Onity ht24 manual

Dating > Onity ht24 manual

Download links:Onity ht24 manualOnity ht24 manual

Do not make this number any larger than is absolutely necessary. Why did this happen? Has However, there is still hope in. Terminal connector for wall readers, etc.

Upon arrival to the room the guest opens the door as usual. This test will check the functionality of the privacy and card detection switches and the battery level. Note: Requires display encoder. Guest room keys and staff cards can be set to have access in the locking plan. The guest should close the door and enter the code again to confirm the code and lock the safe. One of these files is required for each language used. Operation Upon arrival at the hotel the guest receives a new room key. If this is the case, we recommend disabling these add-ons. However, you may be using smart cards for guests and you do not wish to recover audits.

Anti-Passback Function — Applies to Wallreaders Anti-passback means that a card can enter an opening only once without being used to exit through the same opening. Address — defines the address of the property.

Onity HT28 Technical Manual Release - Terminal connector for wall readers, etc. HT28 Smart can be used with HT24 locks and magnetic cards or the new HT28 locks which can read magnetic and a variety of smart cards.

The unit is powered by an external 12VDC transformer and has three 3 LED indicators. The LED labeled POWER is lit whenever the unit is powered. The LED labeled IN flashes when a packet of information is received from the PC. The LED labeled OUT flashes whenever an HTCOM packet is received from a Onity device. DB9M RS232 input from PC 3. Terminal connector for repeater 4. DB9F HTCOM cable connector 5. Terminal connector for wall readers, etc. DB9F HTCOM connector for PP cable 7. Power indicator To the PC The PC is connected to the rear of the Communications Distributor using a standard NULL Modem cable. Unlike previous Onity communications distributors, the Windows distributor communicates at 19200 baud using standard RS232. This connection is usually to the PC, but we can use the standard protocol to our advantage to use other devices to extend the HTCOM network in ways that were never possible before. To the HTCOM Network Onity HTCOM devices can be connected with standard HTCOM cables to the Win Distributor through either of the female DB9 connectors. Devices, such as wall readers, that require a twowire HTCOM connection must connect to the AB connector on the rear of the unit. If you need to make your own cable with DB9 connector, use A to pin 3 and B to pin 2. Also on the rear of the unit is a 5 conductor terminal connection for a repeater. The HTCOM network uses a proprietary adaptation of the RS485 communications protocol. This 9600 baud communications protocol cannot be retransmitted or converted by any known, off-the-shelf device. This means that the HTCOM network can only exist with proper wiring and within the 4500 foot distance limit. This distance may be increased by using special equipment such as repeaters. Case Material: Black ABS. Operating Voltage:12 volts DC. Special Windows Distributor Uses Because the Windows distributor can convert the proprietary HTCOM protocol to standard RS232, there is enough flexibility to solve almost any Onity network problem. This means that a string of Onity encoders can be placed at a remote check-in point using an existing LAN or WAN. This solution is an expensive one, but is solves a problem that previously could not be solved. The diagram below is a real example of using protocol conversion to accomplish a networking challenge. In this example, the property had two buildings separated by a great distance and the only existing link between buildings was over fiber optic cable. The Onity server was connected to the PMS server in the computer room. A local encoder is connected to encode master cards. The other encoders are at the front desk in another building. The property had the necessary equipment to transfer RS232 over the fiber, so Onity simply used the existing equipment. Portable Programmer Description The Onity Portable Programmer is used to transfer data between the main computer and the electronic locks. Connection to Onity Locks 2. Connection to PC Connections To the Lock Connect the Portable Programmer PP to a lock or offline reader by inserting the PP plug into the jack on the bottom of the lock or reader. Turn the programmer on, and use the menu button to select an option. If required, use the cursors to select the proper door information from the list, and press the TX key to initiate communications. To the Computer Connect the Portable Programmer PP to the computer using the 9-pin connector on the top of the PP and a standard Onity HTCOM cable. This cable may be plugged directly into the PP connector on the front of the Onity Communications Distributor. Maintenance The only maintenance required on the Portable Programmer is changing the batteries when they are low. The PP uses four 4 AA alkaline batteries. The batteries will last for 50 hours of operation. When the batteries are removed from the PP, the PP will lose all of the information recorded in its memory. Simply reload the PP from the computer to begin normal operation. The battery compartment is located on the back of the PP. Slide the battery cover up to expose the batteries for maintenance. Be sure to insert the batteries in the correct polarity. Polarity markings can be found at each battery position. Specifications User Interface: Membrane keypad. Display: 2 x 16 character LCD. Case Material: Black ABS. Operating Voltage: 6VDC supplied by 4 AA Alkaline batteries. Memory Capacity: 128K RAM available for storage of data. Gemplus GemPC410 — External Smart Card Encoder Description The Gemplus GemPC410 External smart card Encoder is used to read and write information to the smart cards used in the Onity HT28 Smart System. The green LED on the top of the unit is the only indication used by the GEMPC410. The encoder controls the Onity HTCOM communication with the PC and monitors the status of the Gemplus encoder. A 5VDC power connection is required to operate the GemPC410 encoder. Operating Voltage: 5VDC MAX Online Revalidator Description The Online Revalidator provides a way to securely manage staff cards. The Online Revalidator