is  
established.  
fOutX  
fnInX  
fPeChar  
fNull  
fChEvt  
fDtrflow  
fRtsflow  
fDummy2  
XonChar  
XoffChar  
XonLim  
XoffLim  
PeChar  
EofChar  
EvtChar  
TxDelay  
Not supported.  
Not supported.  
Not supported  
Not supported.  
Not supported.  
Not supported.  
Not supported.  
Reserved.  
Not supported.  
Not supported.  
Not supported.  
Not supported.  
Not supported.  
Not supported.  
Not supported.  
Not used in the current version.  
131  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TransmitCommChar  
int TransmitCommChar(idComDev, chTransmit)  
int idComDev;  
/* Communication device */  
char chTransmit; /* Character to be transmitted */  
The TransmitCommChar function places the specified character at the top of the specified  
transmission queue.  
< Parameter >  
idComDev:  
Specifies the communication device to which characters are transmitted.  
The OpenComm function returns this value.  
ChTransmit: Specifies the characters to be transmitted.  
< Return value >  
Returns zero if the function is terminated normally. If the character could not be transmitted,  
it returns a value less than zero.  
Note:  
If the device is not transmitting a character, the TransmitCommChar function cannot be called  
repeatedly. If a character has been placed in the communication queue with the TransmitCommChar  
function, that character must be transmitted so that the function can be called again. If the previous  
character has not been transmitted yet, this function returns an error value.  
Note on IrDA :  
Data transmission will take place only after the transmitted characters have been passed from the  
transmission queue to the IrDA driver. The specified characters will be transmitted after the  
remaining data in the IrDA driver has been transmitted. The TransmitCommChar function will pass  
the characters to the IrDA driver preceding the data in the transmission queue.  
132  
Download from Www.Somanuals.com. All Manuals Search And Download.  
UngetCommChar  
int UngetCommChar(idComDev, chUnget)  
int idComDev;  
char chUnget;  
/* Communication device */  
/* Character to be placed in the queue */  
The UngetCommChar function replaces the specified character in the reception queue. At the next  
read operation, this character will be read first.  
< Parameter >  
idComDev: Specifies the communication device which receives the characters. The OpenComm  
function returns this value.  
chUnget: Specifies the characters to be placed in the reception queue.  
< Return value >  
Returns zero if the function is terminated normally. Otherwise it returns a value less than zero.  
Note:  
The UngetCommChar function cannot be called repeatedly. To make it possible to call this function  
again, it is necessary to read out characters in the queue.  
Note on IrDA:  
There are no particular use restrictions.  
133  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WriteComm  
int WriteComm(idComDev, lpvBuf, cbWrite)  
int idComDev;  
/* Communication device ID */  
const void FAR * lpvBuf;  
int cbWrite;  
/* Address of the data buffer */  
/* Number of bytes to write */  
The WriteComm function will write to the specified communication device.  
< Parameter >  
idComDev:Specifies the device that receives the data. The OpenComm function returns this  
value.  
lpvBuf:  
Pointer to the buffer that stores the bytes to write.  
cbWrite: Specifies the number of bytes to write.  
< Return value >  
This function returns the number of bytes written if the function is terminated normally. Otherwise it  
returns a value less than zero, and the absolute value of the return value indicates the number of  
bytes that were written.  
Note:  
To judge if an error occurred, use the GetCommError function to acquire the error value and error  
status. In the case of a serial port, the WriteComm function will delete the data in the transmission  
queue, if it is full and has no space for more byte data. Therefore, before calling the WriteComm  
function, the application should call the GetCommError function to check for available memory  
space in the transmission queue. In addition, use the OpenComm function to set the size of the  
transmission queue to a value greater than the maximum possible size of the outputted character  
string.  
Note on IrDA:  
Even if the transmission queue contains zero bytes of transmission characters, untransmitted data  
remain in the IrDA driver.  
134  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.9.3 Setting Up WIN.INI File  
The following parameters must be set in the [IrDA.COM2] section of the WIN.INI file. If these  
parameters are not specified or if invalid parameters are set, communication will be performed  
according to the default values.  
Setup example  
[IrDA.COM2]  
IrDA=ON  
MaxBaudRate=115200  
SizeWindow=1  
SizeData=1024  
DisconnectThresholdTime=40  
MaxTurnAroundTime=500  
MinTurnAroundTime=10000  
NumBOF=0  
DeviceNickName=devicenickname  
DeviceName=devicename  
DiscoverCount=0  
ServiceType=7  
Each item has the following definition:  
IrDA  
Sets to the COM port irrespective of whether IrDA protocol is used.  
Parameter  
ON  
COM port uses IrDA protocol.  
OFF (default) COM port does not use IrDA protocol (it uses direct serial protocol).  
135  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
MaxBaudRate  
Sets the baud rate (for IR communication). It is one the negotiation parameters. Parameters less than  
the default value can be concatenated using ORs.  
Parameters  
2400 Maximum baud rate is 2.4 Kbps.  
9600 (default) Maximum baud rate is 9.6 Kbps.  
19200 Maximum baud rate is 19.2 Kbps  
38400 Maximum baud rate is 38.4 Kbps  
57600 Maximum baud rate is 57.6 Kbps.  
115200 Maximum baud rate is 115.2  
Kbps.  
576000 Maximum baud rate is 0.5 Mbps.  
4000000 Maximum baud rate is 4 Mbps  
SizeWindow  
Sets the number of windows. It is one of the negotiation parameters. This is, however, fixed to 1.  
Parameter  
1 (default)  
The number of windows is 1.  
SizeData  
Sets the data size. It is one the negotiation parameters.  
Parameter  
64 (default) Data size is 64 bytes.  
128 Data size is 128 bytes.  
256 Data size is 256 bytes.  
512 Data size is 512 bytes.  
1024 Data size is 1024 bytes.  
2048 Data size is 2048 bytes.  
DisconnectThresholdTime  
Sets the maximum value of the disconnect threshold time. It is one the negotiation parameters.  
A parameter with a value smaller than those listed bellow will be set by OR.  
Parameters  
3
8
The maximum value of the threshold time is 3 seconds.  
The maximum value of the threshold time is 8 seconds.  
12 The maximum value of the threshold time is 12 seconds.  
16 The maximum value of the threshold time is 16 seconds.  
20 The maximum value of the threshold time is 20 seconds.  
25 The maximum value of the threshold time is 25 seconds.  
30 The maximum value of the threshold time is 30 seconds.  
40 (default) The maximum value of the threshold time is 40 seconds.  
136  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MaxTurnAroundTime  
Sets the maximum turnaround time. It is one of the negotiation parameters. This is, however, fixed  
to 500 msec.  
Parameter  
500 ms. (default) Maximum turnaround time is 500 ms.  
MinTurnAroundTime  
Sets the minimum turnaround time. It is one of the negotiation parameters.  
Parameters  
5 ms  
Minimum turnaround time is 5 ms.  
10 ms (default) Minimum turnaround time is 10 ms.  
NunBOF  
Sets the number of BOFs to be added. It is one of the negotiation parameters.  
Parameters  
0 (default)  
0 BOF is added.  
1 BOF is added.  
2 BOFs are added.  
3 BOFs are added.  
6 BOFs are added.  
1
2
3
6
12 12 BOFs are added.  
24 24 BOFs are added.  
48 48 BOFs are added.  
DeviceNickName  
Sets the nickname included in the device information of the XID frame. A maximum of sixteen  
1-byte characters can be set. The seventeenth and subsequent characters will be ignored.  
Parameters  
Optional character string  
IT-2000 (default)  
Device nickname in the device information  
Handy terminal name  
137  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DeviceName  
Sets the device name to be registered as the "DeviceName" of the IAS attribute. A maximum of  
sixteen 1-byte characters can be set. The seventeenth and subsequent character will be ignored.  
Parameters  
Optional character string  
Vx.xx (default)  
Device name for the "DeviceName" attribute  
Version number of the IrDA driver  
DiscoverCount  
Sets up the station specification. If this function is set so it operates on the primary station it  
performs discoveries. One discovery will cover six slots. If this function is set so it operates on the  
secondary station, it waits for a discovery result from the primary station.  
Parameters  
0
n
Operates on the secondary station.  
Operates on the primary station and performs discovery 'n' times. If the 'n'  
discovery have been made, it operates on the secondary station.  
Operates on the primary station and performs only one discovery.  
1
ServiceType  
Sets the Wire service type of my station. Multiple parameters can be set at once by concatenation  
them using logical sum (OR).  
Parameters  
1
3-Wire-RAW service  
2
3-Wire service  
3
4
3-Wire-RAW or 3-Wire service  
9-Wire service  
5
6
3-Wire-RAW or 9-Wire service  
3-Wire or 9-Wire service  
3-Wire-RAW or 3-Wire or 9-Wire service  
7 (default)  
138  
Download from Www.Somanuals.com. All Manuals Search And Download.  
7.9.4 Installation Method  
The method used to install the IrDA driver in Windows is described here. Using WINST.EXE it is  
also possible to install it according to the default settings. Use the following information as a  
reference for manual installation or if modifying the setup contents.  
The Windows3.1 IrDA driver is installed with the following procedure. Assume that this installation  
is made in the Windows system, and that installation is made from the card drive (G:) in  
D: WINDOWS.  
Copy IRDA.DLL and IRCOMM.DRV into D: WINDOWS or D: WINDOWS SYSTEM.  
> COPY G: IRDA.DLL D: WINDOWS  
> COPY G: IRCOMM.DRV D: WINDOWS  
Copy COMM.DRV into the MASK ROM drive into D: WINDOWS, then rename it.  
> COPY E: WINDOWS COMM.DRV D: WINDOWS RSCOMM.DRV  
Modify the contents of the SYSTEM.INI file as follows:  
Modify the following settings in the “boot” section.  
(Before modification)  
comm.drv=comm.drv  
(After modification)  
comm.drv=ircomm.drv  
Add the following section to the end of the file.  
[Ircomm.drv]  
comm=RSCOMM.DRV  
IrDA=IRDA.DLL  
139  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Add the following to the WIN.INI file. For information about the setup value of each entry  
refer to Chapter 7.9.3 "Setting Up WIN.INI File".  
Setup example  
[IrDA.COM2]  
IrDA=ON  
MaxBaudRate=115200  
SizeWindow=1  
SizeData=1024  
DisconnectThresholdTime=40  
MaxTurnAroundTime=500  
Min TurnAroundTime=10000  
NumBOF=0  
DeviceNickName=devicenickname  
DeviceName=devicename  
DiscoverCount=0  
ServiceType=7  
The above operations complete the installation procedure.  
140  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8. Application Development  
8.1 Overview  
This terminal uses the IBM PC/AT architecture. Though the actual display size is 192 (H) x 384 (V)  
pixels, internally the area of 640 (H) x 480 (V) pixels is supported by the dedicated display driver.  
It allows no limitation on programming. Therefore, if the user develops an application that makes  
use of the upper left side (192 (H) x 384 (V)) as display area, a dedicated application program will  
run on this terminal. It is possible to have coding also by using GetSystemMetrics of Windows API  
which can not be affected by the operating environment. Also, since the numeric keys of the IT-2000  
generate the same keycodes as the IBM PC/AT machine, there is no need to discriminate between  
this terminal and the development machine in terms of the standard input/output operations.  
In the IT-2000, a dedicated mouse driver has been installed to support the touch panel. Application  
program can acquire the tapping on the touch panel as it is clicked by the button on the left side of  
mouse. However, there is one limitation which does not allow the double-clicking (or double tapping  
on the touch panel). The reason is that it is not possible for the user to tap twice on the same narrow  
point. Therefore, a programmer must design such application program so that it can accept only  
input by single tapping on the panel.  
Applications that use the COM1 port (8-pin) can be programmed in the same way they are for  
MS-Windows programming except that they must include the power control functions. On this  
terminal, the power to the COM port is default-set to off so that the power consumption is reduced  
to a minimum. Therefore, application programs that use the COM port must turn on the power to the  
COM port in advance using the system library.  
141  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
8.2 Notes on Developing Application  
The use of double clicks on this terminal extremely difficult. Develop your application program  
so that only single click is enabled  
Any program that uses the COM port must turn on the power to it in advance using the system  
library. The power to the COM port remains on once it has been turned on, or until it is turned  
off by the system library or until the RESET button is pressed. Therefore, do not forget to turn  
off the power to the COM port when it is no longer required. This power is automatically  
turned off during the suspend state, but power is restored to it if system operation is resumed.  
Accordingly, the application program side does not have to be aware of the power condition.  
If a program is running on MS-DOS/MS-Windows, data may not always be written in the  
physical disk each time the file write function is called. MS-DOS/MS-Windows will hold the  
write data in memory until a given amount of data is accumulated. Do not turn the power off  
and on or remove and insert the card if this occurs. If this event occurs, the programmer should  
create an application which calls the COMMIT command form MS-DOS after attempting a  
write to the disk. This COMMIT function can also be called using the _dos_commit () function  
of Microsoft-C.  
While a file in SRAM card is being opened under Windows, the operation of the access to the  
card is aborted if suspend is executed. This will cause INT24 error when the access to the  
SRAM card for writing or closing is continued after the resume. When you use an SRAM card  
under Windows, please be sure to perform the operation steps in sequence of “open write  
close”.  
142  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.3 Development Environment  
8.3.1 Development Environment  
To develop application programs a 16-bit compiler, Microsoft C/C ++ 7.0 or later, and a computer  
on which the compiler can run are required.  
8.3.2 Application Development Library  
For this terminal various libraries such as the keypad library and OBR library, which is used to  
enhance the efficiency of developing applications. This terminal is also provided with the libraries  
of controlling the IT-2000 dedicated devices such as the backlight control and device power control,  
etc. However, those processes which depend on interfaces of hardware are managed with DLL, and  
the dedicated functions cannot be linked to application program directly.  
Application Program  
LibSYSW.LIB  
LibOBRW.LIB  
LibYMOD.LIB  
FLINK.LIB  
Mouse Event  
PenMouse.drv  
Display Req.  
VGA_NC.drv  
MS-Windows  
OBRLIB.DLL  
YMODEM.DL  
PADCTRL.VBX  
FLINK.DLL  
AT Architecture  
LibSYSW.LIB  
IrDA Driver  
SysCall.DLL  
VKD.386  
Handy Terminal Original Hardware  
Fig. 8.1  
Note:  
In case Visual BASIC is used as the development language, the libraries in boxes with  
broken-dot-line in Fig. 8.1 are not needed.  
143  
Download from Www.Somanuals.com. All Manuals Search And Download.  
These libraries do not have to be always used. And, in as far as standard MS-Windows is pursued,  
they do not have to be used at all. The sole exception is that the COM port power must be turned on  
via the system library if the user wants to control the COM port directly.  
8.3.3 Simulation Driver  
As explained above, the libraries for this terminal only control hardware that is compatible with the  
IBM PC/AT. This is important to remember if application programs for the terminal are developed  
on a personal computer. Although each library is linked to the application program to form an  
executable program, they do not contain code that is specific to the hardware of the handy terminal.  
Consequently, if a simulation driver is used rather than one of the drivers dependent on the terminal  
hardware, the application program can be made to run, without modification, on the personal  
computer. This is the basic concept of simulation.  
The diagram below shows the simulation environment that has been constructed on the personal  
computer. By replacing SysCall.DLL with the simulator, there will not be any part which depends  
on the IT-2000 hardware. This allows the simulation program to run on the personal computer  
without having no software modification for application program.  
Fig. 8.2  
Application Program  
Mouse Event  
LibSYSW.LIB  
LibOBRW.LIB  
LibYMOD.LIB  
LibYMOD.LIB  
Display Req.  
Std. VGA Drv.  
MS-Windows  
Std. Mouse Drv.  
OBRLIB.DLL  
YMODEM.DL  
PADCTRL.VBX  
FLINK.DLL  
Std. COM Drv.  
LibSYSW.LIB  
AT Architecture  
SysCall.DLL (Simulator)  
For information about SysCall.DLL for simulation refer to Chapter 8.5.1 "System Driver  
Simulator (SysCall.DLL)".  
144  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.4 Program Development Procedure  
The following diagram shows the basic procedural flow used to develop an application program that  
runs on this terminal. The following paragraphs explain the details of each phase of the procedural  
flow.  
Start  
Transfer  
Creation/Edition of sourcecode  
Operation check on IT-2000  
Compile/Assemble  
Link  
End  
PC simulation  
NG  
OK  
Operation OK  
< PC side >  
<IT-2000 side>  
Fig. 8.3  
145  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.4.1 Creation of Execution File  
Application developers should develop programs using various application development libraries.  
The following sample program is used to turn on and off the backlight. With this program the  
backlight will be turned on or off if either "1" or "0", respectively, is entered through the numeric  
keypad. This program can be terminated by the input of the ESC key.  
The following program shows only a part of the whole program which controls the backlight in the  
Windows Procedure.  
#include <windows.h>  
#include “syslib.h”  
....  
case WM_CHAR:  
switch (ch = wParam) {  
case '0':  
case '1':  
SYS_SetBackLight(ch - ‘0’); /* System Library function */  
default:  
break;  
}
}
....  
Next, create the execution file with the following procedure.  
<Test.c>  
C: SAMPLE>cl -c -G2sw -Zp -W3 -Otin -Ic: IT-2000 include test.c  
Microsoft (R) C/C++ Optimizing Compiler Version 8.03  
Copyright (c) Microsoft Corp 1984-1995. All rights reserved.  
test.c  
C: SAMPLE>link /NOD /NOE /LI /m test,,,c: IT-2000 lib libsysw,test.def  
Microsoft ( R ) Segmented Executable Linker Version 5.63.2 20 Nov 29 1994  
Copyright (C) Microsoft Corp 1984-1995. All rights reserved.  
C: SAMPLE>  
This example assumes that the SDK of the IT-2000 has been installed in C: IT-2000. If it is  
installed in another directory, it is necessary to designate the location in which to store the header  
file and library file according to the development environment. These designation can be made  
using the environment variables INTCLUDE and LIB.  
For more information refer to a compiler manual published separately by a third party.  
146  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
8.4.2 Debugging Through Simulation  
Before the debugging, SysCall.DLL (for simulation) must be copied to the directory of  
Windows System. Since the same name, SysCall.DLL, is used for actual debugging and for  
simulation, please pay your attention not to make copy for wrong one. When you execute the sample  
program, window will appear on screen of IT-2000. It is monitoring window for the simulation.  
Fig. 8.4  
Under this condition the program simply waits for key input. The backlight is off. To confirm this  
condition use the monitor function of the simulator. In this condition press the "1" key. The sample  
program shown above is designed so that the backlight is turned on if it receives "1". The result is  
shown below. Now, the monitoring window indicates that the backlight is ON.  
147  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Fig. 8.5  
The outline of the operation test using the simulation driver is summarized above. Debugging can of  
course be performed using Microsoft's CodeView debugger.  
For more information about SysCall.DLL for simulation driver refer to Chapter 8.5.1 "System Drive  
Simulator (SysCall.DLL)".  
148  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.4.3 Operation Check on IT-2000 (Using COM2KEY/XY)  
If software coordination through simulation has been completed, it should be transferred onto the  
IT-2000 for operation checks. To do this use the COM2KEY utility. The COM2KEY utility will,  
when the COM port of a personal computer is connected with the IT-2000 via the dedicated cable  
(DT-9689AX), use the personal computer as a dumb terminal of the IT-2000. For more information  
about the COM2KEY utility refer to Chapter 9.9 "COM2KEY Utility".  
A batch file (1.BAT) for initiating this COM2KEY utility is installed on the basic drive of the IT-  
2000. It can be initiated by using the appropriate numeric key while the IT-2000 is in the command  
prompt state. Since the major purpose of this utility is in assisting application development, it can be  
directly called from AUTOEXEC.BAT. Moreover, it can be registered as a device driver.  
This is convenient for developing device drivers to be registered in CONFIG.SYS. In this case,  
register the COM2KEY utility before registering a developed device driver, and redirect the  
COM2KEY utility to the personal computer with the start-up message of the device driver.  
The following is the program transfer procedure used with the COM2KEY utility.  
Connect the personal computer and IT-2000 with the dedicated cable (DT-9689AX).  
Initiate the terminal software on the personal computer side and establish communication at  
9600 bps. There are no particular requirements for use of the terminal software. YMODEM/bat  
protocol is available.  
Initiate COM2KEY on the IT-2000. For information about the initiation method, refer to Chapter  
9.9 "COM2KEY Utility".  
With the above procedure the command prompt of the IT-2000 will appear on the terminal  
software screen. Under this condition initiate the XY utility and perform the program transfer, as  
follows:  
D: >  
D: >xy/ry /N  
After the above operation has been performed the IT-2000 remains in the wait state for file  
reception with the YMOD EM/bat protocol. Use the upload function of the terminal software to  
transfer the application program.  
If file transfer has been completed, the operation check of the program can be performed.  
Of course, this MS-Windows can be initiated with a command line displayed by the terminal  
software on the personal computer.  
D:>cd windows  
D: WINDOWS>WIN aplic  
149  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
8.4.4 Installation of Application Program  
This section describes how to install the application program, after it has been debugged, on the  
actual terminal. The following table summarizes IT-2000 installation required after purchase.  
(1) Installation of main battery and sub-batteries  
(2) Calibration  
(3) Formatting the F-ROM drive (for models with an F-ROM drive).  
(4) Setting the RAM disk size and formatting it (if the RAM disk is used)  
(5) Setting the system time  
(6) Other various setups including the Auto Power OFF time, etc.  
(7) Copying application programs, CONFIG.SYS, AUTOEXEC.BAT, etc.  
This section mainly explains about point (7) in the above table. For information about (2) through  
(6), refer to Chapter 3 "System Menu".  
There are three ways of installing applications in the IT-2000. Each is explained in detail below:  
(1) Installation with a PC card  
(2) Installation from a PC  
(3) Copying application program onto another IT-2000  
(1) Installation with a PC card  
This method is used to automatically install the application using the card boot function. To do this,  
first create an ATA card for card boot and store the developed application program on it. Then  
provide a line through which to copy the application program into the IT-2000 in the  
AUTOEXEC.BAT file that will be executed at card boot.  
How to create a card for installation :  
Make an appropriate directory on the ATA card and copy the application program, files  
that are used by this application program, CONFIG.SYS, and AUTOEXEC.BAT onto  
this directory.  
Create CONFIG.SYS and AUTOEXEC.BAT for card boot. At the end of  
AUTOEXEC.BAT add a line for copying the above mentioned directory wholly onto the  
user disk.  
The above steps complete the creation of a card for installation.  
150  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Installation work :  
In the slot, insert the ATA card that has been created for installation and lock the card  
lock switch.  
If the terminal power is currently on, turn it off. Then press the RESET switch to initiate  
the System Menu. Turn the Power switch to OFF and then to ON. The card boot process  
will take place.  
If the batch files called from AUTOEXEC.BAT have been successfully executed,  
installation of the application has been completed.  
(2) Installation from a PC  
This method is used to directly transfer the appropriate files from the PC to the IT-2000 using the  
serial cable or I/O Box. For information about this method of file transfer from the PC refer to  
Chapter 3.10 " YMODEM Utility", or Chapter 3.11 "FLINK Command".  
(3) Copying application program onto another IT-2000  
This method is used to mirror-copy the entire contents of the F-ROM drive of one IT-2000 to  
another IT-2000. If an application has been installed on one IT-2000 the application can be installed  
on another IT-2000. No accessories, such as a card or cable, are required. For more information  
refer to Chapter 3.11 "FLINK Command".  
151  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.5 Simulation Driver  
The simulation driver is used to develop on a personal computer the application programs that run  
on the IT-2000.  
The application development libraries supported for this terminal control only the hardware that is  
compatible with the IBM PC/AT. This is important to remember if the application programs for the  
terminal are developed on a personal computer. Although each library is linked to the application  
program to form an executable program, they do not contain code that is specific to the hardware of  
the handy terminal. Consequently, if a simulation driver is used rather than one of the drivers  
dependent on the terminal hardware, the application program can be made to run, without  
modification, on the personal computer. This is the basic concept of simulation.  
The diagram below shows the simulation environment that has been constructed on the personal  
computer. By replacing SysCall.DLL with the simulator, there will not be any part which depends  
on the IT-2000 hardware. This allows the simulation program to run on the personal computer  
without having no software modification for application program.  
Application Program  
Mouse Event  
LibSYSW.LIB  
LibOBRW.LIB  
LibYMOD.LIB  
LibYMOD.LIB  
Display Req.  
Std. VGA Drv.  
MS-Windows  
Std. Mouse Drv.  
OBRLIB.DLL  
YMODEM.DL  
PADCTRL.VBX  
FLINK.DLL  
Std. COM Drv.  
LibSYSW.LIB  
AT Architecture  
SysCall.DLL (Simulator)  
Fig. 8.6  
In the following chapters, System Library Simulator (SysCall.DLL) is explained in detail.  
152  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
8.5.1 System Library Simulator (SysCall.DLL)  
Overview  
This system library simulator can be called by various libraries and application program and  
simulate the operations of the dedicated IT-2000 hardware.  
File name  
SysCall.DLL  
Note:  
In the development tool package, the file name is “SysCallp.DLL”. When you use the file, change  
the name of file to “SysCall.DLL”.  
Function  
In principle SysCall.DLL is called via the system library (LibSYSW.LIB) and makes various setups  
regarding the IT-2000 hardware. Under the Windows environment call of a DLL is performed by  
specifying the DLL name and exported entry name. Therefore, if a SysCall.DLL to be called has  
been replaced with other one for simulation, the calling subject may not be aware of the fact.  
SysCall.DLL for simulation retains the value, which, virtually, should be set in the hardware, in  
memory according to the request from the application program. And, it returns this value when the  
application program requests the acquisition of this value.  
If, for example, the application program puts calls a function to turn on the backlight, the backlight  
flag inside the SysCall.DLL for simulation will be set. Subsequently, if the application program  
issues an acquisition request of the backlight status, the SysCall.DLL returns the flag value that has  
been set previously. At this time, note that this simulator does not perform an exact simulation of the  
IT-2000. In short, on an actual IT-2000 the backlight will be automatically turned off if the non-  
operation state continues for a given period of time after it is turned on, however, this function does  
not work on the simulator. The above mentioned flag in the simulator can be confirmed with the  
monitor window opened on the screen. This window will be opened at the timing when a program  
that calls SysCall.DLL is loaded into memory.  
153  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Fig. 8.7  
On the IT-2000 the backlight can be turned on and off by means of Fn + '7'. Namely, the backlight  
status can be changed not only from the application program but also by the user's operation.  
This operation on the simulator can be performed by clicking on the corresponding position on the  
monitor screen. As shown in the above figure, there is a radio button to mimic the backlight, which  
allows the current setup to be modified if the button is clicked on by the mouse.  
Installation method  
Copy SysCall.DLL for simulation in the Windows System directory of the personal computer. As  
explained already, SysCall.DLL for the actual terminal and SysCall.DLL for simulation have the  
identical file name. Exercise care not to copy the other file.  
Monitor window  
The following figure shows the relationship between the monitor window and system library. But,  
all the accesses to the system library can not be monitored with this window.  
For example, SYS_SetResumeCondition and alarm-related services are not included. It is not of  
course true that the simulator does not support these functions being not displayed. The reason is  
that the monitor window is designed to display the selected items necessary for application  
development so that the display area looks neatly organized.  
154  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SYS_GetLcdContrast  
SYS_SetLcdContrast  
SYS_GetBuzzerVolume  
SYS_SetBuzzerVolume  
SYS_LcdContrastUp  
SYS_LcdContrastDown  
SYS_GetABC  
SYS_SetABC  
SYS_GetAboTime  
SYS_SetAboTime  
SYS_SetThresholdOfABC  
SYS_GetThresholdOfABC  
SYS_GetApoTime  
SYS_SetApoTime  
SYS_GetLBStatus  
SYS_GetConnectorStatus  
SYS_SetConnectorStatus  
SYS_GetBackLight  
SYS_SetBackLight  
SYS_GetKeyClick  
SYS_SetKeyClick  
SYS_GetPMStatus  
SYS_SetPMStatus  
SYS_GetCOM2Config  
SYS_SetCOM2Config  
SYS_GetDevicePower  
SYS_SetDevicePower  
Fig. 8.8  
155  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Note on the simulation:  
As explained previously, this simulator does not exactly simulate the IT-2000 operations. Moreover,  
some operations can not be simulated because of the difference between the IT-2000 and personal  
computer in terms of the hardware.  
Restrictions regarding the COM port  
The operation of the COM port (8-pin) of the IT-2000 can be programmed in the same way as  
for the COM1 port of the IBM PC/AT except the power control method. However, this post uses  
an 8-pin DIN connector, which has a different shape from the COM port connector of the general  
personal computers. Also, this connector is supplied a 5V power, which in turn provides power  
to an external device such as an OBR. Consequently, although it is possible to develop, on a  
personal computer, such a program that uses the COM port, it is not permitted to debug the  
program while an external device such as the OBR is being connected to the port.  
Restictions regarding the IrDA port  
The IT-2000 has installed the hardware to support the IrDA interface, which is controlled by  
the dedicated driver.  
Many recent personal computers also support the IrDA interface, however, the driver for the  
IT-2000 can not be operated on these personal computers because of the difference in the  
hardware. The IrDA driver for the IT-2000 has been installed in a form of a COM driver  
(COM2) of MS-Windows. Therefore, if the user develops an application program that uses the  
COM2 port, it can be operated with the IrDA driver of the IT-2000. Note, in this case, that the  
IrDA driver on the IT-2000 is a subset of the COM port driver of MS-Windows.  
156  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.6 Library  
8.6.1 Overview  
Since the IBM PC/AT architecture has been adopted in this system, all libraries including graphic  
library supported by Microsoft C/C++ ver. 7.0 or later versions can be used. In addition to those,  
the following dedicated libraries are available for the IT-2000 system.  
Name of library  
System Library  
Description  
Page  
158  
Dedicated libraries for IT-2000 and to control various devices  
available to the system. These libraries include back light  
control, contrast control, battery voltage low detection, alarm  
setting, etc.  
Keypad Library  
Libraries to call the functions of Keypad driver. They are used to  
input keys through keypad and to acquire coordinates on screen,  
etc.  
196  
OBR Library  
Libraries to control the OBR functions. OBRs supported by the  
system are the pen type and the ccd type.  
Libraries to transfer a file using YMODEM/bat protocol from an  
application of Windows.  
This is used for communication between IT-2000s or, between  
IT-2000 and personal computer.  
213  
237  
243  
YMODEM Library  
FLINK Library  
157  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
8.6.2 System Library  
Overview  
The IT-2000 has various dedicated functions that can control the backlight and the power of various  
devices by software. These functions are consisted of the programs of the expanded BIOS in the  
ROM and the keyboard controller (refer to Chapter 6 “Keyboard Controller”.). This library is used to  
call the expanded BIOS and the keyboard controller from application programs developed with the C  
language or Visual BASIC. The system library is consisted of the following files.  
SysLib.H ..................... Header file for system library (for C language)  
LibSysW.LIB .............. Common library for each memory model (for C language)  
SysCall.DLL ............... System library  
VKD.386 ....................  
Communication module for keyboard controller  
The relationship among the files is as follow. If your application program is developed with  
C language, LibSysW.LIB must be linked. It can call automatically SysCall.DLL when the  
application program is executed.  
Application Program  
written by VC  
LibSysW.LIB  
Application Program  
written by VB  
SysCall.DLL  
KBC  
Ext. BIOS  
VKD.386  
Fig. 8.9  
158  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
List of Libraries  
The following functions are supplied in the system library:  
Function  
Acquisition of BIOS Version  
Acquisition of Memory Device Size  
Setting/Acquisition LCD Contrast  
Increasing/Decreasing LCD Contrast  
Switching Over COM2 Channel  
Setting/Acquisition Reason Mask for  
Reboot  
Page  
Function  
Page  
178  
179  
180  
181  
182  
184  
160 Software Card Lock  
161 Acquisition of Connector Status  
162 Key Click Sound ON/OFF  
163 Acquisition of Key Click Sound Status  
164 Acquisition of Reboot Reason  
165 Acquisition of OFF Reason  
Reboot Request  
166 Setting Cancellation of Next Resume  
Process  
167 Acquisition of Cancellation Status of  
Next Resume Process  
184  
185  
Setting ABO Time  
Acquisition of ABO Time  
Setting ABC (Auto Backlight Control)  
status  
168 Request of Suspend (Software OFF)  
169 Acquisition of Low Battery Voltage  
Status  
186  
187  
Acquisition of ABC (Auto Backlight  
Control) Status  
170 Setting APO Time  
188  
Setting/Acquisition of ABC Threshold  
Backlight ON/OFF  
Acquisition of Backlight Status  
Setting Buzzer Volume  
171 Acquisition of APO Time  
172 Setting Status of Alarm  
173 Acquisition of Alarm Setting  
174 Resetting Alarm  
175 Setting/Acquisition of Power ON  
Alarm  
189  
190  
191  
192  
193  
Acquisition of Buzzer Volume  
Acquisition of Device Power Status  
Device Power ON/OFF  
176 Setting/Acquisition of Status of Power  
Control Function  
177 Setting Key Click Sound ON  
194  
195  
159  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of BIOS Version  
Acquires the ROM BIOS version number, which consists of the following three numbers:  
major number, minor number, sub-number.  
SYNTAX  
long SYS_GetBiosVersion();  
INPUT  
None  
OUTPUT  
b23 to b16 Major number  
b15 to b8  
b7 to b0  
Minor number  
Sub-number  
160  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Memory Device Size  
If the memory device size is designated, the total capacity of the DRAM and the number of  
NAND FROM chips is read. The memory device size is the total capacity of all the physically  
installed devices, and not the disc capacity.  
SYNTAX  
int SYS_GetMemCapacity(int nDevice);  
INPUT  
nDevice = device type  
0
1
DRAM  
NAND FROM  
OUTPUT  
= -1  
Input parameter error  
<> -1  
DRAM size (by the unit of 1K)(where nDevice = 0)  
Actual installed number of NAND chips (where nDevice = 1)  
161  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting/Acquisition LCD Contrast  
The contrast of the LCD display is affected and varied by the ambient temperature. Therefore,  
this terminal automatically detects the variation of ambient temperature and determines an optimal  
contrast based on the acquired data. However, it may not immediately react to rapid temperature  
variations or be ideal for each specific user. With this in mind, the terminal is provided with a means  
to increase or decrease the LCD contrast manually.  
The contrast value returned by this function is a correction value to the optimum contrast that has  
been determined by automatic calculation. The value returned will be zero if no correction is made  
manually; +1 or -1 will be returned if the contrast is increased or decreased by one step, respectively.  
The range of contrast values that can be set or read varies according to the ambient temperature.  
This is because the range of setup values that can be set for the hardware is between 0 and 31. If, for  
example, the automatically calculated value is 10, the possible correction range is between - 10 and  
+21. Consequently, the range of contrast values that can be read or set is between - 31 and +31.  
The practical use of this library function lies in saving or loading the contrast setup prior to using the  
SYS_LcdContrastUp() or SYS_LcdContrastDown() function.  
SYNTAX  
int SYS_GetLcdContrast(int WINFAR *nValue);  
INPUT  
nValue = Pointer to the area where the current correction value is acquired.  
OUTPUT  
=
0
Normal  
= -2  
= -3  
No response from KBC  
VxD not registered  
SYNTAX  
INPUT  
int SYS_SetLcdContrast(int nValue);  
nValue = Correction value to be set  
OUTPUT  
= 0  
Normal  
= -2  
= -3  
No response from KBC  
VxD not registered  
162  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Increasing/Decreasing LCD Contrast  
The contrast of the LCD display varies with the ambient temperature. Therefore, this terminal  
automatically detects the ambient temperature and determines an optimal contrast based on the  
acquired data. However, it may not immediately react to rapid temperature variations or be ideal for  
each specific user. This function is used to correct the contrast value, which has been automatically  
calculated by the system, to an optimal level.  
The resulting contrast value adjusted using this function can be acquired via the  
SYS_GetLcdContrast() function.  
SYNTAX  
int SYS_LcdContrastUp();  
INPUT  
None  
OUTPUT  
=
0
Normal  
= -2 No response from KBC  
= -3 VxD not registered  
SYNTAX  
INPUT  
int SYS_LcdContrastDown();  
None  
OUTPUT  
=
0
Normal  
= -2  
= -3  
No response from KBC  
VxD not registered  
163  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Switching Over COM2 Channel  
IR, 14-pin, or 3-pin communication interface can be selected on the COM2 port. However,  
since the 3-pin interface is an optional means to maintain software compatibility with other  
models, it is not implemented on this terminal.  
SYNTAX  
int SYS_GetCOM2Config();  
INPUT  
None  
OUTPUT  
= 0  
= 1  
= 2  
= 3  
Not selected (default setting at RESET)  
14-pin  
3-pin  
IR  
SYNTAX  
INPUT  
int SYS_SetCOM2Config(int nDevice);  
nDevlce = Device to be used  
0
1
2
3
Not used  
14-pin  
3-pin  
IR  
OUTPUT  
= 0  
Normal  
= -1 Parameter error  
Note:  
This function is not related to the device power control. As a result, this function does not need to be  
restored to the "Not used" condition after the device has been used.  
164  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting/Acquisition of Reason Mask for Reboot  
To acquire the reboot request reason, enable or disable “mounting on I/O Box” or use of the CI  
signal for boot-up.  
SYNTAX  
int SYS_GetOnEventMask();  
INPUT  
None  
OUTPUT  
b0 = 0  
Enable use of ring signal  
1
b1 = 0  
1
Disable use of ring signal  
Enable use of “mounting on I/O Box”  
Disable use of “mounting on I/O Box”  
SYNTAX  
INPUT  
int SYS_SetOnEventMask(int nMask);  
nMask = Setting the reboot reason mask  
b0 = 0 Enable use of ring signal  
1
Disable use of ring signal  
b1 = 0 Enable use of “mounting on I/O Box”  
1
Disable use of “mounting on I/O Box”  
OUTPUT  
= 0  
Normal  
= -1  
Parameter error  
165  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Reboot Request  
This function is used to restart (reboot) the system without suspending IT-2000 operations.  
SYNTAX  
int SYS_Reboot(int nMode);  
INPUT  
nMode = Reboot type  
0
1
Initiates the application.  
Initiates the system menu.  
OUTPUT  
= 0  
Normal  
= -1 Parameter error  
166  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting ABO Time  
The ABO (Auto Backlight OFF) function is used to automatically turn off the backlight if neither  
key entry nor touch-panel entry is permitted for a certain period of time. This function is used to  
set the ABO time. Enable ABO by selecting a number between 1 and 15, which corresponds to  
a period of between 20 seconds and 5 minutes.  
SYNTAX  
int SYS_SetAboTime(int nValue);  
INPUT  
nValue = ABO time  
0
Not activate ABO  
1 to 15 Activates ABO in specified number x 20 seconds.  
OUTPUT  
= 0  
Normal  
= -1  
= -3  
Parameter error  
VxD not registered  
Note:  
This function will be implemented by a software timer. Therefore, the period until the backlight is  
actually turned off has an error of +/- 10 % associated with it.  
167  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of ABO Time  
This function is used to read the ABO setting.  
SYNTAX  
int SYS_GetAboTime();  
INPUT  
None  
OUTPUT  
= 0  
Not activate ABO  
= 1 to 15  
= - 2  
ABO time in units of 20 seconds  
No response from KBC  
VxD not registered  
= - 3  
168  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting ABC (Auto Backlight Control) Status  
The ABC (Auto Backlight Control) function is used to sense the ambient light intensity and  
automatically turns ON/OFF the backlight. This function is used to enable or disable the ABC  
function.  
SYNTAX  
int SYS_SetABC(int nOnOff);  
INPUT  
nOnOff = 0  
Other than 0  
OFF  
ON  
OUTPUT  
=
0
Normal  
= -1  
= -2  
= -3  
Parameter error  
No response from KBC  
VxD not registered  
169  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of ABC (Auto Backlight Control) Status  
The ABC (Auto Backlight Control) function is used to sense the ambient light intensity and  
automatically turns ON/OFF the backlight. This function acquires the current setting of the ABC  
function.  
SYNTAX  
int SYS_GetABC();  
INPUT  
None  
OUTPUT  
0
ABC in OFF status  
1
ABC in ON status  
2
ABC temporarily disabled  
No response from KBC  
VxD not registered  
- 2  
- 3  
170  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting/Acquisition of ABC Threshold  
The ABC (Auto Backlight Control) function is used to sense the ambient light intensity and  
automatically turns ON/OFF the backlight. This function is used to set marginal levels across  
which the backlight changes from ON to OFF or from OFF to ON.  
If the readout on the AD converter falls below OnValue, the backlight turns on, and if it exceeds  
OffValue, the backlight turns off. If these two levels are identical or too close each other, the  
backlight may flicker. To avoid this problem set OnValue so that it is slightly less than OffValue.  
SYNTAX  
int SYS_SetThresholdOfABC(int OnValue, int OffValue);  
INPUT  
OnValue = 0 to 255  
OffValue = 0 to 255  
OUTPUT  
=
0
Normal  
= - 2  
= - 3  
No response from KBC  
VxD not registered  
SYNTAX  
INPUT  
int SYS_GetThresholdOfABC(int *OnValue, int *OffValue);  
OnValue = Pointer to the area in which the ON threshold value is stored.  
OffValue = Pointer to the area in which the OFF threshold value is stored.  
OUTPUT  
= 0  
Normal  
= -2 No response from KBC  
= -3 VxD not registered  
171  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Backlight ON/OFF  
This function is used to forcibly turn ON or OFF the backlight. If turned ON by this function, the  
backlight will remain on until Backlight OFF is triggered by the Backlight OFF function or ABO.  
If this function is activated under the ABC control, the ABC will be temporarily disabled, and will  
be enabled again when Backlight OFF is triggered by the Backlight OFF function or ABO.  
SYNTAX  
int SYS_SetBacklight(int nOnOff);  
INPUT  
nOnOff =  
0
OFF  
ON  
1
OUTPUT  
= 0  
Normal  
= -2 No response from KBC  
= -3 VxD not registered  
172  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Backlight Status  
This function acquires the current backlight status.  
SYNTAX  
int SYS_GetBacklight();  
INPUT  
None  
OUTPUT  
=
=
0
1
Backlight OFF  
Backlight ON  
= -2 No response from KBC  
= -3 VxD not registered  
173  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting Buzzer Volume  
Sets the buzzer volume to one of four levels: Large/Medium/Small/OFF.  
SYNTAX  
int SYS_SetBuzzerVolume(int nVolume);  
INPUT  
nVolume = 0  
OFF  
1
2
3
Small  
Medium  
Large  
OUTPUT  
=
0
Normal  
= -1 Parameter error  
= -2 No response from KBC  
= -3 VxD not registered  
174  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Buzzer Volume  
Acquires the buzzer volume as one of four levels: Large/Medium/Small/OFF.  
SYNTAX  
int SYS_GetBuzzerVolume();  
INPUT  
None  
OUTPUT  
0
1
2
3
OFF  
Small  
Medium  
Large  
-2 No response from KBC  
-3 VxD not registered  
175  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Device Power Status  
Acquires the current power conditions (ON/OFF) of each device.  