comes in either a Magnetic Stripe version or a Smart Card version. Connections The operating component of the Online Revalidator is an HT22i encoder. Regardless of the type of encoding device, the connections to the HTCOM network are the same. See 2 in diagram below. This cable may need to be Plenum rated as well. Power is supplied by a 12VDC 1. This is connected in the same way the Gemplus External Smart Card Encoder power connection is made. The Gemplus Smart Card DB9 connection is made to 3 in the diagram below. Not Used With This System 3. HTCOM Connection — AB Format 7. The safe is designed to resist forced entry attacks using common hand tools. It is operated by a user selectable 4 digit code entered by each new user of the safe. Operation Upon arrival at the hotel the guest receives a new room key. This key may contain an optional authorization that may be required to operate the safe. Upon arrival to the room the guest opens the door as usual. To operate the safe the guest inserts the room key into the safe reader. The safe MUST be unlocked. The guest should enter any random 4 digit code number. The guest should close the door and enter the code again to confirm the code and lock the safe. To unlock the safe again, enter the code number. The guest card is not used to operate the safe; it is only used to program the code number for a new guest. Instructions for using the safe are provided in the form of a large cardboard card suitable for wall mounting and a decal affixed to the outside of the door of the safe. The card is provided in English, French, Spanish, and German. Should the guest arrive in the room and discover that the safe is locked, the guest card will not operate the safe. Under these conditions, the safe must be opened by management using either the safe master card or the Portable Programmer. The lock can open to as many as 250 different cards identifying each card individually in a 500 record audit trail. Privacy Indicator Connection 5. Card Insertion Slot 8. Battery Access Cover 9. Battery Access Cover Screw 10. Portable Programmer Connection 11. Operate the handle to gain access to the room. Note: For Smart Cards, if the lock is configured not to open until the card is removed, the lock will read the card and the green light will blink slowly until the card is removed. Card may have expired, been voided by a new guest card, or may be for a different room. Alternating Red and Green Lights — Privacy indication or card out of shift. Flashing Red Light — Blocked. Flashing Green Light — Office Mode. Delayed Red Light Illuminates six seconds after card insertion — Card not encoded or incorrectly inserted. Green Light with Flashing Red Light — Low battery indication. Flashing Green and Red Lights — This is the indication when using a canceling card. Lock States Office Mode The lock can enter Office Mode free passage — no card required automatically at scheduled times or by inserting an authorized card twice in immediate succession. When the card is removed from the lock following the second insertion the green light will flash indicating the mode change. The lock will remain in this mode until it is double dipped by another authorized card, or it is scheduled to automatically relock. Standard Mode This is the normal operation of the lock. An authorized card that is not yet expired and is within its shift can unlock the door. Cards without this attribute will invoke an alternating green and red light as described in the previous section. In this mode, a single guest card code is allowed to enter along with any selected master cards. To gain access, the card must have the proper site code, the correct card code, any applicable authorization, within the activation and expiration date. Foyer A foyer lock does not keep an audit trail or card codes. To gain access, the card must have the proper site code, any applicable authorization, and within the activation and expiration date. Selective The selective lock is a combination of corridor and back-ofhouse locks found in HT24DOS systems. Essentially, a selective lock is a freely keyable lock that can accept as many as 250 users with an audit trail, or 500 users without. Guest room keys and staff cards can be set to have access in the locking plan. To gain access, the card must have the proper site code, the correct card code, any applicable authorization, within the activation and expiration date. Note: You can encode cards and make copies and one-shot cards for a selective lock. Maintenance Diagnosis The TEST function of the portable programmer should be used to properly diagnose any Onity lock. This test will check the functionality of the privacy and card detection switches and the battery level. If an invalid card is inserted, the PP will display the reason for the denial. Debris in the Reader If small debris should be inserted into the card slot it will most likely fall through the insertion path into a collection area. However, if this collection area becomes full of debris and the card insertion path is blocked, the reader can be easily disassembled. Remove the four screws labeled 13 in the diagram above to remove the reader cover and clean out the collection area. In extreme cases, there can be a noticeable loss in performance. Cleaning the Lock Body The only safe and effective way to clean the body of the lock is with a wet cloth. The use of solvents, thinners, polishes or abrasive materials on the lock will damage the finish. Some Onity locks undergo a varnishing process over the finish that will be severely damaged by products mentioned above. Operating Voltage: 6VDC supplied by 4 AA Alkaline batteries. The features of the system are largely the same as HT24DOS with a few additions made possible by the power of modern software and hardware. This manual will not assume any prior knowledge of the HT24DOS system. HT28 Smart can be used with HT24 locks and magnetic cards or the new HT28 locks which can read magnetic and a variety of smart cards. The following list highlights the major enhancements. This is used as reference only and may not be a complete list. The smart cards can maintain a record of locks that have granted access to the card. Loading of Daylight Savings Time information into the locks. Three day types — HT22 has this feature. Multi-tasking communications — Load the portable