SYNTAX  
int SYS_GetDevicePower(int Device);  
INPUT  
Device = device to be selected  
2
IrDA  
3
14-pin I/F  
8-pin I/F  
Reserved  
5
Other  
OUTPUT  
1
0
Power ON  
Power OFF  
Note:  
This function is used to control the power to devices of this system. Never designate parameters  
other than those specified on this page.  
176  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Device Power ON/OFF  
Used to turn ON and OFF the power of each device.  
SYNTAX  
int SYS_SetDevicePower(int Device, int OnOff);  
INPUT  
Device = device to be selected  
2
IrDA  
3
14-pin I/F  
8-pin I/F  
Reserved  
5
Other  
OnOff = ON/OFF setting  
0
1
Turns OFF.  
Turns ON.  
OUTPUT  
0
Normal termination  
Note:  
This function is used to control the power to the devices in this system. Never designate parameters  
other than those specified on this page.  
177  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Software Card Lock  
Sets or acquires the Lock/Unlock status of the software-type card lock switch.  
This machine has a card lock mechanism that is on the card case to prevent accidental removal  
of the card. This mechanism has a software driver that detects the released state of this lock and  
executes the appropriate file closing procedure. However, some types of cards, depending on the  
card shape, can not be fastened by the lock switch. If this is the case, even if a card is present it  
will not be detected. This function is provided to handle this type of card.  
To use a card for which the card lock mechanism can not be used, call this function in advance to  
set the software lock switch to ON. Now a card can be detected when it is inserted or removed.  
SYNTAX  
int SYS_SetCardLock(int OnOff);  
INPUT  
OnOff = Cardlock ON/OFF  
0
Unlock  
Lock  
Other than 0  
OUTPUT  
0
Normal termination  
Logic Circuit of Software Card-Lock  
PCMCIA  
Card  
Software Lock  
Switch  
GA  
Fig. 8.10  
178  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Connector Status  
Acquires the connection setting of the I/O Box and AC adaptor.  
SYNTAX  
int SYS_GetConnectorStatus(int nType);  
INPUT  
nType = Connector type  
0
1
I/O Box  
AC adaptor or I/O Box  
OUTPUT  
=
=
0
1
Not connected  
Connected  
= -1  
Parameter error  
179  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Key Click Sound ON/OFF  
Sets the key click sound to ON or OFF.  
SYNTAX  
int SYS_SetKeyClck(int OnOff);  
INPUT  
nOnOff =  
0
OFF  
ON  
Other than 0  
OUTPUT  
=
0
Normal  
= -2 No response from KBC  
= -3 VxD not registered  
180  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Key Click Sound Status  
Acquires the key click sound ON/OFF setting.  
SYNTAX  
int SYS_GetKeyClick();  
INPUT  
None  
OUTPUT  
=
=
0
1
OFF  
ON  
= -2  
= -3  
No response from KBC  
VxD not registered  
181  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Reboot Reason  
Used to acquire the reason the system was rebooted.  
SYNTAX  
int SYS_GetPowerOnFactor();  
INPUT  
None  
OUTPUT  
b0 Power key  
b1 Reset button  
b2 Alarm  
b3 Ring signal  
b4 IT-2000 is being set on I/O Box  
Note :  
If the reset button is pressed the system menu is initiated. This means that an application program  
will never acquire the status of "RESET switch being pressed" as the reboot reason.  
182  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of OFF Reason  
Acquires the reason that the system was most recently turned OFF.  
SYNTAX  
int SYS_GetPowerOffFactor();  
INPUT  
None  
OUTPUT  
b0  
Power key  
b1  
Reset switch  
b2  
Reserved  
b3  
LBO  
b4,b6, b7  
Reserved  
b5  
LB1 timeout (indicates “OFF” by the condition of battery voltage low.)  
b8  
APO  
b9  
Software-triggered OFF  
Reserved  
b10 to b15  
Note:  
If the reset switch is pressed the system menu is initiated. This means that an application  
program will never acquire the status of "Reset switch being pressed" as the reboot reason.  
If the system is rebooted, the reason it was set OFF will be cleared. Therefore, zero will be  
acquired if the reason it was set OFF is read for the first time after rebooting.  
If "Cancellation of the next resume process" is set as the reason the power was set OFF  
(including Power key, APO, Software-triggered OFF, etc.), the reason it was set OFF will  
be cleared during the reboot process.  
183  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting Cancellation of Next Resume Process  
Sets the power-on process (Resume/Boot) for each power OFF reason. The default setting is  
Resume On.  
SYNTAX  
int SYS_SetResumeCondition(int nCondition);  
INPUT  
nCondition = b0  
b1 to b7  
Power key  
Reserved  
APO  
0 = Resume On, 1 = Boot  
0 = Resume On, 1 = Boot  
b8  
b9  
Software-triggered OFF 0 = Resume On, 1 = Boot  
b10 to b15 Reserved  
OUTPUT  
= 0  
Normal  
= -1  
Parameter error  
Note :  
With this function the power-on process can be set for each of the reasons the power is turned  
OFF: Power key, APO, and Software-triggered OFF. Therefore, if set to "The next power-on  
process is boot" from the application, it is necessary to specify all three parts with the  
corresponding bits.  
184  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Cancellation Status of Next Resume Process  
Acquires the power-on process setting (Resume On/Boot) for each power-off reason.  
SYNTAX  
int SYS_GetResumeCondition();  
INPUT  
None  
OUTPUT  
b0  
b1 to b7  
b8  
Power key  
Reserved  
APO  
Software-triggered OFF  
Reserved  
0 = Resume ON, 1 = Boot  
0 = Resume ON, 1 = Boot  
0 = Resume ON, 1 = Boot  
b9  
b10 to b15  
185  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Request of Suspend (Software-triggered OFF)  
Used to turn off the system with the software. If there is a need to specify the next boot-up  
process, complete "Setting Cancellation of Next Resume Process" beforehand, then call this  
function.  
SYNTAX  
void SYS_PowerOff();  
INPUT  
None  
OUTPUT  
None  
186  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Low Battery Voltage Status  
An APM (Advanced Power Management) BIOS has been installed in this terminal. This function is  
used to directly refer the hardware conditions which are translated into input signals for the APM  
BIOS.  
SYNTAX  
int SYS_GetLBStatus();  
INPUT  
None  
OUTPUT  
b0  
Reserved  
b1  
b2  
b3  
b4 to b7  
LB1 event: Main battery voltage low.  
LB2 event: Sub-battery voltage low.  
LB3 event: Memory card battery voltage low.  
Reserved  
187  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting APO Time  
Used to set a time until APO (Auto Power OFF) occurs.  
SYNTAX  
int SYS_SetApoTime (int nValue);  
INPUT  
nValue =  
APO time  
0
Does not cause APO.  
1 to 15  
Causes APO in the specified-number of minutes plus  
30 seconds.  
The actual APO time has an error of +/- 25 seconds.  
OUTPUT  
=
0
Normal  
Parameter error  
= -1  
Note :  
Auto Power OFF will work if the power control function is active. For more information about the  
power control function refer to "Setting/Acquisition of Status of Power Control Function".  
188  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of APO Time  
Acquires the currently set APO time.  
SYNTAX  
int SYS_GetApoTime();  
INPUT  
None  
OUTPUT  
0
Disable the APO.  
1 to 15  
Enable the APO in the specified-number of minutes plus 30 seconds.  
The actual APO time has an error of +/- 25 seconds.  
Note :  
Auto Power OFF will work if the power control function is active. For more information about  
the power control function refer to "Setting/Acquisition of Status of Power Control Function".  
189  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting Status of Alarm  
This function is used to set the alarm so that Int4Ah will be executed at the specified time. If the set  
time precedes the currently set RTC (Real Time Clock) time, the alarm will be valid on and after the  
following day. If the setup time is later than the currently set RTC time, the alarm will be valid from  
the specified day. To make this possible the user has to set the specified interrupt handling routine to  
Int4Ah. If this function is not reset using the SYS_ResetAlarm() function, the alarm will activate  
(repeatedly set) for each 24-hour period. Call the SYS_SetPowerOnAlarm() function to turn on the  
system at the alarm time specified by this function.  
SYNTAX  
int SYS_SetAlarm(int hour, int min, int sec);  
INPUT  
hour = hours  
(in decimal number)  
min = minutes (in decimal number)  
sec = seconds (in decimal number)  
OUTPUT  
0
Normal  
< 0 Error (error within INT1Ah)  
Note:  
This function simply calls INT1AH (AH = 6) internally. Therefore, if this function or INT1Ah  
(AH=6) is called and if the alarm has already been set, an error results.  
Note that the validity of parameters as time is not checked.  
190  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Acquisition of Alarm Setting  
This function is used to acquire the current alarm setting made for the RTC (Real Time Clock).  
SYNTAX  
void SYS_GetAlarm(int *hour, int *min, int *sec);  
INPUT  
hour = Pointer to the area from which hours is read.  
min =  
Pointer to the area from which minutes is read.  
sec = Pointer to the area from which seconds is read.  
OUTPUT  
None  
Note :  
This function returns the time data set for the RTC. Note that the validity of data as time is not  
checked.  
191  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Resetting Alarm  
This function prohibits an INT4Ah interrupt by internally calling INT1Ah (Ah = 7).  
Note that neither the time data set for the RTC is erased nor is the power ON alarm setting for the  
SYS_SetPowerOnAlarm() function canceled by this function. If this function is called with the  
power ON alarm active, the alarm is temporarily reset. However, the RTC will be automatically set  
to active after the power is turned off again to enable the power ON alarm.  
The power ON alarm can also be canceled using the SYS_SetPowerOnAlarm() function.  
SYNTAX  
int SYS_ResetAlarm();  
INPUT  
None  
OUTPUT  
0
Normal  
Error  
< 0  
192  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting/Acquisition of Power ON Alarm  
This terminal has a function to automatically turn on the power to the main unit at the specified time.  
This function requires the RTC (Real Time Clock) function. Normally, an INT4Ah interrupt will  
occur when the setting is being made on the RTC. This function makes it possible to add the  
function which turns on the main unit at the desired time.  
SYNTAX  
int SYS_SetPowerOnAlarm(int OnOff);  
INPUT  
OnOff = Power On setup  
0
Does not turn on the power.  
Turns on the power.  
Other than 0  
OUTPUT  
0
Normal  
SYNTAX  
INPUT  
int SYS_GetPowerOnAlarm();  
None  
OUTPUT  
0
=
Does not turn on the power.  
Other than 0 = Turns on the power.  
Note :  
The power ON alarm set with this function will be reset if rebooting occurs because the reset  
button is pressed or due to the software.  
193  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting/Acquisition of Status of Power Control Function  
This terminal has incorporated unique power control functions: the auto power OFF mode and  
DOZE mode (CPU low-speed operation mode). Since these functions operate based on monitoring  
a period free from operator's concern over a given interval, they have the potential of affecting the  
execution performance of high-speed communication programs, including that of IrDA.  
To create such a program call this function from it to disable the power control function.  
If the power control function is set to disable, the monitoring of a period free from operator's  
concern is ceased, resulting in auto-power off not taking place. Since the switch to the DOZE  
mode does not occur either, the system can always be operable at high-speed. In short, this function  
is useful if auto-power OFF does not take place during processing, or if enhancing the processing  
speed.  
SYNTAX  
int SYS_GetPMStatus(void);  
INPUT  
None  
OUTPUT  
0 = Disables power control  
1 = Enables power control  
SYNTAX  
void SYS_SetPMStatus(int OnOff);  
INPUT  
OnOff = Power control enable/disable  
0
1
Disables power control  
Enables power control  
OUTPUT  
None  
194  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting Key Click Sound ON  
This function is used by application program to turn ON the key click sound. An example of the use  
is, when an button image on the LCD screen is touched it turns ON the sound. The sound is the same  
tone as those when ten key and keypad are pressed. The setting of key click sound ON/OFF controls  
this sound (refer to “Key Click Sound ON/OFF” on page 180.).  
SYNTAX  
void SYS_MakeKeyClick();  
INPUT  
None  
OUTPUT  
None  
195  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.6.3 Keypad Library  
Overview  
The keypad library (Padctrl.vbx) is used to perform key input with the keyboard that is graphically  
displayed in the screen. This library can be made available when it is registered as a control on the  
application program. This control can be set up according to the specific properties including the  
modification of keypad, acquiring and modifying the key acceptance mode, etc.  
Fig. 8.11  
Note:  
This keypad library (Padctrl.vbx) is a custom control, and can not be used as a separate unit. Prior to  
using this library always register it in the dialog of the application program, which has been  
generated with a 16-bit compiler, Microsoft C/C++ 7.0A or later release (hereinafter referred to as  
"VC") or Visual BASIC 3.0 or later release (hereinafter referred to as "VB").  
The keypad library (Padctrl.vbx) must be located in the same directory as the generated application  
program or in the directory to which a known path is established.  
Keycode  
The keycode format generated by SendMessage (API to publish a message to Windows procedures)  
follows those which are included in the keycode table.  
Timing of accepting a keycode  
A keycode will be accepted at the timing when the inside of the keypad is touched. Therefore, if the  
control is outside the focus in which WM_CHAR can be processed at this timing, the issued  
keycode will be made invalid. So, the application developer should design such a program that the  
control is placed in the focus in which the processing of WM_CHAR is permitted at all times.  
196  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Input acceptance mode  
There are two acceptance modes for key input.  
Down acceptance mode  
When the pen is down on the keypad, the touched area changes to reverse video, and the  
corresponding keycode is generated. The reverse video area will return to normal when the pen is  
up. Even if the pen runs outside the corresponding key area in the mid course, the reverse video  
area continues as-is.  
Up acceptance mode  
When the pen is down on the keypad, the touched area changes to reverse video. If the pen runs  
outside the firstly touched area, the first reverse video area is canceled and a new area will  
change to reverse video. When the pen is up, a keycode corresponding to the current reverse  
video area will be generated. When the pen is up outside the keypad, the current key input  
operation will be invalidated.  
Toggle function  
When the Expansion button on the keypad (upper case alphabets or lower-case alphabets pad) is  
touched, the expansion keypad becomes the active pad. This keypad returns to the previous screen  
after only a single key input is made, unless the touched area is assigned no keycode.  
Repeat function  
The repeat function allows all the successive key inputs before the pen is up to be accepted in a  
lump. This function is valid only in the Down acceptance mode.  
Key click sound  
A key sensing sound is always generated whenever the keypad is touched (Down operation)  
irrespective of the current input acceptance mode. However, it is of course on this keypad the valid  
keycodes should have been set. In the Up acceptance mode if the pen is down to an invalid key area  
and it runs over another valid key area, the key sensing sound will not be generated.  
How to use with a VC application  
In order to develop an application program that utilizes the keypad library with the VC, it is  
necessary to register the keypad library to AppStadio. The following example shows a screen of  
Microsoft Visual C++ver. 1.51.  
197  
Download from Www.Somanuals.com. All Manuals Search And Download.  
(1) Initiate AppStadio, then select "File"- "InstallControls".  
Fig. 8.12  
(2) Move to the directory where the keypad library is placed and select "padctrl.vbx", then click on  
the "Install"button. When "PADCTRL.VBX"is displayed in the "Installled"column, click on the  
"OK" button.  
Fig. 8.13  
198  
Download from Www.Somanuals.com. All Manuals Search And Download.  
(3) A new button is added in the lower section of the toolbox. However, if other controls have been  
registered already, the left hand-side figure will include more buttons.  
Fig. 8.14  
With the above procedure registration of the keypad to AppStadio is completed.  
Explained next is the method of registering the keypad in the dialog. First, add a dialog to register  
the keypad.  
(1) Initiate AppStadio and select "Resource" - "New".  
Fig. 8.15  
199  
Download from Www.Somanuals.com. All Manuals Search And Download.  
(2) As the following dialog is displayed, select "Dialog" and click on the "OK" button.  
Fig. 8.16  
With the above operation the dialog is added as a resource.  
(3) Next, click on the keypad button (as shown in the lower right of the left hand-side figure) of the  
tool box to the pressed-in position and click inside the dialog. This makes the keypad inserted  
in the dialog.  
Fig. 8.17  
200  
Download from Www.Somanuals.com. All Manuals Search And Download.  
(4) Modify the keypad size so that all keys can appear within the screen.  
Fig. 8.18  
(5) Subsequently, layout the necessary controls such as the edit box, etc. on the dialog.  
As the screen size of this system is 384 x 192 (pixels), layout the controls so they can be  
accommodated in this range.  
Fig. 8.19  
201  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Note:  
The keypad library will transmit characters to the control which is focused at. Accordingly, if the  
focus is placed in other control than the edit box, click on the edit box or move the focus over the  
edit box with the program that is using SetFocus(), etc.  
How to use with VB application  
In order to develop an application program that utilizes the keypad library with the VB, it is  
necessary to register the keypad library to Visual BASIC. This operation differs between VB3 and  
VB4, each of which is explained in the following.  
(1) In case of VB4, select "Custom Controls..." from the "Tools" menu.  
Fig. 8.20  
202  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Where VB3 is used, select "Add File..." from the "File" menu.  
Fig. 8.21  
(2) When the following dialog appears for VB4, click on the "Browse..." button.  
Fig. 8.22  
203  
Download from Www.Somanuals.com. All Manuals Search And Download.  
(3) When the following dialog is displayed, move to the directory where the keypad library is  
placed and select "padctrl.vbx" as the file name, then click on the "OK" button.  
Fig. 8.23  
In the case of VB3, the following dialog will appear instead of the dialog of (2). Then move to  
the directory where the keypad library is placed and select "padctrl.vbx" as the file name, then  
click on the "OK" button.  
Fig. 8.24  
204  
Download from Www.Somanuals.com. All Manuals Search And Download.  
(4) In the case of VB4, clicking on the "OK" button makes the previous dialog restored.  
Make sure that the check box at the right of "PADCTRL.VBX" is checked, then click on the  
"OK" button.  
Fig. 8.25  
(5) The left hand-side figures show the results where a new button  
has been added in the lower section of the toolbox. The left one  
is an example for VB4, and the right one is an example for  
VB3, respectively. If other controls have been registered  
already, the left hand-side figures will include more buttons.  
This registration is also possible by dragging and dropping the  
keypad library icon in the tool box.  
Fig. 8.26  
Fig. 8.27  
With the above procedure registration of the keypad to VB is completed.  
205  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Explained next is the method of registering the "keypad" in the dialog.  
(1) First double-click on the "keypad" button  
(the lower left button in the left hand-side  
figure), and the "keypad" is inserted as shown  
in the left hand-side figure.  
Fig. 8.28  
(2) Then modify the size of the "keypad" so that  
all the keys are accommodated in the screen.  
Fig. 8.29  
206  
Download from Www.Somanuals.com. All Manuals Search And Download.  
(3) Subsequently, layout the optional controls such as the edit box, etc. properly in the dialog.  
Because the size of the IT-2000 display is 384 x 192 (pixel), layout them so that they can  
be fit within the range.  
Fig. 8.30  
Note:  
The keypad library will transmit characters to the control which is focused at. Accordingly, if the  
focus is placed in other control than the edit box, click on the edit box or move the focus over the  
edit box with the program that is using SetFocus(), etc.  
Always set "1" to VbProj. If this setup is not made, 2-byte characters can not be transmitted  
properly.  
207  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Explanation of properties  
List of properties  
Property  
PadStatus  
PadShow  
Name  
Key acceptance property  
Keypad display/non-display property Specifies display/non-display of the  
keypad.  
Description  
Specifies Up or Down acceptance.  
KeyNo  
ExtNo  
Expansion key number property  
Expansion keypad number property  
Expansion keycode property  
Specifies which number of key is  
registered in the expansion keypad.  
Specifies whether the key is registered to  
EXT1 pad or EXT2 pad.  
Specifies the keycode of keys to be  
registered.  
KeyCode  
Ext1Data1 -  
Ext1Data48  
(48 pieces  
Ext2Data1 -  
Ext2Data48  
(48 pieces  
ExtPad  
Expansion key image property  
(EXT1)  
Specifies the Picture Handle of the  
registered key (for EXT1 pad).  
Expansion key image property  
(EXT2)  
Specifies the Picture Handle of the  
registered key (for EXT2 pad).  
Expansion pad operation property  
Action property that initiates the  
operation of registering, deleting and  
deleting-all the keys to/from the EXT1 or  
EXT2 pad.  
Picture Handle: This is created from a bitmap file in the both cases of VC and VB.  
The bitmap should be created from two colors and to a size of 32 x 24 dots.  
Key acceptance property  
Function  
Property name  
Type  
This is a property to designate the key input acceptance mode.  
PadStatus  
short  
Value  
0 = Down acceptance (default)  
1 = Up acceptance  
Format  
<In case of VC>  
CVBControl* m_PadCtrl;  
m_PadCtrl->SetNumProperty("PadStatus", 0 or 1);  
<In case of VB>  
Padctrl1.PadStatus = 0 or 1  
208  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Keypad display/non-display property  
Function  
Property name  
Type  
This is a property to switch between display and non-display of the keypad.  
PadStatus  
short  
Value  
0 = non-display  
1 = display (default)  
Format  
<In case of VC>  
CVBControl* m_PadCtrl;  
m_PadCtrl->SetNumProperty("PadShow", 0 or 1);  
<In case of VB>  
Padctrl1.PadShow = 0 or 1  
Expansion key number property  
Function  
This is a property to set up the expansion key number to be registered or  
deleted to/from the expansion pad.  
Property name  
Type  
KeyNo  
short  
Value  
Integer from 0 to 47  
Format  
<In case of VC>  
CVBControl* m_PadCtrl;  
m_PadCtrl->SetNumProperty("KeyNo", 0 to 47);  
<In case of VB>  
Padctrl1. KeyNo = 0 to 47  
Expansion keypad number property  
Function  
This is a property to select the objective expansion key pad to/from which  
the keys are registered or deleted.  
Property name  
Type  
ExtNo  
short  
Value  
1 = EXT1 pad  
2 = EXT2 pad  
Format  
<In case of VC>  
CVBControl* m_PadCtrl;  
m_PadCtrl->SetNumProperty("ExtNo", 1 or 2);  
<In case of VB>  
Padctrl1. ExtNo = 1 or 2  
209  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Expansion keycode property  
Function  
Property name  
Type  
This is a property to set up the keycode of the expansion key to be registered.  
KeyCode  
short  
Value  
Keycode to be set  
Format  
<In case of VC>  
CVBControl* m_PadCtrl;  
m_PadCtrl->SetNumProperty(“KeyCode”, keycode);  
<In case of VB>  
Padctrl1. KeyCode = keycode  
Expansion key image property  
Function  
This is a property to set up the key image of the expansion key to be  
registered.  
Property name  
Ext1Data1 - Ext1Data48 (48 pieces)  
Ext2Data1 - Ext2Data48 (48 pieces)  
Type  
HPIC  
Value  
Picture handle of the bitmap  
Format  
<In case of VC>  
CVBControl* m_PadCtrl;  
m_PadCtrl->SetPictureProperty(Ext1Data1, picture handle);  
<In case of VB>  
Padctrl1. Ext1Data1 = LoadPicture( bitmap file name )  
Expansion pad operation property  
Function  
This is an action property to register, delete or delete-all the data to/from the  
expansion pad.  
ExtPad  
short  
Property name  
Type  
Value  
1 = Register  
2 = Delete  
3 = Delete all  
Format  
<In case of VC>  
CVBControl* m_PadCtrl;  
m_PadCtrl->SetNumProperty( "ExtPad", 1 or 2 or 3);  
<In case of VB>  
Padctrl1. ExtPad = 1 or 2 or 3  
210  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Example of expansion pad operation  
Registration of expansion key pad  
<In case of VC>  
void Cclass::SetProp( void )  
{
HBITMAP hBmp;  
PIC pic;  
HPIC hPic;  
// Loads the bitmap from resouce  
hBmp=LoadBitmap(AfxGetInstanceHandle(),"bitmapresourcename");  
pic.picData.bmp.hbitmap = hBmp;  
pic.picType = PICTYPE_BITMAP;  
hPic = AfxSetPict( NULL, &pic );  
// Creates HPIC.  
m_PadCtrl->SetPictureProperty("Ext1Data1",hPic);  
// Registration of picture property  
AfxReferencePict(hPic,TRUE);//ReferencecountoperationofHPIC  
m_PadCtrl->SetNumProperty( "KeyNo",0 );  
// Registration of Key No. (0-47)  
m_PadCtrl->SetNumProperty( "ExtNo", 1 );  
// Registration of expansion pad No. (1-2)  
m_PadCtrl->SetNumProperty( "KeyCode", 65 );  
// Registration of keycode  
m_PadCtrl->SetNumProperty( "ExtPad", 1 );  
}
<In case of VB>  
Private Sub Command1_Click()  
Padctrl1. KeyNo = 0  
Padctrl1. ExtNo = 1  
Padctrl1. Ext1Data1 = LoadPicture("d: work ocx zen.bmp")  
Padctrl1. KeyCode = 65  
Padctrl1. ExtPad = 1  
End Sub  
211  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Deletion of expansion key pad  
<In case of VC>  
void Cclass::DeleteProp( int KeyNo, int ExtNo )  
{
m_PadCtrl->SetNumProperty( "KeyNo", 0 ); // Registration of Key No.  
(0 to 47)  
m_PadCtrl->SetNumProperty( "ExtNo", 1); //Registrationofexpansion  
padNo. (1to2)  
m_PadCtrl->SetNumProperty( "ExtPad", 2 );  
}
<In case of VB>  
Private Sub Command2_Click()  
Padctrl1. KeyNo = 0  
Padctrl1. ExtNo = 1  
Padctrl1. ExtPad = 2  
End Sub  
Deletion of all expansion pads  
<In case of VC>  
void Cclass::OnAlldelete()  
{
m_PadCtrl->SetNumProperty( "ExtNo", 1 ); // Registration of  
expansion pad No. (1 to 2)  
m_PadCtrl->SetNumProperty( "ExtPad", 3 );  
}
<In case of VB>  
Private Sub Command3_Click()  
Padctrl1. ExtNo = 1  
Padctrl1. ExtPad = 3  
End Sub  
212  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.6.4 OBR Library  
Overview  
The OBR library is used to control the OBRs (Barcode Reader) from application programs  
developed by the user with the C language or Visual BASIC. It supports the following two OBRs :  
DT-9650BCR : Pen-type barcode reader  
DT-9656BCR : CCD barcode reader  
Note about the Libraries  
This library consists of the following three files. Any application program that uses this library  
should include obrlib.h in the corresponding source file. Constants that are passed to the library  
functions and their prototypes are defined in the following header files.  
OBRLIB.H  
LIBOBR.LIB  
OBRLIB.DLL  
Header file for the OBR library  
Library to call OBRLIB.DLL from C language.  
OBR library  
OBRLIB.DLL is downloaded to the same directory of an application program or to the directory  
of Windows when it is used. The type of OBR to use is specified as parameter when OBR_Open is  
called.  
No.  
Function  
OBR_Open  
OBR_Close  
OBR_Send  
OBR_Stat  
Description  
Initialization of COM port and power on  
Release of COM port and power off  
Transmission of command to OBR  
Acknowledgment of received data  
Read of the received data  
OBR_Read  
OBR_Clear  
Invalidation of codes in reception buffer  
OBR_SetUserEvent Event definition issued when reception is completed.  
The OBRLIB.DLL uses the system library (SysCall.DLL) to turn on and off the power supply of the  
COM port. To use this library, an environment which allows the use of SysCall.DLL must be  
available.  
213  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Reception Buffer  
This library uses two reception buffers, as shown below, so that during the processing (read) of one  
of the received barcodes the next barcode can be successfully received.  
Buffer : A  
Buffer : B  
Fig. 8.31  
The following explains the operation sequence by which codes are put into the reception buffer.  
When the first barcode is received, it will be temporarily stored in Buffer A.  
When the second barcode is received, it will be temporarily stored in Buffer B.  
When the third next barcode is received, it will be temporarily stored in Buffer A.  
When the fourth barcode is received, it will be temporarily stored in Buffer B.  
With this library the received barcodes are distributed alternatively to the two buffers as described  
above. If one of the received barcodes is not read, it will be overwritten by a new barcode.  
This necessitates any received data to be acknowledged with the OBR_Stat function or  
OBR_SetUserEvent function, then read using the OBR_Read function after acknowledgment.  
Note:  
If programming with this library, first make the OBR_Open function call. The OBR_Open  
function will turn on the power supply to the COM port and initialize it. It enables the operation  
of other functions (OBR_Send, OBR_Read, etc.) and maintains the power supply to the COM  
port. Therefore, always call the OBR_Close function so that the COM port is turned off and  
freed before completing the use of the OBR (i.e. application).  
DT-9650BCR and DT-9656BCR are not compatible with each other. The OBR_Send function  
will execute necessary processes according to OBR type specified by the OBR_Open function.  
Values to be sent to OBR will not be the same for both the OBR models. Refer to each reference.  
DT-9650BCR and DT-9656BCR have an EEPROM in which the setup contents can be written  
and stored. This eliminates the need to perform setup each time the power is turned on.  
214  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Data Format  
The reception data format is defined as follows:  
Barcode  
Fig. 8.32  
O
215  
Download from Www.Somanuals.com. All Manuals Search And Download.  
List of Available Functions  
Page.  
Function  
OBR_Open  
OBR_Close  
OBR_Send  
OBR_Stat  
Description  
Initialization of COM port and power on  
Release of COM port and power off  
Transmission of command to OBR  
Acknowledgment of received data  
Read of the received data  
OBR_Read  
OBR_Clear  
Invalidation of codes in reception buffer  
OBR_SetUserEvent Event-code definition issued when reception is completed.  
Initialization of OBR  
Initializes the COM port to establish a connection with the OBR, and turns on the power to the COM  
port.  
SYNTAX  
#include "obrlib.h"  
int FAR PASCAL _export OBR_Open(int iOBRtype);  
INPUT  
iOBRType = DT-9650  
= DT-9656  
OUTPUT  
0 = Normal end.  
1 = iOBRType is not correct.  
-1= Open error.  
Note :  
When programming with this OBR library, first make this OBR_Open function call to initialize the  
COM port and the OBR.  
216  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Release of COM Port  
Releases the COM port and turns off the power to the COM port.  
SYNTAX  
#include "obrlib.h"  
void FAR PASCAL _export OBR_Close();  
INPUT  
None  
OUTPUT  
None  
Note :  
Call this function if completing the use of the OBR (i.e. terminating the application program).  
217  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Transmission of Command  
Transmits a command represented by a single ASCII code to the OBR. Various options including  
"Readout mode", "Data transfer format", etc., can be set for this transmission. This setup does not  
have to be made each time the power is turned on if it is written in the EEPROM.  
For information about the setup procedure refer to "Setting Operation Mode/DT-9650BCR"  
on page 223.  
SYNTAX  
#include "obrlib.h"  
int FAR PASCAL _export OBR_Send(char far *pszcmd);  
INPUT  
pszcmd = pointer to command buffer (refer to the Command List.)  
OUTPUT  
= 0  
= 1  
: Normal termination  
: Transmission error  
Note :  
This is to transfer command to OBR. For detail of each OBR command, refer to operation mode  
setting of each OBR command.  
218  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Acknowledgment of Received Data  
Validates barcode data in the reception buffer of the Library. If data is not received completely as  
barcode data after the validation, it will be acknowledged as invalid date.  
SYNTAX  
#include "obrlib.h"  
int FAR PASCAL _export OBR_Stat();  
INPUT  
None  
OUTPUT  
The absolute value shows the number of characters in the received barcode (not  
including a CR). The sign indicates whether the data is a complete barcode or not.  
< 0 Incomplete barcode  
> 0 Complete barcode  
219  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Readout of Received Data  
Acquires the first barcode in the reception buffer and writes it to the specified buffer. The reception  
data SYNTAX is as follows:  
Barcode  
Fig. 8.33  
O
SYNTAX  
#include "obrlib.h"  
int FAR PASCAL _export OBR_Read(void far *pBuf);  
INPUT  
pBuf = Pointer to the buffer that stores the received barcode  
OUTPUT  
The absolute value shows the number of characters in the received barcode.  
The sign indicates the validity of the barcode.  
> 0 Length of received data.  
= 0 Either the reception acknowledgment is not performed (OBR_Stat function is  
not used) or there is no received data.  
< 0 Valid data does not exist.  
Note :  
Before reading a barcode using this function, acknowledge reception with the OBR_Stat function.  
Note that received barcode data will be cleared from the reception buffer after it has been read by the  
OBR_Read function. This means that the following barcode can be read immediately after the  
preceding one, even if there is an error, has been read.  
220  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Invalidating Code in Buffer  
Invalidates a barcode in the reception buffer and clears the reception buffer.  
SYNTAX  
#include "obrlib.h"  
void FAR PASCAL _export OBR_Clear();  
INPUT  
None  
OUTPUT  
None  
221  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Setting event of reception completion  
When a barcode data is received completely, specified message can be sent as user event to the  
specified handle.  
This library will send a message to specified window handle using the SendMessage API. Specified  
hWnd, uMsg, wParam, lParam are used as parameter for the SendMessage API.  
SYNTAX  
#include “obrlib.h”  
void FAR PASCAL _export OBR_SetUserEvent(HWND hWnd, UINT uMsg, WORD  
wParam,LONGlParam);  
INPUT  
hWnd = Destination window handle for message to be sent.  
uMsg = User event message  
wParam = WORD parameter of user event  
lParam = LONG parameter of user event  
OUTPUT  
None  
222  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Setting Operation Mode / DT-9650BCR  
Overview  
On this OBR various settings, as listed below, can be made through command transmission.  
For a list of the actual commands refer to the Command List on page 225.  
1. Specifying the number of read digits  
2. Specifying the CODE39/NW-7 ICG code  
3. Readability of code  
4. Data transfer SYNTAX  
5. Specifying the buzzer activation and LED ON modes  
6. Specifying the output of BEL if decoding is not possible  
7. Specifying the scanning mode  
8. Specifying the sleep mode/stop mode  
9. Write in the EEPROM  
Transmission of Command  
There are two types of commands: normal commands and expanded commands. They must  
be transmitted according to the following procedure.  
Transmission of normal commands  
In order to transmit a command other than the expanded commands included in the Command  
List use the corresponding command symbol without modification.  
Example: To set all codes to "Permit read" with the "Readability of code"  
OBR_Send (“X”);  
Transmission of expanded commands  
To transmit an expanded command included in the Command List follow the procedure below.  
1. First transmit the "Transmission start" command from the expanded commands.  
2. Transmit the objective expanded command.  
3. After the objective expanded command has been transmitted, transmit the "Transmission  
complete" command.  
223  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Example: To set the CODE39 C/D to "Prevent check (without changing the transfer  
function)" with the corresponding expanded commands  
OBR_Send (“u”);  
OBR_Send (“A”);  
OBR_Send (“v”);  
Power-save Mode Control Command  
Used to control the power-save mode of the OBR. See the following diagram.  
Example  
SW input  
Readable condition  
Command “H”  
SW input  
Command “U”  
Command “p”  
Command “o”  
Sleep Mode  
Stop mode  
Fig. 8.34  
Writing Set Values to EEPROM  
The OBR is provided with a function to write the current setting values to EEPROM.  
To do this, transmit the 'y' command. If this is not done, other commands that have been transmitted  
previously to the 'y' command will not be written to EEPROM. As a result, they will be erased when  
the power is turned off and the settings specified by these commands will not be valid the next time  
the power is turned on. However, the following commands can not be used to write a setting value to  
EEPROM.  
One period of buzzer activation/LED ON  
Enable scanning  
Disable scanning  
Special mode (disable scanning after one normal reading)  
Request sleep mode  
Request stop mode  
Command : L  
Command : H  
Command : I  
Command : U  
Command : o  
Command : p  
Command : u  
Command : v  
Expanded command control: Transmission start  
Expanded command control: Transmission complete  
224  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Command List  
(Italic and bold letters indicate default value)  
1
Specifying the number of read digits  
No. of digits Command  
No. of digits Command  
No. of digits  
Command  
1 to 42  
^P  
^Q  
^R  
^S  
^T  
^U  
^V  
^W  
^X  
^Y  
^Z  
^[  
16  
17  
18  
19  
20  
21  
22  
23  
24  
25  
26  
27  
28  
29  
30  
31  
(space)  
32  
33  
34  
35  
36  
37  
38  
39  
40  
41  
42  
0
1
2
3
4
5
6
7
8
9
:
1
2
3
4
5
6
7
8
!
#
$
%
&
(
9
)
*
+
10  
11  
12  
13  
14  
15  
,(comma)  
^
^]  
^^  
^_  
-
.(period)  
/
Item  
Less than one ICG character  
Less than eight ICG characters  
Command  
Default  
Yes  
2.  
=
?
Specify  
CODE39/  
NW-7 ICG  
3.  
Readability of  
code  
--  
All codes  
Enable read  
Disable read  
Enable read  
Disable read  
Enable read  
Disable read  
Enable read  
Disable read  
X
x
A
a
B
b
C
c
--  
--  
Yes  
--  
Yes  
--  
Yes  
--  
CODE39  
NW-7  
WPC  
2 of 5 (Industrial/Standard)  
Enable read  
Disable read  
Enable read  
Disable read  
Enable read  
Disable read  
Enable read  
Disable read  
Enable read  
Disable read  
Disable read  
Enable read  
Forced read  
D
d
E
e
F
f
G
g
W
w
l
m
n
Yes  
--  
Yes  
--  
--  
Yes  
--  
Yes  
--  
Yes  
Yes  
--  
ITF  
CODE11  
CODE93  
CODE128  
WPC add on  
--  
4.  
CODE39  
Data transfer  
format  
Enable full-ASCII conversion  
Disable full-ASCII conversion  
Transfer start/stop codes  
h
i
Z
z
--  
Yes  
--  
Not transfer start/stop codes  
Yes  
225  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
NW-7 start/stop code  
Transfer  
Not transfer  
[
{
q
r
j
k
Yes  
--  
Yes  
--  
--  
Yes  
Change codes to uppercase characters  
Change codes to lowercase characters  
Enable transfer of ABC code  
Disable transfer of ABC code  
C/D (CODE39/NW-7/2of5/CODE11)  
Disable check  
Enable transfer of check  
Disable transfer of check  
Not transfer  
Transfer  
Enable buzzer/LED ON after normal read  
Disable buzzer/LED ON after normal read  
Enable buzzer/LED ON for one time  
R
S
T
P
Q
J
K
L
s
Yes  
--  
--  
Yes  
--  
Yes  
--  
Readout CODE ID  
5.  
Specify  
buzzer  
--  
Yes  
LED OFF when command awakes from sleep  
activation and  
LED ON  
modes  
mode  
LED ON when command awakes from sleep mode  
t
--  
6.  
Output enable  
Output disable  
M
N
--  
Yes  
Specify output  
of BEL when  
the code can  
not be  
decoded  
7.  
Specify  
Scanning enable  
Scanning disable  
H
I
Yes  
--  
scanning mode  
Special mode  
Scanning disable after one normal read  
Request sleep mode  
Request stop mode  
U
o
p
--  
--  
--  
8.  
Specify  
sleep  
mode/stop  
mode  
9.  
Write defaults  
Write current setting values  
Y
y
--  
--  
Write to  
EEPROM  
10.  
Modify  
settings  
11.  
O
--  
Switch to the setting values currently  
stored in EEPROM  
Expanded command control  
Transmission start  
Expanded  
commands  
u
v
--  
--  
Transmission complete  
CODE39 C/D  
A
--  
Disable check (without changing the transfer  
function)  
B
C
Y
Z
--  
--  
--  
Enable check/Transfer  
Enable check/Not transfer  
Disable check/Not transfer  
Disable check/Transfer  
Yes  
226  
Download from Www.Somanuals.com. All Manuals Search And Download.  
NW-7 C/D  
D
--  
Disable check (without changing the transfer  
function)  
E
F
[
--  
--  
--  
Enable check/Transfer  
Enable check/Not transfer  
Disable check/Not transfer  
Disable check/Transfer  
2 of 5 C/D  
Yes  
G
--  
Disable check (without changing the transfer  
function)  
H
I
--  
--  
Enable check/Transfer  
Enable check/Not transfer  
]
--  
Disable  
check/Not  
^
Yes  
transfer  
CODE11 C/D  
Disable check/Transfer  
J
K
L
--  
Yes  
--  
Enable transfer of check (1)  
Disable transfer of check (1)  
Enable transfer of check (2)  
Disable transfer of check (2)  
M
--  
CODE93 C/D  
N
O
P
-
--  
Yes  
--  
Enable transfer of no check  
Disable transfer of no check  
Disable transfer of check  
Enable transfer of check  
Q
CODE128 C/D  
S
--  
No check (without changing the transfer  
function)  
T
U
V
W
X
Yes  
--  
--  
--  
--  
Disable transfer of check  
Disable transfer of no check  
Enable transfer of no check  
Disable transfer of check  
Enable transfer of check  
227  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setting Operation Mode / DT-9656BCR  
Overview  
On the OBR various settings, as listed below, can be made through command transmission.  
For a list of actual commands refer to the Command List on page 229.  
1. Readability of code  
2. Adding a readable code  
3. Data transfer SYNTAX  
4. Condition for the least significant digits  
5. Specifying the buzzer activation mode  
6. Specifying the LED ON mode  
7. Read mode  
8. Read time  
9. Mark/base of barcode  
10. Redundant read  
11. Use of Length CODE  
12. Specifying write to EEPROM  
Transmission of Command  
Commands must be transmitted using the OBR-Send function.  
Example: To specify "Read all codes"  
OBR_Send ("A0");  
Writing Set Values to EEPROM  
The OBR is provided with a function to write the current setting values to EEPROM. To do this,  
transmit the 'Z2' command.  
If this is not done, other commands that have been transmitted previously to the 'Z2' command will  
not be written to EEPROM. As a result, they will be lost when the power is turned off and the  
settings specified by these commands will not be valid the next time the power is turned on.  
Example:  
To specify "Read all codes" and write to EEPROM  
OBR_Send ("A0");  
OBR_Send ("Z2");  
228  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Command List  
Command  
A0  
J1  
Item  
Default  
--  
1.  
Read all codes  
UPC only  
Readability  
of code  
--  
--  
--  
--  
UPC + 2 digits of supplemental only  
UPC + 5 digits of supplemental only  
EAN only  
J2  
J3  
J4  
EAN + 2 digits of supplemental only  
EAN + 5 digits of supplemental only  
DTF only  
J5  
J6  
J7  
--  
--  
--  
ITF only  
J8  
--  
CODE39 only  
NW-7 (CODABAR) only  
CODE93 only  
CODE128 only  
MSI/Plessey only  
UPC  
UPC + 2 digits of supplemental  
UPC + 5 digits of supplemental  
EAN  
EAN + 2 digits of supplemental  
EAN + 5 digits of supplemental  
DTF  
ITF  
CODE39  
NW-7 (CODABAR)  
CODE93  
CODE128  
A2  
A3  
A5  
A6  
A7  
R1  
R2  
R3  
R4  
R5  
R6  
R7  
R8  
B2  
B3  
B5  
B6  
B7  
--  
--  
--  
--  
--  
Yes  
--  
--  
Yes  
--  
2.  
Enable read  
Enable read  
Enable read  
Enable read  
Enable read  
Enable read  
Enable read  
Enable read  
Enable read  
Enable read  
Enable read  
Enable read  
Enable read  
Adding  
readable  
code  
--  
Yes  
Yes  
Yes  
Yes  
--  
--  
--  
MSI/Plessey  
3.  
CODE39  
Data  
transfer  
format  
C0  
C1  
C2  
C3  
D0  
D1  
Yes  
--  
Yes  
--  
--  
Yes  
Not calculate C/D  
Calculate C/D  
Transfer C/D  
Not transfer C/D  
Not transfer start/stop code  
Transfer start/stop code  
NW-7 start/stop code  
ITF/DTF C/D  
F0  
F1  
F2  
F3  
F4  
--  
--  
--  
--  
Yes  
Not transfer  
Transfer ABCD/TN*E  
Transfer abcd/tn*e  
Transfer ABCD/ABCD  
Transfer abcd/abcd  
G0  
G1  
G2  
G3  
Yes  
--  
Yes  
--  
Not calculate C/D  
Calculate C/D  
Transfer C/D  
Not transfer C/D  
229  
Download from Www.Somanuals.com. All Manuals Search And Download.  
UPC-A  
E2  
E3  
Yes  
--  
13 digits: Transfer all  
12 digits: Not transfer "0" header for adjusting the  
number of digits  
E4  
E5  
--  
--  
12 digits: Not transfer C/D  
11 digits: Not transfer C/D and "0" header for  
adjusting the number of digits  
UPC-E  
E6  
E7  
--  
--  
8 digits: Transfer all  
7digits: Not transfer "0" header for adjusting the  
number of digits  
E8  
E9  
Yes  
--  
7 digits: Not transfer C/D  
6 digits: Not transfer C/D and "0" header for  
adjusting the number of digits  
Acquire only system number "0"  
Acquire both system numbers "0" and "1"  
CODE39, NW-7: 1 digit, ITF: 2 digits  
Disable read  
E0  
E1  
Yes  
--  
4.  
Specify  
the least  
significant  
digit  
H2  
H3  
Yes  
--  
Enable read  
5.  
Buzzer of successful read  
Disable buzzer  
Frequency 1 KHz  
Frequency 2 KHz  
Frequency 4 KHz  
Buzzer-ON period  
50 msec  
Specify  
buzzer  
activation  
mode  
W0  
W1  
W2  
W3  
--  
--  
--  
Yes  
W7  
W4  
W5  
W6  
--  
--  
Yes  
--  
100 msec  
250 msec  
500 msec  
Buzzer volume  
T3  
T2  
T1  
T0  
--  
--  
--  
Small  
Medium  
Large  
Maximum  
Yes  
6.  
ON at successful reading  
Disable  
Specify  
LED ON  
mode  
T4  
T8  
T5  
T6  
T7  
T9  
--  
Yes  
--  
--  
--  
Enable  
Period of ON : 0.25 sec  
Period of ON : 0. 5 sec  
Period of ON : 0.75 sec  
Synchronize LED and buzzer  
One-shot read  
Multiple reads  
Continuous read  
Yes  
7.  
Read  
mode  
S0  
S1  
S7  
--  
Yes  
--  
230  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Infinite  
2 sec  
4 sec  
6 sec  
8 sec  
10 sec  
15 sec  
20 sec  
8.  
Y0  
Y1  
Y2  
Y3  
Y4  
Y5  
Y6  
Y7  
Yes  
--  
--  
--  
--  
--  
--  
--  
Read time  
9.  
V2  
V4  
Yes  
--  
Normal contrast  
Both normal/reverse contrast  
Contrast  
of normal  
/reverse  
10.  
No verification  
X0  
X1  
X2  
X3  
--  
Yes  
--  
No. of  
Verification twice  
Verification three times  
Verification four times  
UPC-A  
verifications  
--  
11.  
Use of  
Length  
CODE  
2A  
3A  
Yes  
--  
Not transfer  
Transfer  
UPC-A with supplemental  
2B  
3B  
Yes  
--  
Not transfer  
Transfer  
UPC-E  
2C  
3C  
Yes  
--  
Not transfer  
Transfer  
UPC-E with supplemental  
2D  
3D  
Yes  
--  
Not transfer  
Transfer  
EAN-13  
2E  
3E  
Yes  
--  
Not transfer  
Transfer  
EAN-13 with supplemental  
2F  
3F  
Yes  
--  
Not transfer  
Transfer  
EAN-8  
2G  
3G  
Yes  
--  
Not transfer  
Transfer  
EAN-8 with supplemental  
2H  
3H  
Yes  
--  
Not transfer  
Transfer  
CODE39  
NW-7  
DTF  
2I  
3I  
Yes  
--  
Not transfer  
Transfer  
2J  
3J  
Yes  
--  
Not transfer  
Transfer  
2K  
3K  
Yes  
--  
Not transfer  
Transfer  
ITF  
2L  
3L  
Yes  
--  
Not transfer  
Transfer  
231  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CODE93  
2M  
3M  
Yes  
--  
Not transfer  
Transfer  
CODE128  
MSI/Plessey  
2N  
3N  
Yes  
--  
Not transfer  
Transfer  
2O  
3O  
Yes  
--  
Not transfer  
Transfer  
12.  
Specify  
write to  
EEPROM  
Z2  
--  
232  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8.6.5 YMODEM Library  
Overview  
This library is used to transfer files from Windows applications using the YMODEM/bat protocol.  
The YMODEM library consists of a group of the following files.  
YMODEM.H  
Header file for system library (for C language)  
YMODEM library for C language (for C language)  
Main program of the YMODEM library  
LibYMOD.LIB  
YMODEM.DLL  
Relations between the files are summarized as follows. When developing your application program  
with the C language, never fail to link LibYMOD.LIB with the developed source program. This  
LibYMOD.LIB will automatically call YMODEM.DLL, which is the main program of the system  
library, at each execution of the program. Visual BASIC can directly call this DLL by means of a  
declaration.  
Application Program  
written by VC  
Application Program  
written by VB  
LibYMOD.LIB  
Other PC  
YMODEM.DLL  
Fig. 8.37  
List of libraries  
The YMODEM library supports the following functions:  
Function name Description  
OpenYMODEM Opening the YMODEM library  
SendByYMODEM File transmission with the YMODEM/bat protocol  
SendByYMODEMforVB File transmission with the YMODEM/bat protocol  
(for Visual Basic)  
Page  
RecieveByYMODEM  
SetCommForYMODEM  
CloseYMODEM  
File reception with the YMODEM/bat protocol  
Setting up communication parameters  
Closing the YMODEM library  
233  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Error codes  
Each function of this library will return the following values as the error code.  
Error code  
Description  
Dialog box creation error, etc.  
Transmission file not exist  
Reception file creation error  
Communication time-out  
1
3
4
5
7
8
Reception file write error  
Communication API error of Windows  
OpenYMODEM  
This function should be called prior to using the YMODEM library.  
When this function is called, the COM port will be initialized to the following default values; 9600  
bps, NO PARITY, 8 data bits, and 1 stop bit. When modifying the communication parameters  
including the baud rate, call the SetCommForYMODEM () function after calling this function.  
SYNTAX:  
#include "ymodem.h"  
short WINAPI _export OpenYMODEM( short nPort )  
INPUT:  
nPort = COMport number  
OUTPUT:  
=
=
0
Normal termination  
234  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
SendByYMODEM  
This function is used to transmit a file by means of the YMODEM/bat protocol. Before this function  
is called, the OpenYMODEM function must have been called.  
SYNTAX  
#include "ymodem.h"  
short WINAPI _export SendByYMODEM(short iPkt, short nFiles,  
LPSTR *sPath, BOOL bFullFileName, BOOL bFindSubDir )  
short WINAPI _export SendByYMODEMforVB(short iPkt, short nFiles,  
LPSTR *sPath, BOOL bFullFileName, BOOL bFindSubDir )  
INPUT  
iPkt  
Packet size (1024 or other)  
nFiles  
FileName  
Number of transmitted files  
Pointer to the transmitted file name array  
File names must be specified by their full pathnames.  
bFullFileName TRUE: Use, FALSE: Not use  
Specify whether to use the source-side full pathname as the  
transmitted file name.  
bFindSubDir  
TRUE: Use recursive call, FALSE: Not use recursive call  
When a wild card is used for the transmitted file name, files under  
the sub-directory can be the objective of the file transmission.  
If, for example, the transmitted file is D: TEST *.DAT,  
a directory, D: TEST SUB TEST.DAT is also included in  
the objective of transmission.  
OUTPUT  
= 0  
Normal termination  
Note:  
Into the transmitted file name array store the FAR addresses to the file name character strings.  
LPSTR SndFil[ 100 ] = { "c:  
config.sys", "c:  
autoexec.bat", 0 };  
Whether TRUE or FALSE has been defined in windows.h. If calling this library (DLL) from  
Visual BASIC, specify True/False as TRUE/FALSE.  
If using VB3 as the development language, SendByYMODEM can not be called. This is  
because VB3 does not permit the DLL to refer to the character string array. To solve this  
problem a VB3-dedicated function, SendByYMODEMforVB, is provided.  
235  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
RecieveByYMODEM  
This function is used to receive a file by means of the YMODEM/bat protocol. Before this function  
is called, the OpenYMODEM function must have been called.  
SYNTAX  
#include "ymodem.h"  
short WINAPI _export RecieveByYMODEM(LPCSTR cDirectory )  
INPUT  
cDirectory = Received file storage directory (by full pathname)  
OUTPUT  
= 0  
Normal termination  
236  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SetCommForYMODEM  
This function is used to set up the communication parameters (baud rate, parity, and stop bit) to be  
used by the YMODEM library.  
Before this function is called, the COM port must have been opened by the OpenYMODEM  
function.  
SYNTAX  
#include "ymodem.h"  
short WINAPI _export SetCommForYMODEM( long lBaud, short iParity,  
short iStopBits )  
INPUT  
lBaud = Select from 1200, 2400, 4800, 9600 (default),14400, 19200, 38400,  
57600, and 115200 bps.  
iParity = Select from NOPARITY(default), ODDPARITY, and  
EVENPARITY.  
iStopBits = Select either ONESTOPBIT(Default) or TWOSTOPBITS.  
OUTPUT  
= 0  
Normal termination  
Note:  
NOPARITY/ODDPARITY/EVENPARITY/ONESTOPBIT/TWOSTOPBITS have been  
defined in windows.h as the following values. If calling this library (DLL) from Visual Basic,  
directly specify their values.  
#define NOPARITY  
0
#define ODDPARITY 1  
#define EVENPARITY 2  
#define ONESTOPBIT 0  
#define TWOSTOPBITS 2  
If a value not permitted for each parameter is specified, the default value of the item will be  
used. If, for example, "123" is specified as the baud rate, it does not cause an error, but the  
default value of 9600 bps is automatically used.  
237  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CloseYMODEM  
If this function is called, the use of YMODEM library is completed, and the COM port is closed.  
SYNTAX  
#include "ymodem.h"  
short WINAPI _export CloseYMODEM( void )  
INPUT  
None  
OUTPUT  
= 0  
Normal termination  
238  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
8.6.6 FLINK Library  
Overview  
The FLINK library (FLINK.DLL) is a utility used to perform communication between two IT-2000  
terminals or between the terminal and a personal computer via the infrared communication interface  
(IrDA). It is a 16-bit dynamic link library (DLL). The FLINK function is called from its external  
function.  
WIN.INI setups  
Various setups of the FLINK.DLL are defined in the WIN.INI file. The setup procedure with the  
WIN.INI is explained below.  
Setup of the IrDA communication speed (MaxBaudRate)  
The maximum possible baud rate of the IrDA is specified by "MaxBaudRate" in the WIN.INI  
file.  
Example  
Setting the maximum possible baud rate to 4 Mbps  
MaxBaudRate = 4000000  
Setup required for IrDA communication between two HTs (DiscoverCount)  
For two HTs to communicate with each other, "DiscoverCount" in WIN.INI must have a  
different setting on the primary side and secondary side. For communication via the I/O Box, set  
up the WIN.INI file of the HT on the secondary side.  
Set DiscoverCount = 4 on the primary side.  
Set DiscoverCount = 0 on the secondary side.  
239  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Setup values of WIN.INI file  
Set up the IrDA section of the WIN.INI as follows;  
[IrDA.COM2]  
IrDA=ON  
MaxBaudRate=115200 *To be set according to the communication speed employed.  
SizeWindow=1  
SizeData=2048  
DisconnectThresholdTime=3  
MaxTurnAroundTime=500  
MinTurnAroundTime=5000  
NumBOF=0  
DeviceNickName=devicenickname  
DeviceName=devicename  
DiscoverCount=0  
ServiceTyte=7  
* Can be an optional character string.  
*Set to "4" only if my HT is the primary side of the  
HT-to-HT communication.  
Interface to DLL  
Copy FLINK.DLL to the Windows system directory or to a directory where the application is  
located.  
void InitFlink(HWND hWndParent, HINSTANCE hInst)  
This initializes FLINK.DLL. Be sure to call it before using the DoFlink() or DoFLinkForVB()  
function.  
SYMTAX  
void InitFlink(HWND hWndParent, HINSTANCE hInst)  
INPUT  
hWndParent = Window handle of the call source side  
hInst = Instance of the call source side  
OUTPUT  
None  
VxD not registered yet  
Example  
/* Code in C++ */  
InitFLink(hWnd, hInst);  
240  
Download from Www.Somanuals.com. All Manuals Search And Download.  
int DoFlink(int argc, char** argv)  
This executes the FLINK protocol and various processes.  
SYMTAX  
int DoFlink(int argc, char** argv)  
INPUT  
argc = Number of input parameters  
argv = Pointer to the parameter array  
OUTPUT:  
0
Normal termination  
Example  
This is an example of transmitting the "C: test temp.c" file of my HT so that it  
overwrites the "C: check " directory on the partner side using the DoFlink  
function.  
/* Code in C++ */  
int argc+4;  
char* argv[4] = { "fl", "/so", "c:  
result = DoFlink (argc, argv);  
test  
temp.c", "c:  
check  
" }  
short DoFLinkForVB(short iArgc, HAD sArgv)  
The DoFLink function can be called from either C language or Visual BASIC Version 4 or later .  
If Visual BASIC Version 3 is the application development language, use this function instead of  
the DoFLink function. Since DLL is usually developed in C, it cannot read the Visual BASIC  
data. With Visual BASIC Ver.4.0 or later DLL is automatically converted to a readable form,  
however, this function is not implemented in Visual BASIC Ver.3 or earlier. This library (DLL)  
provides a solution for using the dedicated Visual BASIC function. This function can of course  
also be called from Visual BASIC Ver.4.0 or later.  
SYNTAX  
short DoFLinkForVB(short iArgc, HAD sArgv)  
INPUT  
iArgc  
= Number of input parameters  
sArgv = Pointer to the parameter array  
OUTPUT  
0
= Normal termination  
241  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Example  
This is an example of using the DoFlinkForVB function to transmit the "C: test temp.c"  
file on the source side so that it overwrites the "C: check " directory on the destination  
side .  
/* Code in VB */  
Dim sht As Integer  
Dim hWnd1 As Long  
Dim hInst As Long  
ReDim Strz(3) As String  
hInst = GetModuleHandle("flink.exe")  
sht = InitFLink(Form1.hWnd, hInst)  
Strz(0) = "fl"  
Strz(1) = "/s"  
Strz(2) = "c: test temp.c"  
Strz(3) = "c: check "  
sht = DoFLinkForVB(4, Strz())  
Commands and options specified by the input parameters  
The following is a list of commands to be passed to the DoFLink function as parameters. Basically,  
only one command can be sent at a time. However, any command can be added with the IrDA or  
RS-232C communication parameters.  
Command  
Options that can be specified  
O, R, Q, H, D  
O, R, Q, H, D  
File transmission  
File reception  
/S  
/R  
File append  
/A  
Q, S, H, D  
File deletion  
File move  
Idle start  
IrDA communication setup  
RS-232C communication setup  
/D  
/N  
------------------------------------  
-----------------------------------  
-----------------------------------  
-----------------------------------  
-----------------------------------  
None  
/L={,,,,,,}  
/Y={,,,,,,}  
Example  
Input parameter setup examples  
File transmission  
int  
argc = 4;  
argv[] = { “fl”, “/sr”, “c:  
char*  
src1.dat”, “c:  
src.dat”,  
dstn_dir  
” }  
File append  
int  
argc = 4;  
char*  
argv[] = {“fl”, “/ao”, “c:  
“c:  
dstn_dir  
dstn.dat” }  
242  
Download from Www.Somanuals.com. All Manuals Search And Download.  
File deletion  
int  
argc = 3;  
char*  
argv[] = {“fl”, “/d”, “c:  
dstn_sir  
*.dat”}  
File move  
int  
argc = 4;  
char*  
argv[] = {“fl”, “/n”, “c:  
src_dir  
“c:  
src.dat”,  
dstn_dir  
dstn.dat” }  
File transmission with the optional communication parameters set  
int  
argc = 5;  
char*  
argv[] = {“fl”, “/y={38k,1,,,,,,,}”, “/s”, “c:  
src.dat”, “c:  
dstn_dir  
” }  
Idle start with the optional communication parameters set  
int  
argc = 2;  
char*  
argv[] = {“fl”, “/l={,100,,,,,}” }  
243  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Communication Commands  
File Transmission (/S)  
Function  
This function transmits a file on the execution-side machine to the communication partner. If the  
specified destination directory does not exist on the partner side, it will be automatically created.  
Starting method  
int  
argc = number of parameter arguments  
char* argv = { "fl", "/S[Option]", "transmission file pathname"  
[,"transmission file pathname"], destination directory name"}  
DoFlink(argc, argv)  
Options  
Option  
Description  
O (Overwrite)  
R
(Recursive call)  
Q (Quiet)  
H
Specification to forced overwrite a read-only file  
Transfers all files under the directory specified by the  
transmission file pathname.  
Non-display of the FLINK output message  
Used to perform communication between two handy terminals  
(HT-HT communication) (execute the partner-side FLINK with idle start).  
Transmission file pathname  
Specify the file on the transmission source by its full pathname.  
A wild card can be used for the file name.  
Multiple transmission file pathnames can be specified.  
Destination directory name  
Specify the storage directory name on the communication partner.  
The last input parameter is assumed to be the storage destination directory name.  
The directory name must include the drive name.  
Enter "  
" as the delimiter of the directory name.  
Example  
"d: "  
(Specification of the root directory)  
(Specification of the sub-directory)  
(Incorrect specification)  
"d: test 12 "  
"d: test"  
244  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Parameter setup examples  
argc = 4  
argv[] = {“fl” , ”/S” , ”a: info *.dat” , ”d: data ”}  
With this specification all files with a "DAT" extension under the "info" directory of the  
drive A of the execution-side machine will be transferred to the "d: data " directory on the  
partner side.  
argv = 4  
argv[] = {“fl” , ”/SR” , ”a: info *.dat” , ”d: data ”}  
With this specification all files with a "DAT" extension under the "info" directory (including  
the sub-directories) of the drive A of the execution-side machine will be transferred to the  
"d: data " directory on the partner side.  
245  
Download from Www.Somanuals.com. All Manuals Search And Download.  
File Reception (/R)  
Function  
This function is used to receive a file that exists on the communication partner side by specifying the  
request pathname. If the directory specified as the reception directory does not exist on the execution  
side, it will be automatically created.  
Starting method  
int  
argc = number of parameter arguments  
char* argv[] = { "fl", "/R[Option]", "request pathname" [,"request pathname"],  
"reception directory name" }  
DoFlink(argc, argv)  
Options  
Option  
Description  
O (Overwrite)  
R (Recursive call)  
Specification to forced overwrite a read-only file  
Transfers all files under the directory specified by the request  
pathname.  
Q (Quiet)  
H
(HT-to-HT communication)  
Non-display of the FLINK output message  
Used to perform communication between two handy terminals  
(execute the partner-side FLINK with idle start).  
Request pathname  
Specify by its full pathname the file to be received that exists on the communication partner side.  
A wild card can be used for the file name.  
Multiple request pathnames can be specified.  
Reception directory  
Specify the storage directory name in which to store the received file.  
The directory name must include the drive name.  
Enter "  
" as the delimiter of the directory name.  
Example:  
"b: "  
(Specification of the root directory)  
(Specification of the sub-directory)  
(Incorrect specification)  
"b: info test "  
"b: info"  
246  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Parameter setup examples  
argc = 5  
argv[] = {“fl” , ”/R” , ”a:  
test  
*.dat” , ”d:  
info  
*.*” , ”b:  
data  
”}  
With this specification all files with a "DAT" extension under the "test" directory of the drive  
A on the partner-side machine and all files under the "info" directory of the drive D will be  
transferred to the "data" directory of the drive B on the execution side.  
argc = 5  
argv[] = {“fl” , ”/RR” , ”a:  
test  
*.dat” , ”d:  
info  
*.*” , ”b:  
data  
”}  
With this specification all files with a "DAT" extension under the "test" directory (including  
the sub-directories) of the drive A on the partner-side machine and all files under the "info"  
directory (including the sub-directories) of the drive D will be transferred to the "data"  
directory of the drive B on the execution side.  
247  
Download from Www.Somanuals.com. All Manuals Search And Download.  
File Append (/A)  
Function  
This function appends the contents of a file that is specified by the append file pathname to a file that  
is specified by the target file pathname.  
Note:  
File contents will be appended using the binary method (i.e. if the target file ends with an EOF code,  
data is appended after it).  
Starting method  
int  
argc= 4  
char* argv[] = { "fl", "/A[Option]" , "append pathname" , "target pathname" }  
DoFlink(argc, argv)  
Options  
Option  
Description  
S
Indicates that the file specified by the append file pathname exists on the  
(transmission append) IT-2000 side. (This option is only provided to maintain compatibility with  
the Download Utility Software (HFC) on the personal computer side.  
Therefore, the transmission appending operation can be performed  
without this S option).  
Q (Quiet)  
H
(HT-to-HT  
communication)  
Non-display of the FLINK output message  
Used to perform communication between two handy terminals  
(execute the partner-side FLINK with idle start).  
Append file pathname  
Specify the file to be appended that exists on the execution side by its full pathname.  
A wild card cannot be used for the file name.  
Target file pathname  
Specify the target file that exists on the communication partner side by its full pathname.  
A wild card cannot be used for the file name.  
If the specified file does not exist, a file with the name specified will be created.  
Parameter setup examples  
argc = 4  
argv[] = {“fl”, ”/A”, ”a:  
my  
data.dat”, ”b:  
you  
master.dat”}  
With the above specifications the contents of the data.dat file on the execution side are  
appended to the master.dat file on the partner side.  
248  
Download from Www.Somanuals.com. All Manuals Search And Download.  
File Deletion (/D)  
Function  
This function deletes a file that exists on the communication partner side.  
Starting method  
int  
argc= Number of parameter arguments  
char* argv[] = { "fl", "/D", "deleted file pathname" [, "deleted file pathname"] }  
DoFlink(argc, argv)  
Deleted file pathname  
Specify the file to be deleted by its full pathname.  
Multiple file pathnames can be specified together.  
Parameter setup examples  
argc = 4  
argv[] = {“fl” , “/D” , “a:  
test  
*.dat” , “b:  
info  
test.dat”}  
Files that correspond to a: test *.dat and the b:  
using the above specifications.  
info  
test.dat file will be deleted  
249  
Download from Www.Somanuals.com. All Manuals Search And Download.  
File Move/File Rename (/N)  
Function  
This function is used to move the specified file (move source pathname) on the communication  
partner side to the move destination pathname. This function is used specifically to move or rename  
files within the same drive.  
Starting method  
int  
argc= 4  
char* argv[] = { "fl", "/N", "move source pathname" , "move destination pathname" }  
DoFlink(argc, argv)  
Move source pathname  
Specify the file to be moved on the communication partner side by its full pathname.  
A wild card cannot be used for the file name.  
Move destination pathname  
Specify the move destination pathname on the communication partner side.  
The pathname must include the drive name and directory name.  
If the specified directory does not exist, it will be automatically created.  
Parameter setup examples  
argc = 4  
argv[] = {“fl” , “/N” , “a:  
test  
kk.dat” , “a:  
data  
”}  
With the above specifications the a: test  
on the communication partner side.  
kk.dat file is moved to the a: data directory  
argc = 4  
argv[] = {“fl” , “/N” , “a:  
test  
kk.dat” , “a:  
data  
sj.dat”}  
The a: test  
kk.dat file on the communication partner side is renamed to a: data sj.dat  
using the above specifications.  
250  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Idle Start  
Function  
This function is used to transfer the request right to the partner side. This function will be terminated  
if it is abnormally terminated, or if a termination designation is transmitted or received. If a script  
file is specified, communication will progress according to the contents of the specified script file  
that exists on the communication partner side.  
Starting method  
int  
argc = Number of parameter arguments  
char* argv[]= { "fl", [, "script file name"] }  
DoFlink(argc, argv)  
Script file name  
Specify the script file name that exists on the communication partner side.  
251  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IrDA Environment Setup Commands  
Wait Time Setup (/L)  
Function  
This function sets up the Wait time for communication.  
Starting method  
int  
argc = Number of parameter arguments  
char* argv[] = { "fl", "/L={, wait time for connection establishment, wait time for data  
reception/transmission,,,,}" }  
DoFlink(argc, argv)  
If the parameters for the L option do not have to be entered, enter only comma separators. If this is  
the case, default values will be automatically used.  
Wait time for connection establishment  
Specify 0 to 3600 (second)  
If 0 is specified, the process takes until connection establishment.  
The default value is 1800 seconds.  
Wait time for data reception/transmission  
Specify 0 to 3600 (second)  
If 0 is specified, the process takes until the end (normal end or abnormal end).  
The default value is 300 seconds.  
Parameter setup examples  
argc = 2  
argv[] = { “fl” , “/L={,20,,,,,}” }  
Following the parameter setting shown above as example, the environment setting can be done  
according to the details listed in the table below.  
Parameter  
Process value  
20 sec.  
300 sec.  
Remark  
Default  
Wait time for connection establishment  
Wait time for data transmission/reception  
252  
Download from Www.Somanuals.com. All Manuals Search And Download.  
COM Environment Setup (/Y)  
Function  
This function sets up the environment of COM port.  
Starting method  
int  
argc = Number of parameter arguments  
char* argv[] = { "fl", "/Y={communication speed, COM specification,,,,,,,}" }  
DoFlink(argc, argv)  
If the parameters for the Y option do not have to be entered, enter only comma separators. If this is  
the case, default values will be automatically used.  
Communication speed  
Sets up the communication speed (baud rate) when communication is executed through COM1  
(RS-232C port) or Satellite I/O Box. The setting baud rate cannot be valid for other communications  
, between HT and HT or through Master I/O Box.  
Input parameter  
1200  
Baud rate (bps)  
1200  
Remark  
2400  
4800  
9600  
19 K  
38 K  
57 K  
115 K  
2400  
4800  
9600  
Default  
19200  
38400  
57600  
115200  
COM specification  
Specifies COM port for the communication.  
Input parameter  
COM port  
COM1 (RS-232C)  
COM2 (IrDA)  
Remark  
Default  
1
2
Starting method  
argc = 2  
argv[] = { “fl” , “/Y={,1,,,,,,,}” }  
253  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Following the parameter setting shown on the previous page as example, the communication  
specifications can be set according to the details listed in the table below.  
Parameter  
Communication speed  
COM specification  
Data bits  
Parity  
Stop bit  
Process value  
9600 bps  
COM1 (RS-232C)  
8 bits  
Remark  
Default  
Fixed  
Fixed  
Fixed  
None  
1 bit  
254  
Download from Www.Somanuals.com. All Manuals Search And Download.  
List of termination codes  
The following table shows the termination codes returned by FLINK.DLL. Note that only the  
termination code (i.e. with no message) will be displayed at a termination.  
End Code  
Description  
Category  
Detail Code  
(LOW)  
(High)  
Normal end  
00h  
0DCh - 0F5h  
F6h  
00h  
00h  
00h  
00h  
00h  
Normal end.  
Drive (A to Z) format notice.  
Power off ending notice.  
Reset ending notice.  
F7h  
F8h  
Break key interrupt ending.  
File Error  
(int21h)  
02h  
02h  
03h  
0Bh  
0Fh  
10h  
11h  
12h  
File not found.  
Path not found.  
Invalid format.  
Invalid disk drive.  
Delete request is current directory.  
Not same disk.  
02h  
02h  
02h  
02h  
02h  
02h  
Not same disk.  
There may be cases where codes not defined as File Error (int21h) are returned. If this happens the  
code is returned as a DOS expansion error code.  
File Error  
(int24h)  
03h  
03h  
03h  
03h  
03h  
03h  
03h  
03h  
03h  
03h  
03h  
03h  
03h  
03h  
03h  
13h  
14h  
15h  
17h  
19h  
1Ah  
1Bh  
1Dh  
1Eh  
1Fh  
20h  
21h  
22h  
23h  
53h  
Write protect error.  
Unknown unit.  
Drive not ready.  
Data error (CRC).  
Seek error.  
Unknown disk format.  
Sector not found.  
Write error.  
Read error.  
Unknown error.  
File share error.  
File lock error.  
255  
Download from Www.Somanuals.com. All Manuals Search And Download.  
End Code  
Description  
Category  
Detail Code  
Protocol  
Error  
01h  
01h  
01h  
01h  
01h  
01h  
01h  
00h  
01h  
02h  
03h  
04h  
05h  
06h  
07h  
08h  
Command error (undefined function code).  
Command error (undefined sub-function code).  
Command error (not execute command).  
Check sum error.  
Command sequence error.  
Sequence number error.  
Other protocol error.  
Parameter error.  
Timeout error.  
01h  
01h  
Protocol  
Error (File)  
04h  
00h  
Read only file access error.  
Internal Error  
0Fh  
0Fh  
0Fh  
01h  
02h  
03h  
Parameter error.  
Command buffer overflow.  
Receive data analysis.  
256  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9. Utility  
9.1 Overview  
The development kit contains some utility programs to be used as required.  
Calculator Utility  
Calculator program including memory calculation implementing the CASIO standard  
specifications .  
Clock Utility  
Used to refer the date and time of the built-in clock and to set the power ON alarm.  
Calendar Utility  
Used to refer to a calendar for a period of the years between January 1980 and December  
2079.  
Remaining Battery Voltage Display Utility  
Displays on a software meter the amount of battery voltage remaining for main and sub-  
batteries.  
FLINK Utility  
Transfers/receive s file through IrDA interface.  
XY Utility  
Transfers/receives file through XMODEM or YMODEM.  
Reverse Video Utility  
Changes the color of LCD screen. This utility is used to change the entire screen to reverse  
video. From the nature of the FSTN semi-transparent type LCD unit of this terminal the  
density of colors (tones) will be reversed.  
COM2KEY Utility  
Using COM cable and PC, it is possible to input through keyboard on the DOS prompt.  
In other words, a PC keyboard can be used to input characters and numerals to IT-2000  
through the DOS prompt.  
257  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.2 Calculator Utility  
Overview  
Use this calculator utility for decimal calculations. This utility provides arithmetic calculations,  
memory calculations and the function to transfer a result of calculations to text box in application  
program. It is provided as a Windows application.  
File Name  
WCALC.EXE  
Fig. 9.1  
Function  
The calculator utility provides the following functions:  
Calculation range: 0.00000000001 to 999999999999 and 0 (12 digits)  
Apostrophes after the thousandth digit.  
Arithmetical calculation (+, –, , )  
Arithmetical constant calculation (++, --,  
Percentage calculation (%)  
,
)
Calculation with memory functions (MC, MR, M+, M–)  
Display of a memorized value  
Value entry function (ENT key)  
A result of arithmetic calculations is transferred to the key buffer to be displayed in text  
box by application program.  
258  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Startup Method  
This utility is not stored in the basic drive (C: ). It must be copied to RAM disk (A: ) or FROM  
drive (D: ) and can be started up from Windows.  
Basic Function  
Operation of the utility is performed by inputs from Ten key and Touch panel.  
Ten Key  
Key  
Description  
0 to 9  
Input numeral.  
. (decimal) Input decimal point.  
-
Subtraction key  
CLR  
ENTER  
Cancel key for numeral input and release key for error condition.  
Confirmation key (same as “=” key) The key is represented as “=”.  
Touch Panel  
Key  
C
%
Description  
Cancel key for numeral input and release key for error condition.  
Percent calculation key.  
AC  
Clear key for releasing error conditions and numeral inputs except  
content of the memory.  
ENT  
MC  
MR  
M-  
M+  
+-  
Confirmation key.  
Memory clear key.  
Memory read key.  
Memory subtraction key.  
Memory addition key.  
Arithmetic calculation keys.(addition, subtraction)  
a Arithmetic calculation keys (multiplication, division)  
X
259  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9.3 Clock Utility  
Overview  
The clock utility is used to reference the current time, set the date and time, or set an alarm.  
This utility is provided as a Windows utility.  
Fig. 9.2  
File Name  
WCLOCK.EXE  
Function  
The clock utility provides the following functions:  
Displays the current time in digital or analog mode. 12-hour system or 24-hour system can  
be selected for the digital display format by the setup file.  
The current date is displayed with the following format: year/month/day/day of the week.  
The display mode can be specified by the setup file.  
The current time is displayed with the following format: hour/minute/second.  
12 hour/24 hour system.  
Date and time can be set from 0 O'clock 0 minutes, January 1 (Tuesday) 1980 to 23  
o'clock 59 minutes, December 31 (Sunday) 2079.  
An alarm can be set.  
A logo string can be specified by the setup file.  
260  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Setup File  
The display formats for date and time, and logo can be specified at this setup file (WCLOCK.INI).  
The setup file must be stored in the directory of D: WINDOWS. If it does not exist, and  
WCLOCK.EXE is executed, it will be automatically created. The following shows how to specify  
the WCLOCK.INI.  
[INTL]  
DATE= display format of date  
LOGO=[logo character string]  
AMPM=0 or 1  
AMPM=  
DATE=  
Specify the time system, 12-hour or 24-hour system.  
AMPM= 1 (12-hour) or AMPM= 0 (24-hour)  
Specify the display format of date, month and year.  
The following display format is used to indicate.  
YYYY  
YY  
MMM  
MM  
Year in 4 digits.  
Year in 2 digits (most least two digits of the year).  
Month by abbreviation (three alphabets).  
Month in 2 digits (by numeral).  
Day in 2 digits (by numeral)  
DD  
‘-’, ‘.’, Characters on the left side are used as delimiter.  
‘/’  
E /F=MMM-DD-YYYY  
x /F=YY/MM/DD  
JAN-28-1998[WED]  
98/ 1/28[WED]  
. /F=YYYY.MM.DD  
1998. 1.28[WED]  
LOGO=  
Specify the logo of clock by characters. The maximum length  
of the logo can be 9 characters. Also, it is possible to include  
characters and numbers combined in the logo.  
/T=CASIO  
261  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9.4 Calendar Utility  
Overview  
Use this calendar utility for referring to dates. This utility is provided as a Windows utility.  
Fig. 9.3  
File Name  
WCAL.EXE  
Function  
The calendar utility provides the following functions:  
Displays a calendar for two months on one screen page.  
At start up, the current system date will be displayed in the top section.  
The current system date will flash.  
Dates between January, 1980 and December, 2079 can be referenced.  
The calendar of the previous/next month can be accessed.  
Possible to call a calendar of the specified year and month.  
Startup Method  
This utility is not stored in the basic drive (C: ). It must be copied to RAM disk (A: ) or FROM  
drive (D: ) and can be started from Windows.  
262  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.5 Remaining Battery Voltage Display Utility  
Overview  
The remaining battery voltage display utility is used to monitor the remaining voltage of the  
main battery and sub-battery. This utility is provided as a Windows utility.  
Fig. 9.4  
File Name  
WCHKBATT.EXE  
Function  
Display for remaining battery voltage  
of main battery  
The remaining battery voltage can be displayed as  
a percentage and as a bar chart. It can also display if  
the output voltage from the battery is low.  
The connection status of AC adaptor and I/O Box  
can be displayed.  
Display for power supply connection  
states  
Display for remaining battery voltage  
of sub-battery  
The remaining battery voltage of sub-battery can  
be displayed.  
Note:  
Display of remaining battery voltage is determined by checking on the voltage output by the main  
battery. The maximum indication of remaining battery voltage may not be displayed if the  
worn-out battery is used even if it is fully recharged.  
Startup Method  
This utility is not stored in the basic drive (C: ). It must be copied to RAM disk (A: ) or FROM  
drive (D: ) and can be started from Windows.  
263  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.6 FLINK Utility  
Overview  
The FLINK Utility is used to perform communication either between the IT-2000 and PC, or  
between two IT-2000s by means of the IrDA protocol. This utility is provided as DOS application.  
It can be called as single command line or as a child process of the application program.  
Function  
IrDA communication  
method setup  
Sets the IrDA communication method.  
File transmission  
File reception  
Transmits files.  
Receives files.  
File append  
Appends (concatenates) a file on the transmission side to a file on the  
reception side.  
File deletion  
File move  
Idle start  
Deletes a file on the communication partner side.  
Moves a file within the same drive on the communication partner side.  
Passes the right of communication request to the communication  
partner and enters the command reception wait state.  
File name:  
FLINK.EXE  
Startup Method  
This utility is supplied on drive (C:). Usually this utility is made available after it is called from the  
system menu as a child process. However, it can be used either as a single command or as a child  
process to be called from other application.  
Operation Method  
With this utility operation priority is placed on only one side and the other side must remain in the  
command reception wait sate. This is true for both HT-to-HT communication and HT-to-PC  
communication. Hereinafter the operation side is referred to as the terminal, and the command  
reception wait side is referred to as the host.  
To establish HT-to-HT communication, idle-start (host-start) FLINK on one side and specify the  
transmission or reception command to execute (terminal-start) FLINK.  
To establish HT-to-PC communication, execute the communication host utility called "LMWIN" on  
the PC. For information about this communication host utility refer to the IT-2000  
Upload/Download Utility Manual.  
In the following pages the method used to specify the start options and information about each  
function is given.  
264  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.6.1 Communication Parameter Setup Command (/L={,,,}  
Sets up command parameters according to the command specified next to "=". If the communication  
environment command needs to be specified, this command must precede it.  
Command Specification Method  
FLINK /L={maximum IrDA speed, wait time until the connection is established, data  
transmission/reception wait time}  
Always place the parameters between a pair or braces ("{ }"). Parameters do not need to be  
specified, however, commas (,,,) must be specified. If a parameter is not specified, the corresponding  
default values will be used.  
IrDA communication speed  
Input parameter  
2400  
Baud rate (bps)  
2400  
Remark  
9600  
9600  
19 K  
38 K  
57 K  
115 K  
576 K  
1 M  
19200  
38400  
57600  
115.2 K  
576 K  
1 M  
4 M  
4 M  
Default value  
Wait time until the connection is established  
Specify between 0 and 3600 seconds.  
If "0" is specified, the application will wait until the connection is established.  
The default value is 1800 seconds.  
Data transmission/reception wait time  
Specify between 0 and 600 seconds.  
If "0" is specified, the application will wait until the communication function is normally or  
abnormally terminated.  
The default value is 300 seconds.  
265  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Example of specification  
FLINK /L={4M, 20, }  
Meaning:  
Communication will be performed with a maximum IrDA speed of 4 Mbps, the wait time  
until the connection is established is 20 seconds, and the data transmission/reception wait time  
is default-set to 300 seconds.  
266  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9.6.2 File Transmission (/S)  
Function  
This function transmits a file from the terminal machine to the host machine. If the directory  
specified by the "storage destination directory name" does not exist on the host side, it will be  
automatically created. If the identical file name exists on the host side, it will be forcibly overwritten.  
Even if it is a read-only file, it is possible to overwrite by specifying the "O" option.  
Startup Method  
FLINK /S[Option] transmission file pathname [transmission file pathname...]  
storage destination directory name  
Options  
Option  
O
Description  
If the host side has an identical file name and it is a read only file, it can  
be forcibly overwritten by specifying this option.  
R
If this option is specified and if a wild card is used for the "transmission file  
pathname," all files under the specified directory including sub- and deeper  
directories will be transmitted. If the file name specified by the wild card does  
not exist in the sub-directory, it is not automatically created on the host side.  
If a wild card is not used, files included in the sub- and deeper directories will  
not be transmitted.  
Q
H
Designates non-display of the message.  
If HT-to-HT communication is to be performed, specify this option on the  
terminal.  
Transmission file pathname  
Specify the file on the terminal machine by its full pathname and include the drive name.  
Wild cards (*, ?) can be used for the file name.  
If multiple "transmission file pathnames" are specified, separate each with a space.  
Storage destination directory name  
Specify the storage directory name on the communication partner.  
The last parameter input is assumed to be the storage destination directory name.  
The directory name must include the drive name.  
Enter " " as the delimiter of the directory name.  
267  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Example of specifications of storage destination directory name  
Specification of root directory  
Specification of sub-directory  
Incorrect specification  
D:  
D: TEST BIN  
D: TEST  
Note:  
If the host (reception) side has a file with the identical name, this command will forcibly overwrite  
that file. However, this overwrite operation is not unconditional. This command first creates a  
temporary file on the disk of the host, then it overwrites the file after the transmission has been  
completed. This is a safety measure to protect the original file from, for example, a file transmission  
failure. Accordingly, if the host side has a file with the identical name, there must be enough space  
on the disk to store the host-side transmission file. If there may not be sufficient disk space, files on  
the host side should be deleted in advance or the file delete command (described on page 249) on  
the transmission side should be used to delete files on the host side.  
Example of specifications  
FLINK /S A: TEST *.DAT  
D: TEST2  
This specification transfers all files that are in "A: TEST" of the  
terminal and that have a "DAT" extension to "D: TEST2 " on  
the host.  
FLINK /SR A: TEST *.DAT  
D: TEST2  
This specification transfers all files that are in "A: TEST"  
(including sub-directories) of the terminal and that have a "DAT"  
extension to "D: TEST2 " on the host.  
268  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9.6.3 File Reception (/R)  
Function  
This function receives a file from the host. The objective file name is specified by the full pathname  
(including the drive name) on the host. The received file is saved in the directory specified by the  
terminal side. If the specified directory does not exist on the terminal, it will be automatically  
created.  
Startup Method  
FLINK /R[Option] request pathname [request pathname...] reception directory  
Options  
Option  
O
Description  
If the host side has a file with the identical name and it is a read only file, it can  
be forcibly overwritten by specifying this option.  
R
If this option is specified and if a wild card is used for "request pathname,"  
all files under the specified directory including the sub- and deeper directories  
will be transmitted. If the file name specified by the wild card does not exist in  
the sub-directory, it is not automatically created in the host side. If a wild card is  
not used, files included in the sub- and deeper directories will not be transmitted.  
Designates non-display of the message.  
Q
H
If HT-to-HT communication is to be performed, specify this option on the  
terminal.  
Request pathname  
Specify the objective file of reception which is on the host machine by its full pathname.  
Wild cards (*, ?) can be used for the file name.  
If multiple "request pathnames" are specified, separate each of them using a space.  
Reception directory  
Specify the directory in which the received file is stored.  
The directory name must include the drive name.  
Enter " " as the delimiter of the directory name.  
Example of specifications of storage destination directory name  
Specification of root directory  
Specification of sub-directory  
Incorrect specification  
D:  
D: CASIO BIN  
D: CASIO  
269  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Note:  
If the terminal (reception) side has a file with the identical name, this command will forcibly  
overwrite that file. However, this overwrite operation is not unconditional. This command first  
creates a temporary file in the disk of the terminal, then it overwrites the file after transmission has  
been completed. This is a safety measure to protect the original file from, for example, a file  
transmission failure. Accordingly, if the host side has a file with the identical name, there must be  
enough space on the disk to store the transmission-side transmission file. If there may not be  
sufficient disk space, files on the terminal side should be deleted in advance.  
Example of specifications  
FLINK /R A: TEST *.DAT  
D: TEST2 *.* B: CHECK  
This transfers all files that are in "A: TEST" and that have a  
"DAT" extension, and all files included in "D: TEST2"  
from the host to "B: CHECK" on the terminal.  
FLINK /RR A: TEST *.DAT  
D: TEST2 *.* B: CHECK  
This transfers all files that are in "A: TEST" (including the  
sub-directory) and that have a "DAT" extension, and all files  
included in "D: TEST2" (including the sub-directory) from  
the host to "B: CHECK" on the terminal.  
270  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9.6.4 File Append (/A)  
Function  
This function appends (concatenates) a file on the terminal to the end of a specified file on the host.  
The objective file will be appended as a binary file. In other words, the data will be concatenated  
after the EOF code, if one exists. This function is valid only for transmission. Any files received  
from the host will not be concatenated to a file that exists on the terminal.  
Startup Method  
FLINK /A[Option] appended file pathname target file pathname  
Options  
Option  
Description  
Designates non-display of the message.  
If HT-to-HT communication is to be performed, specify this option on the  
terminal.  
Q
H
Appended file pathname  
Specify the file to be appended by its full pathname, including the drive name.  
This file exists on the terminal side.  
Wild cards cannot be used.  
Target file pathname  
Specify the target file to be concatenated by its full pathname, including the drive name.  
This file exists on the host side.  
Wild cards cannot be used.  
If the specified file does not exist on the partner side, a new file will be created with the specified  
pathname.  
Example of specifications  
FLINK /A A: MY CASIO.DAT  
B: YOU MASTER.DAT  
This specification concatenates the "CASIO.DAT"  
file on the execution (transmission) side to the end  
of the "MASTER.DAT" file on the partner  
(reception) side.  
271  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.6.5 File Deletion (/D)  
Function  
This function deletes a file on the host.  
Startup Method  
FLINK /D[Option] deleted pathname [deleted pathname...]  
Option  
Option  
H
Description  
If HT-to-HT communication is to be performed, specify this option on the terminal.  
Deletion by pathname  
Specify the objective file to be deleted by its full pathname, including the drive name.  
If multiple "deleted pathnames" are specified, separate each using a space.  
Example of specifications  
FLINK /D A: TEST *.DAT  
B: TEST2 CHECK.DAT  
This specification deletes all files that are in "A: TEST" and  
that have a "DAT" extension, and all files included in  
"B: TEST2 CHECK.DAT" on the communication partner  
side.  
272  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.6.6 File Move/Rename (/N)  
Function  
This function moves a file within the same drive or renames the file on the host. A file cannot be  
moved into a different drive.  
Startup Method  
FLINK /N[Option] move source pathname move destination pathname  
Option  
Option  
H
Description  
If HT-to-HT communication is to be performed, specify this option on the terminal.  
Move source pathname  
Specify the objective file to be moved or renamed on the host side by its full pathname, including  
the drive name.  
Wild cards cannot be used for the file name.  
Move destination pathname  
Specify a file name used as the move destination or the resultant file name of rename.  
This file name must be specified by its full pathname, including the drive name.  
If the specified directory does not exist, it will be automatically created.  
Example of specifications  
FLINK /N A: TEST KK.DAT  
A: TEST2  
This specification moves "A: TEST KK.DAT" to  
"A: TEST2" on the communication partner side.  
FLINK /N A: TEST KK.DAT  
A: TEST2 SJ.DAT  
This specification renames "A: TEST KK.DAT" as  
" A: TEST2 SJ.DAT" on the communication partner  
side.  
FLINK /N A: TEST KK.DAT  
B: TEST2 SJ.DAT  
A different drive cannot be specified. This specification  
results in an error.  
273  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.6.7 Idle Start  
Function  
This function passes the right of communication request to the terminal and enters the command  
reception wait state. This function will be terminated if it is abnormally terminated, if it transmits a  
designation of termination, or if reception has been completed.  
Startup Method  
FLINK  
(No specific command exists.)  
Example of specifications  
FLINK  
Waits for a request from the terminal.  
(No command specification)  
274  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.6.8 Termination Codes and Messages  
In the following table, termination codes and their error messages returned by FLINK.EXE  
are described.  
Error Code  
Error Message  
Description  
Category  
Detail  
(Low)  
(High)  
Normal End  
0x00  
0x00  
0x00  
0x00  
0x00  
0x00  
NORMAL ENDING  
ZDRIVE FORMAT NOTICE  
Normal end.  
0xDC-F5  
0xF6  
A
Format notification of drives A to Z  
Notification of the end of the power.  
Notification of the end of reset.  
Notification of abortion by user.  
POWER OFF ENDING NOTICE  
RESET ENDING NOTICE  
0xF7  
BREAK KEY INTERRUPT ENDING  
0xF8  
Protocol Error  
0x01  
0x00  
0x01  
COMMAND ERROR  
COMMAND ERROR  
Protocol error (undefined function  
code)  
Protocol error (undefined sub-  
function code)  
0x01  
0x01  
0x01  
0x01  
0x01  
0x01  
0x01  
0x01  
0x02  
0x03  
0x04  
0x05  
0x06  
0x07  
0x08  
COMMAND ERROR  
Command cannot be executed.  
Check-sum error  
Command sequence error.  
Sequence number error.  
Protocol is illegal.  
CHECK SUM ERROR  
COMMAND SEQUENCE ERROR  
SEQUENCE NUMBER ERROR  
OTHER PROTOCOL ERROR  
PARAMETER ERROR  
Parameter error.  
Timeout error.  
TIMEOUT ERROR  
File Error (INT21h)  
0x02  
0x02  
0x02  
0x02  
0x02  
0x02  
FILE NOT FOUND  
File cannot be found.  
Path cannot be found.  
Invalid formatting.  
Invalid disk.  
Delete request is specified to current  
directory.  
0x03  
0x0B  
0x0F  
0x10  
PATH NOT FOUND  
INVALID FORMAT  
INVALID DISK DRIVE  
CANNOT DELETE DIRECTORY  
0x02  
0x02  
0x11  
0x12  
NOT SAME DISK  
FILE NOTHING  
Disk is not the same.  
File cannot be found.  
Note:  
Besides the detail codes which are defined in File Error (INT21h) above, other error codes may be  
returned as extension error code of DOS.  
File Error (INT24h)  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x03  
0x13  
0x14  
0x15  
0x17  
0x19  
0x1A  
0x1B  
0x1D  
0x1E  
0x1F  
0x20  
0x21  
0x22  
0x23  
0x53  
WRITE PROTECT ERROR  
UNKNOWN UNIT  
DRIVE NOT READY  
DATA ERROR (CRC)  
SEEK ERROR  
Write protect error.  
Undefined unit.  
Drive is not ready.  
Data error.  
Seek error.  
UNKNOWN DISK FORMAT  
SECTOR NOT FOUND  
WRITE ERROR  
Disk is not formatted.  
Sector cannot be found.  
Write error.  
READ ERROR  
Read error.  
UNKNOWN ERROR  
FILE SHARE ERROR  
FILE LOCK ERROR  
INVALID DISK CHANGED  
FCB FULL  
Error cannot be defined.  
Specified file is already opened.  
File lock error.  
Invalid disk exchange.  
FCB is full.  
FATAL ERROR  
Fatal error (Unsuccess INT24h).  
275  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Note:  
Besides the detail codes which are defined in File Error (INT24h) above, other error codes may be  
returned as fatal error code of DOS.  
Protocol Error (File)  
0x04  
0x00  
CANNOT OVERWRITE  
File is “read-only”.  
IrDA Protocol Error (For detail refer to the table on the next page.)  
0x80  
0x80  
0x01  
0x02  
0x03  
0x04  
0x05  
0x06  
IrDA PROTOCOL ERROR  
Open error.  
Data send error.  
0x80  
Data receive error.  
0x80  
Close error.  
0x80  
Error in setting of self-station ability.  
Error in setting of communication status.  
0x80  
Internal Error  
0x0F  
0x01  
0x02  
0x03  
-
INTERNAL ERROR  
Parameter error.  
0x0F  
Command buffer overflow.  
Analysis on received data.  
0x0F  
-
RECEIVED ERROR REQUEST  
When error notification is received from  
the communication partner.  
The following error codes are output when an error occurs in the IrDA library.  
IrDA Library Error  
Termination Code  
0X000000001  
0X000000002  
0X000000004  
0X000000008  
Message  
Description  
Resources are not enough.  
No device to connect.  
No service available at the destination device.  
Connecting is failed. Timeout to abort or to wait for the  
connection.  
0X000000010  
0X000000020  
0X000000040  
0X000000080  
0X000000100  
0X000000200  
0X000000400  
0X000000800  
0X000001000  
0X000002000  
0X000004000  
0X000008000  
Opened file is accessed to open.  
IR_OPEN is not executed.  
Specifying WIRE is illegal.  
Parameter error.  
Tmeout to wait for send/receive.  
Over-run error.  
Parity error.  
Flaming error.  
CS signal timeout.  
DR signal timeout.  
CI signal timeout.  
CD signal timeout.  
276  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9.7 XY Utility  
Overview  
The XY utility is used to perform communication either between an IT-2000 and PC, or between  
two IT-2000 terminals by means of XMODEM or YMODEM BATCH protocol.  
This utility is provided as a DOS application and should be activated as a command line or as  
child-process of the application program.  
File name:  
XY.EXE  
Function  
Transmission of a file  
Reception of a file  
Selection of a protocol  
Specification of the  
error check method  
Specification of a  
packet length  
Transmits a file.  
Receives a file.  
Select either XMODEM protocol or YMODEM-BATCH protocol.  
Select the error check method as the checksum or CRC method.  
Select the packet length as 128 or 1024 bytes.  
Select a baud rate between 1200 and 115200 bps.  
Specification of a baud  
rate  
Transmission of  
multiple files  
(only for YMODEM)  
By using a wild card it is possible to transmit multiple files at one time.  
In addition, files included in the sub- and deeper directories can be  
transmitted.  
Startup Method  
This utility is supplied on drive (C:). Usually this utility is made available after it is called from the  
system menu as a child process. However, it can be used either as a single command or as a child  
process to be called from another application.  
Note:  
When the cable comes off while the communication takes place:  
If the connection cable is accidentally unplugged while communication between the IT-2000 and  
PC is taking place, a communication error results and communication is interrupted. In this case the  
communication software on the PC will display an error message and interrupt  
transmission/reception, however, some data may remain in the transmission buffer. If an attempt is  
made to restart communication in this condition, the XY utility will receive illegal packets,  
hampering normal communication. If this occurs, terminate the communication software on the PC  
side then restart it to restore normal communication.  
277  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
About time stamping of files:  
This utility supports the function to exchange time stamp information between the transmitted file  
and received file. The time stamp information to be exchanged will be processed assuming that it is  
Greenwich standard time. In contrast, the time used by the IT-2000 is the local time, and the time  
stamp of IT-2000 files are accordingly controlled based on the local time.  
The XY utility, for file transmission/reception by means of the YMODEM protocol, will convert a  
time stamp in Greenwich standard time to a time stamp in local time, or vice versa. This time  
conversion is achieved according to the environment variable, TZ. In communication between two  
IT-2000 terminals, if, for example, TZ of the transmission side is "JST+5", the time stamp of a file  
to be transmitted will have five hours added. In this case the reception side will create a file by  
subtracting five hours from the time stamp of the received file. If the environment variable TZ is not  
set, this time conversion is not performed. The time stamp made at XMODEM communication uses  
the system time of the reception side.  
Transmission side  
Reception side  
IT-2000(TZ=none)  
IT-2000(TZ=GMT)  
IT-2000(TZ=JST+5)  
IT-2000(TZ=JST+5)  
PC  
IT-2000(TZ=none)  
IT-2000(TZ=GMT)  
IT-2000(TZ=JST+5)  
PC  
12:00  
12:00  
12:00  
12:00  
12:00  
0
0
+5  
+5  
?
12:00  
12:00  
17:00  
17:00  
??:??  
0
0
-5  
12:00  
12:00  
12:00  
??:??  
?
-5  
IT-2000(TZ=JST+5)  
(??-5):??  
About key input during communication:  
Do not press any key during communication, otherwise file transmission/reception may be  
hampered.  
Using this utility where COM2KEY.EXE is resident:  
To use this utility where a debugging tool called COM2KEY.EXE is resident, the /N option must be  
specified. Since COM2KEY.EXE will transfer the displayed characters to the COM port, the  
characters displayed by this utility will also be transferred to the COM port, hampering normal  
transmission.  
Function and operation method  
Always specify necessary start parameters. These parameters include the essential command and its  
option, other parameters, and the transmitted/received file name. Each parameter must be separated  
by a space or TAB code.  
XY /command+option /parameter [/parameter...] file name [file name...]  
278  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Command  
Always specify /S or /R. This command must be specified as the first parameter.  
/R | /S  
Transmission or reception specification  
/R: File reception  
/S: File transmission  
(Both /R and /S cannot be specified at the same time.)  
Option  
After the command, specify the appropriate options. The options must be specified in the following  
order:  
X / Y Communication protocol specification. This must directly follow either /R or /S.  
X: XMODEM protocol communication.  
Y: YMODEM protocol communication.  
(Both X and Y cannot be specified at the same time.)  
M | C Error check method. This can be specified only if either /R or /S is specified.  
M: Checksum (only for XMODEM)  
C: CRC  
(Both M and C cannot be specified at the same time.)  
If this specification is not made, M is automatically used if XMODEM communication  
is specified, and C is automatically used if YMODEM communication is specified. The  
M specification will be invalid if the Y option is specified.  
N | L Packet length.  
N: Normal (128 bytes)  
L: Long (1024 bytes)  
(Both N and L cannot be specified at the same time.)  
If this specification is not made, N is automatically used if XMODEM communication  
is specified, and L is automatically used if YMODEM communication is specified.  
279  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Other parameters  
Specify the options immediately after (without inserting a space) the command. Options must be  
specified in the following order:  
/N  
Suppression of message display  
Specify this option if a copyright message or error message is suppressed from being  
outputted.  
/BN Specification of a baud rate (If omitted, 2 (9600 bps) is employed.)  
N =  
0:  
1:  
2:  
3:  
4:  
5:  
6:  
7:  
2,400 bps  
4,800 bps  
9,600 bps  
19,200 bps  
23,040 bps  
28,800 bps  
38,400 bps  
57,600 bps  
8: 115,200 bps  
/P  
For file transmission via YMODEM protocol this option sets a pathname on the  
destination side from the pathname of the object file that exists on the transmission  
source. This file name must be specified by its full pathname.  
/PXXX Modifies the pathname of a file to be transmitted via YMODEM protocol.  
XXX= path (maximum 250 characters)  
/U  
With this option if a wild card is used for a file name to be transmitted via YMODEM  
protocol, files included in the sub-directory can be the objectives of file transmission.  
This option is also used to mirror-copy a drive.  
File name  
XMODEM: Transmission (/SX) : Specify only one file.  
Reception (/RX)  
: Specify one file name.  
* Multiple files cannot be used.  
* Wild cards cannot be specified.  
YMODEM: Transmission (/SY) : Specify file names. Multiple files can be specified as a lump.  
If specifying multiple files, separate each of them using a space. Wild cards  
(*, ?) can be used.  
Reception (/RY) : File name is invalid.  
280  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Example of specifications  
XY /SY A: WORK TEST.DAT  
Transfers “A: WORK TEST.DAT” at transmission  
side. “TEST.DAT” can be copied in the current directory  
at reception side.  
XY /SY /P A: WORK TEST.DAT  
Transfers “A: WORK TEST.DAT” at transmission  
side. “A: WORK TEST.DAT” can be copied at  
reception side. If “A: WORK” does not exist, it is  
created newly.  
XY /SY /P B: TEST A: WORK  
TEST.DAT  
Transfers “A: WORK TEST.DAT” at transmission  
side. “B: TEST TEST.DAT” can be copied at  
reception side. If “B: TEST” does not exist, it iscreated  
newly.  
Termination Codes and Messages  
Termination  
Message  
Description  
Code  
00  
01  
NORMAL END  
ABNORMAL END  
(Reserved)  
End normally.  
Abort by CLR key. Or, the communication partner aborts.  
02  
03  
04  
05  
FILE NOT FOUND  
FILE NOT CREATE  
TIME OUT  
Input file cannot be found.  
File cannot be created.  
Timeout has occurred.  
06  
(Reserved)  
07  
WRITE FAILURE  
Error in writing has occurred.  
08  
COMMUNICATION Error during communication has occurred.  
ERROR  
09  
10  
(Reserved)  
FILE SIZE ZERO  
Size of specified file is 0 byte. (when XMODEM is used.)  
281  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9.8 Reverse Video Utility  
Overview  
This utility is used to change the entire screen to reverse video.  
From the nature of the FSTN semi-transparent type LCD unit of this terminal the density of colors  
(tones) will be reversed. So, for example, a light color appears dark and a dark color appears light.  
To avoid this problem use this supplied utility to represent colors as closely as possible.  
This utility is provided as a DOS application and should be activated as a command line or as  
child-process of the application program.  
File name  
LCDREV.COM  
Startup Method  
This utility is not supplied on the basic drive (C:). Copy it in the F-ROM drive (D:) or RAM disk  
(A:) before use. This program can be used either as a single command or as a child process.  
Operation Method  
Format: LCDREV Option  
Option  
Function  
Normal (Returns to default value at a time of boot up)  
Only text is reversed  
Only graphics are reversed.  
Both text and graphics are reversed.  
0
1
2
3
282  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.9 COM2KEY Utility  
Overview  
This utility is a debug tool that allows key input at the DOS prompt from the personal computer.  
If this utility is resident in memory, the data entered in COM1 will be passed to the key buffer, and  
the characters displayed on the DOS prompt screen will be outputted for COM1. Therefore, if this  
terminal is connected to a PC via the COM cable and if the terminal emulator is used on the PC,  
characters can be entered in the DOS prompt screen of this terminal through the PC's keyboard.  
This utility is provided as a DOS application and should be activated as a command line or as  
child-process of the application program.  
File name  
COM2KEY.EXE  
Operation Method  
Connect the COM1 (8-pin) port of this terminal to the COM port of the PC with a cable.  
Initiate the terminal emulator software on the PC and make the following setups.  
Baud rate  
Data bits  
Parity bit  
Stop bit  
9600 bps  
8 bits  
None  
1 bit  
Permanently install COM2KEY on the IT-2000 side with the following procedure.  
If a key input is made on the PC side, the entered character will be displayed in the DOS prompt  
screen of this terminal.  
Startup Method  
This utility is supplied and is stored in the basic drive (C:). This utility is an EXE file-type device  
driver. It can be used as a single command or specified by CONFIG.SYS.  
If executed from DOS prompt line :  
Format: COM2KEY [Option]  
If specified by CONFIG.SYS :  
Format: DEVICE=C: COM2KEY.EXE  
Option  
None  
/R  
Function  
Permanently install COM2KEY.  
Cancels residence of COM2KEY.  
283  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
9.10 Windows Installation Utility  
Overview  
MS-Windows has been installed on the MASK ROM drive (E:). However, MS-Windows cannot be  
booted directly from the MASK ROM drive. This is because MS-Windows will overwrite some of  
the INI files at start up. However, since all the files including the INI files are initially located in the  
MASK ROM drive, they cannot be overwritten, therefore an error will result. To avoid this problem,  
it is necessary to copy some of the files in the write-permit drive (D:) before booting MS-Windows.  
Set up the country code and language to be used internally by Windows. WINST.EXE handles all  
these processes. WINST.EXE can also be used to install application programs. MS-Windows will  
load a program, specified by the shell script contained in the [boot] section of system.ini, as an  
application program. The Program Manager is loaded when MS-Windows is booted because the  
Program Manager has been specified by the above mentioned shell script. For this terminal it is  
recommended to specify the application program instead of the Program Manager. All processes,  
including rewriting of the system.ini file, can be automatically handled with WINST.EXE.  
File name:  
WINST [/M] [/T<directory>][Script File]  
Start Option  
The default operations can be modified by specifying a start option to initiate WINST.EXE. The  
options that can be specified and their functions are shown in the table below.  
Option  
Description  
/M  
This option specifies for WINST.EXE to be initiated from the menu. With the  
initiated menu Windows files can be installed after modifying, if necessary, the  
contents specified by the WINST.INF file. WINST.INF itself will not be  
automatically modified by this menu initiation.  
/T<directory>  
Script File  
The default target directory of installation differs depending the working  
environment of WINST.EXE. If WINST.EXE is executed on a personal  
computer, the target directory will be the WINDOWS directory under the current  
directory. If WINST.EXE is executed on an IT-2000, the target directory will be  
the D: WINDOWS directory. If this option is specified, installation will be  
performed assuming the target directory is <directory>.  
By default, WINST.EXE will perform installation according to the WINST.INF  
file. The WINST.INF file must exist under the same directory as the  
WINST.EXE file. If "Script File" is specified, the user-specified file can be used  
instead of the WINST.INF file.  
284  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Operation at Menu Startup  
WINST.EXE can run either on the IT-2000 or on a personal computer. However, since the IT-2000  
is not provided with an arrow key to move the bar-type cursor, use the following key operations.  
IT-2000  
"8"  
"2"  
ENTER  
CLR  
PC  
"8" or Up arrow  
"2" or Down arrow  
ENTER  
Move cursor up  
Move cursor down  
Accept  
Cancel  
ESC  
Outline of WINST.EXE Operations  
Basically, WINST.EXE will perform the following tasks. Not all of the tasks are always executed  
but information about each task is specified by WINST.INF.  
Copies a file in E:WINDOWS LOCAL to D: WINDOWS.  
Correct the contents of the Sytem.INI or Win.INI file according to the language, country code,  
and keyboard type to be used.  
Copies the drivers to be used and registers them in SYSTEM.INI and WIN.INI.  
Copies the libraries (DLL/VBX) to be used.  
The target directory of installation in the above described processes differs depending on the  
execution environment of WINST.EXE. For example, if WINST.EXE is executed on the IT-2000,  
SYSTEM.INI, which is to be modified, must be in the D: WINDOWS directory. However, if  
WINST.EXE is executed on a personal computer, the SYSTEM.INI file in the WINDOWS directory  
under the current directory will be modified.  
The following table shows the difference of the processed contents depending on whether  
WINST.EXE was executed on the IT-2000 or on the personal computer.  
IT-2000  
PC  
WINST.INF to be used  
Target of installation  
Same directory as WINST.EXE  
D: WINDOWS  
WINDOWS under current  
directory  
Copying of LOCAL  
directory  
Not copied  
From E: WINDOWS LOCAL  
To D: WINDOWS  
Copy source of drivers  
INI file to be modified  
Same directory as WINST.EXE  
D: WINDOWS SYSTEM.INI  
D: WINDOWS WIN.INI  
WINDOWS SYSTEM.IN  
WINDOWS WIN.INI  
285  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WINST.INF  
The WINST.INF file is used to make installation procedure specifications for WINST.EXE. The  
method used to write the WINST.INF file is the same as that used for the INI file in MS-Windows.  
For information about each setup item refer to the following table.  
Setup Section  
CopyOriginal=  
yes or no  
Description  
If set to "yes", a Windows directory is created in the D drive, and a file in  
E: WINDOWS LOCAL is copied there. Since existing files will be  
overwritten, specify "no" to prevent the contents from being overwritten.  
This specification will be ignored if WINST.EXE is started on a personal  
computer.  
ModifyInternationa If set to "yes", the language , country code, and keyboard setups are made.  
l=yes or no Information about the setup contents follow the scripts in the “Intl” section.  
UpdateDrivers=yes If set to "yes", the drivers will be updated. This process will be executed  
or no according to the setups described in the “Update” section.  
UseMouseCursor= Selects whether the mouse cursor is displayed. If set to "yes", VGA_C.DRV  
yes or no  
is registered as the display driver. If set to "no", VGA_NC.DRV is registered  
in SYSTEM.INI.  
ShellInstall=  
yes or no  
On the terminal it is recommended to use a start-up procedure that initiates  
an application program together with MS-Windows, instead of using Program  
Manager. If set to "yes", the specified application program, instead of  
Program Manager, will be registered.  
This registration process will follow the setup described in the [Shell] section.  
This section is referred when ModifyInternational=yes is specified at the  
[Setup] section.  
[Intl] section  
Country=Setting  
Specifies the country code. From the Setting column of the table shown  
below select a value to be placed on the right side of the equation.  
Country  
Australia  
Belgium(Dutch) BelgiumD  
Setting  
australi  
Country  
Austria  
Belgium(French) BelgiumF  
Canada(English) CanadaE  
Setting  
Austria  
Brazil  
Brazil  
Canada(French)  
Finland  
Germany  
Ireland  
Mexico  
New Zealand  
Portugal  
CanadaF  
Finland  
Germany  
Ireland  
Mexico  
NewZea  
Portugal  
Spain  
Denmark  
France  
Iceland  
Denmark  
France  
Iceland  
Italy  
Nether  
Norway  
SouthKor  
Sweden  
SwitzG  
Taiwan  
US  
Italy  
Netherlands  
Norway  
South Korea  
Sweden  
Switzerland (German)  
Spain  
Switzerland(French)  
SwitzF  
SwitzI  
Switzerland(Italian)  
Taiwan  
United States  
United Kingdom UK  
Language=Setting Specifies the language to be used. From the Setting column of the table  
shown below select a value to be placed on the right side of the equation.  
Country Kind  
Setting  
Country Kind  
Setting  
Danish  
English(American)  
Danish  
america  
Dutch  
English(International)  
Dutch  
uk  
Finnish  
French Canadian FrenchC  
Icelandic  
Norwegian  
Spanish  
Finnish  
French  
German  
Italian  
Portuguese  
Spanish(Modern) SpanishM  
French  
German  
Italian  
Portugue  
Icelandi  
Norwegia  
Spanish  
Swedish  
Swedish  
286  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Keyboard=Setting  
Specifies the keyboard to be used. From the Setting column of the table  
shown below select a value to be placed on the right side of the equation.  
Country Kind  
Belgian  
British  
Setting  
BELGIAN  
BRITISH  
Country Kind  
Brazilian  
Canadian Multilingual  
Setting  
BRAZILIA  
CANADIAN  
DUTCH  
Danish  
DANISH  
Dutch  
Finnish  
French Canadian  
Icelandic  
Latin American  
Portuguese  
Swedish  
Swiss German  
US-Dvorak  
FINNISH  
FRENCHC  
ICELANDI  
LATINA  
PORTUGUE  
SWEDISH  
SWISSG  
French  
German  
Italian  
Norwegian  
Spanish  
Swiss French  
US  
FRENCH  
GERMAN  
ITALIAN  
NORWEGIA  
SPANISH  
SWISSF  
US  
US-DVO  
US-International US-INT  
[Update] section This section will be referenced from the [Setup] section if  
"UpdateDrivers=yes" is specified.  
UpdateSysCall=  
yes or no  
If set to "yes", SYSCALL.DLL is copied in the WINDOWS directory. The  
objective SYSCALL.DLL to be copied must be located in the same  
directory as WINST.EXE.  
UpdateVKD=  
yes or no  
If set to "yes", VKD.386 is copied in the WINDOWS directory then  
registered in SYSTEM.INI. The objective VKD.386 to be copied must be  
located in the same directory as WINST.EXE.  
UpdatePenMouse If set to "yes", PENMOUSE.DRV is copied in the WINDOWS directory  
=yes or no  
then registered in SYSTEM.INI. The objective PENMOUSE.DRV to be  
copied must be located in the same directory as WINST.EXE.  
If the application program uses the keypad library, it must be set to "yes".  
If set to "yes", PADCTRL.VBX is copied in the WINDOWS directory.  
The objective PADCTRL.VBX to be copied must be located in the same  
directory as WINST.EXE.  
UseKeyPad=  
yes or no  
UseOBR=  
yes or no  
If the application program uses the OBR library, it must be set to "yes". If set  
to "yes", OBRLIB.DLL is copied in the WINDOWS directory. The objective  
OBRLIB.DLL to be copied must be located in the same directory as  
WINST.EXE.  
UseIrDA=  
yes or no  
If the application program uses the IrDA communication library or FLINK  
library, it must be set to "yes". If set to "yes", both IRDA.DLL and  
IRCOMM.DRV are copied in the WINDOWS directory then registered in  
SYSTEM.INI and WIN.INI. The objective IRDA.DLL and IRCOMM.DRV  
to be copied must be located in the same directory as WINST.EXE.  
UseYMODEM= If the application program uses the YMODEM library, it must be set to "yes"  
yes or no  
If set to "yes", YMODEM.DLL is copied in the WINDOWS directory. The  
objective YMODEM.DLL to be copied must be located in the same directory  
as WINST.EXE.  
UseFLINK=  
yes or no  
If the application program uses the FLINK library, it must be set to "yes". If  
set to "yes", FLINK.DLL is copied in the WINDOWS directory. The objective  
FLINK.DLL to be copied must be located in the same directory as WINS.EXE.  
This section is used to specify the contents to be set in WIN.INI if  
UserIrDA=yes.  
IrDA.COM2  
For information about each setup value refer to Chapter 7.9, "COM Driver  
for IrDA"  
287  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Example of Using WINST.EXE  
Preparation of necessary files  
The table shown below includes files essential for setting up WINST.INF. If, for example, the  
application program uses the OBR library, make the following settings for WINST.INF:  
UpdateDrivers=yes and UseOBR=yes. Then place OBRLIB.DLL in the same directory as  
WINST.EXE/WINST.INF. On a personal computer, WINST.EXE must be executed in the Windows  
environment. Windows environment files are stored in the E: WINDOWS LOCAL directory of  
the IT-2000 main unit. First create the Windows directory in the directory in which the prepared files  
are stored, then copy the files from the E: WINDOWS LOCAL directory there.  
Setup in WINST.INF  
UpdateSysCall=yes  
UpdateVKD=yes  
UpdatePenMouse=yes  
UseKeyPad=yes  
UseOBR=yes  
Essential file  
SYSCALL.DLL  
VKD.386  
PENMOUSE.DRV  
PADCTRL.VBX  
OBRLIB.DLL  
IRDA.DLL  
Remark  
UseIrDA=yes  
If executing WINST.EXE on a personal  
computer, COMM.DRV must be prepared in  
advance. This file is stored in the E:  
IRCOMM.DRV  
COMM.DRV  
WINDOWS directory of the IT-2000.  
UseYMODEM=yes  
UseFLINK=yes  
YMODEM.DLL  
FLINK.DLL  
FLINK.DLL will call the IRDA library. The  
above mentioned IrDA-related files are required.  
Example of execution on personal computer  
This is an example method of setting up the Windows environment on a personal computer and  
transferring a group of created setup files onto the IT-2000.  
Read the essential files from the MASK ROM of the IT-2000.  
The files required to run MS-Windows are stored on the MASK ROM drive (E: ) of the IT-2000.  
MS-Windows re-writes some of these files when it executes. These files must be copied into a  
write-permit drive to rewrite them at start-up. These objective rewrite files are contained in the E:  
WINDOWS LOCAL directory together. Usually, before use, they will be copied in the D:  
WINDOWS directory. Therefore, if installation is performed on a personal computer, these files  
should be loaded onto it. In the following example the E: WINDOWS LOCAL files are  
loaded on the PC card.  
288  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MD G: WINDOWS  
COPY E: WINDOWS LOCAL G: WINDOWS  
If the IrDA interface is used to load COMM.DRV with the following procedure.  
COPY E: WINDOWS COMM.DRV G:  
COMM.DRV must be stored in the same directory as WINST.EXE. Therefore, in the above  
example it is loaded onto the root directory.  
Copy the loaded files onto an appropriate directory in the personal computer.  
CD C: IT-2000 INSTALL  
MD WINDOWS  
COPY D: WINDOWS *.* WINDOWS  
Load the above mentioned COMM.DRV if using the IrDA interface.  
COPY D: COMM.DRV  
Now that the objective installation files, such as WINST.EXE and WINST.INF, have been  
prepared in the INSTALL directory it is time to initiate WINST.EXE. The directory  
configuration at this point in time is as follows:  
C: IT-2000  
WINST.EXE  
WINST.INF  
COMM.DRV  
SYSCALL.DL  
WINDOWS  
As required  
SYSTEM.INI  
WIN.INI  
.....  
Fig. 9.5  
Execute WINST.EXE to implement the installation.  
Use a device such as a PC card to copy the installed WINDOWS directory onto the drive D of  
the IT-2000.  
289  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Example of execution on the IT-2000  
Directly set up the environment by executing WINST.EXE on the IT-2000. If WINST.EXE and the  
other essential files are stored in the PC card, the card can be used for installation.  
Prepare the objective installation files, including WINST.EXE and WINST.INF, in the ATA  
card.  
Add a line for loading WINST.EXE in the AUTOEXEC.BAT file contained in the ATA card.  
Press the RESET switch to perform card boot. The Windows environment will be automatically  
set up.  
290  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX A: TFORMAT.EXE  
In this chapter, TFORMAT.EXE, the formatter for F-ROM drive (D:) of IT-2000, is explained.  
The TFORMAT.EXE is necessary to format the drive (D:). It is resided in the basic drive (C:).  
The syntax of the TFORMAT command is;  
TFORMAT [drive-letter]  
[/LABEL:label]  
[/SPARE:n]  
[/Y]  
Example of Syntax : TFORMAT 2 /SPARE:64  
Note:  
Even if the TFORMAT.EXE is excuted without option attached, the usage of program can be  
observed The following options are supported only by IT-2000.  
Drive-letter  
DOS drive letter of the F-ROM drive. The drive number of F-ROM in IT-2000 is  
set to 2. Always specify “2” for the drive.  
/LABEL:label  
/SPARE:n  
A string to be used as the DOS label of the formatted medium.  
Leave n Flash erase units as spare units for garbage collection. The default is 1.  
At least one unit should be specified for the Flash medium to operate as a true  
read-write device. More than one spare unit may be specified to format media that  
have bad Flash units.  
In such a case the number of spare units should exceed the number of bad units  
by at least 1. It is also possible to specify more than one spare unit in anticipation  
of Flash units becoming in the future.  
A value of 0 spare units may be specified to create a WORM (Write-Once-Read-  
Many) disk. When formatting with this option, the Flash medium can be written  
once only, after which it will become a read-only medium. File System will report  
that the medium is write-protected when space for writing is exhausted.  
This option provides very limited functionality, and should not be used except in  
special cases. The option has the advantage of lowering the formatting overhead  
of File System, since a spare Flash erase zone is not needed for spare reclamation.  
/Y  
Do not pause for confirmation before beginning to format.  
291  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
APPENDIX B: PC Card Driver  
In this chapter, each PC card driver which is called by CONFIG.SYS or by AUTOEXEC.BAT is  
explained. These PC card drivers and INI file are stored in the directory, C: CARDSOFT, on the  
basic drive (C: ).  
SystemSoft’s CardWizard PC card solution provides OEMs with a complete software solution for  
integrating PCMCIA controllers and slots into their computers. The CardWizard software suite  
provides a complete “plug and play” system software solution for both DOS and Windows 3.1.  
This solution consists of the following drives and utilities. Please be aware that your particular  
configuration may not include all drivers and utilities.  
Socket Services (SS365SL.EXE)  
Socket Services provides a standard software interface to host controller chips and isolates the  
socket hardware from higher level software. Socket Services includes functions such as configuring  
a socket for an I/O or memory interface and controlling socket power voltages. The Socket Services  
driver included depends upon the host controller chip that the system supports.  
Option  
/SKT:x  
Number of supported slots  
Range: 1 to 4 (Default: 4)  
Specifies the number of slots that driver supports. On machines that have a PCMCIA adaptor that  
can support more slots than are present in the machines, this value should be set to the exact  
number of slots present.  
Card Services (CS.EXE)  
The Card Services driver manages competition for system resources and manages adapter and card  
resources and configuration  
Option  
/POLL  
Poll for status change  
Range : 0 to 1 (Default : 0)  
When set to 1, Card Services will not use a card-status-change interrupt to determine status changes  
on the system. It will instead poll for status changes (inserted card has been removed, empty slot  
is now occupied, etc.). This parameter should be set to 1 if the system does not have an available  
IRQ to use as a card-status-change interrupt, or if it does not support a card-status-change interrupt.  
292  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Card Identification (CARDID.EXE)  
This client device driver detects the insertion and removal of PC cards, automatically determines the  
card type upon insertion, and then configures the card and slot/adaptor (if it is an I/O Card).  
SRAM Card Driver (MTSRAM.EXE)  
This SystemSoft device driver recognizes and supports SRAM cards.  
IDE/ATA Support (ATADRV.EXE)  
ATADRV.EXE is a block device driver that supports ATA Type II Flash Disk or ATA Type III  
hard disk PC cards.  
Option  
/S:x  
Safe mode  
Range: 0 to 8 (Default: 2)  
Specifies if ATADRV is to be run in slave mode. The MTD Driver (MTDDRV) is the only master  
control driver currently available. Installs the ATADRV device driver as a slave(/S:x) to MTDDRV.  
It also specifies the number of devices (1 to 8) it can support. A value of 0 can also be used with /D  
or /S. When a value of 0 is used, only the mode that was specified (/D or /S) is implemented, not the  
number of devices assigned during installation or specified using the CONFIG utility. When this  
/S switch is used, ATADRV must be installed in CONFIG.SYS before MTDDRV and both  
ATADRV and MTDDRV must be installed before CARDID. Refer to ATA Driver Modes section  
which follows.  
Option  
/D:x  
Number of drive units  
Range: 0 to 8 (Default: 2)  
Specifies the number of drives that the system supports when installed either as a block device driver  
or as a slave device driver. Installs the ATADRV device driver as a block device driver (/D:x).  
It also specifies the number of drives (1 to 8) it can support. A value of 0 can also be used with /D or  
/S. When a value of 0 is used, only the mode that was specified (/D or /S) is implemented, not the  
number of drives assigned during installation or specified using the CONFIG utility. When the /D  
switch is used, ATADRV must be installed in CONFIG.SYS before CARDID.  
293  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Refer to ATA Driver Modes section which follows.  
Card Service Power Management Enabler (CS_APM.EXE)  
CS_APM.EXE is a DOS-based background task that enables Card Services to process system power  
management Suspend/Resume requests. When a Suspend request is initiated by system power  
management software, CS_APM notifies Card Services, which then verifies that the system  
PCMCIA slots are idle, and can be powered down. Card Services then passes this information back  
to CS_APM, which then notifies the power management software that the sockets can be powered  
off. When a Resume request is received by CS_APM, it informs Card Services, which then powers  
the sockets on again.  
Memory Technology Driver (MTDDRV.EXE)  
This component must be installed in order to support all Memory cards. It works in conjunction with  
card-specific MTDs to support a wide variety of current Flash Memory cards. It also supports  
SRAM cards (providing MTSRAM.EXE is also installed), and allows sharing of drive letters  
between the different types of memory cards (Flash, SRAM, and ATA).  
SSVCD.386(SSVCD311.386 for Windows for Workgroups), SSVRDD.386,  
PCCARD.386 (for IT-2000W only)  
These drivers permit hot insertion/removal of communications I/O, memory, and removable drive  
cards within Windows. These files are stored in the directory, E: Windows.  
294  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX C: Acquisition of Suspend/Resume Event and Power Status  
Overview  
Suspend/Resume event is notified by multiplex interrupt (INT2Fh). If any event such as power  
ON/OFF occurs, consequently the interrupt (INT2Fh) will occur. An application can acquire the  
event by catching the interrupt. Since the interrupt INT2Fh is multiplex interrupt, application must  
reset values in all the registers to the previous values after catching the interrupt and then return the  
control to the old-vector.  
Broadcast for Power Event  
INT2Fh Input:  
AH = 53h  
AL = 0Bh  
BH = (Reserved)  
BL = 1 System wait request  
= 2 System abortion request  
= 3 Normal resume notification (if the method of the previous OFF  
is by normal suspend.)  
= 4 Critical resume notification (if the method of the previous OFF is by  
critical suspend.)  
= 5 Battery state notification  
Output:  
BH = 80h Application refuses request.  
= 00h Others  
The power event is notified by POWER.EXE. In order to use the notification function,  
POWER.EXE must be pre-installed. An application must check first if the  
POWER.EXE has been installed or not by using the functions detailed below.  
Function to Check POWER.EXE  
INT2Fh Input:  
AH = 54h  
AL = 00h  
Output:  
AX = 5400h  
= others  
BH = 50h  
BL = 4Dh  
Not installed.  
Version numbers  
“P”  
“M”  
295  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Acquisition of Power Status  
Application can acquire current power status by calling APM BIOS through the interrupt INT15h.  
The following power statuses can be acquired by using the method.  
AC line status  
Battery status  
Battery flag  
Remaining battery life - percentage of charge  
Remaining battery life - time unites  
The functions detailed below will acquire the power statuses stated above.  
Acquisition of Power Status  
INT15h  
Input:  
AH = 53h  
AL = 0Ah  
BX = 0001h  
Output:  
If function successful:  
Carry = 0  
BH  
= AC line status  
00h Off-line  
01h On-line  
02h On backup power  
FFh Unknown  
All other values are reserved.  
BL = Battery status  
00h High  
01h Low  
02h Critical  
03h Charging  
FFh Unknown  
All other values are reserved.  
CH = Battery flag  
bit 0 = 1 High  
bit 1 = 1 Low  
bit 2 = 1 Critical  
bit 3 = 1 Charging  
bit 7 = 1 No system battery  
All other bits are reserved.  
FFh  
Unknown  
All other values are reserved.  
CL = Remaining battery life-percentage of charge  
0 to 100 : Percentage of the battery charging, 100 represents full  
charge in battery.  
FFh  
: Unknown  
All other values are reserved.  
296  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DX = Remaining battery life - time unit  
bit 15 = 0 : Time unit is in second.  
1 : Time unit is in minute  
bits 14 to 0 = value for second or minutes  
0 to 7FFFh : Valid value for second or minute  
FFh : Unknown  
If function unsuccessful:  
Carry =  
AH  
1
=
Error code  
09h : Unrecognized device ID  
End of the Manual  
297  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Black Box Stereo System Terminated Multimode Fiber Optic Cable User Manual
Blomberg Refrigerator SND 9682 ED A+ User Manual
Blue Rhino Gas Grill HBT722W C User Manual
Blue Rhino Insect Control Equipment CPSV002704 User Manual
Bosch Appliances Home Security System DS924IPET User Manual
Califone Computer Hardware MCFM User Manual
Carrier Electric Heater 48P2 User Manual
Casio Musical Instrument CTK900 User Manual
Charnwood Burner Grosvenor User Manual
Chicago Electric Drill 96996 User Manual