programmer without interrupting PMS or other activity. IPCOM communications network allows workstation PCs to control multiple encoders or other devices. This combination provides a robust platform with an established history. Because the tables are relational, any changes to one table may affect others. Be aware of this when deleting or copying files. Paradox databases have the file extension. The following is a list of files, their location, and some general comments about their purpose. Includes any loaded languages. One of these files is required for each language used. The file extension is used to identify the language. This file must be changed to reflect the proper contact information for the customer. This information is used by the local PC and the server to keep control of the database tables when there are multiple users. Do not try to manipulate these files — in doing so you could cause irreparable damage to the Onity databases. With over 250 users no audits are stored. With 15 users, 15 audits with 100 users Used to access amenities such as concierge floors, pool, elevators, etc. These amenities require the authorization to be encoded on the card, in addition, the card must be authorized and within the activation and expiration period. HT24 and HT28 locks will automatically adjust to one DST change. The lock must be loaded 2 times each year to maintain the correct date of the next DST change. Through pcAnywhere Locks read track 3. Note: Loading more than 15 masters into each lock requires more memory and reduces the number of locks a PP can store. Selectable at time of setup. Default is 90 days. Up to 10,000 with software revision Selectable at time of encoding Selectable at time of encoding Max. Operators Multiple Cards 200,00 0 6000 No Limit Yes 3 room max for insertion mag-stripe encoders. This hidden area is only accessible with a level 9 password or the maintenance password — the MODIfication menu opens this portion of the software. The level 9 password does not have complete access to all data, such as site code, but is allowed to make general locking plan changes. Because of the ability to completely change the system, any and all PC workstations must be out of the software in order to enter the MODIfications menu. If workstations are running the software and a user tries to enter the MODIfications menu, a message will appear stating that the databases could not be opened in exclusive mode. The modification screen is menu driven in a fashion similar to MODI2 for HT24DOS systems. Some screens have multiple views which can be accessed through a tabbed form. Each view will be discussed thoroughly below. Configuration The configuration screen is where the most basic information is entered. This information includes such data as the site name, site code, authorization labels, emphasized authorization assignments, etc. This screen is divided into 3 tabs, general ,options and technologies. Edition — shows the number of modifications that have been made to the locking plan. Hotel Name — defines the name of the property. This information is not displayed, but is important for maintaining the system. Address — defines the address of the property. This information is not displayed, but is important for maintaining the system. System Code — uniquely identifies each property and prevents cards from other properties from opening the locks. Onity Maintenance — password that allows Onity technicians to make modifications and have access to all features and functions of the software. Maximum number of codes per lock — defines the largest number of general master types and individual master users allowed through the lock. With HT28 locks, this number is 250. The number of locks that can be loaded into a Portable Programmer depends on the number of masters in each lock. Do not make this number any larger than is absolutely necessary. Authorizations — up to 8 auxiliary privileges can be granted with authorizations. Locks may require specific authorizations to allow access. The record includes the operator, date of transaction, number of days on the card and authorization number. If guests check out early, a negative entry is made in this record. Lock's custom fields — These fields can hold information like building number, lock finish, location, floor, etc. The information can only be seen from the MODIfication screens. If you select the Chip option there are some important details that must be set on the Cards menu. The Cards menu does not appear if the system is mag-stripe only. The ID is used in the lock list to identify the hardware. Name of lock — description of the hardware type Opening Delay — the number of seconds the lock will remain open after a valid card is used Opening only on withdrawn card — the lock will unlock only after a valid card is removed from the card slot. This prevents a guest from accidentally leaving a card in the lock. Close when lever released — the lock will automatically detect when the lever is used and lock itself. This prevents unauthorized users from following an authorized user through the door while it remains unlocked. Guest card codes look ahead — the number of future authorized codes the lock will recognize for any user. If a new key is made for a user, the lock recognizes the new code as being in its lookahead and the code is advanced. Group cards default to ½ the lookahead to prevent group cards from locking out other guests. Master card codes look ahead — the number of future master card codes the lock will recognize for any master user. Low battery indication to guests — determines if low battery indications are shown to the guests. Day types affect the shifts and automatic changes of the locks. If the property is not using shifts or automatic changes, choose the option to make all days like work days. The calendar also sets the dates for Daylight Savings time. With this software, HT24 and HT28 locks are loaded with the date of the next DST change. This change will happen automatically on the appropriate day. This means that the locks must still be updated 2 times per year, but the update change does not need to be on the day of the DST change. The software will automatically establish the DST dates for each established year based on Windows settings. Day of DST Backward - Select Day — select a date on the calendar, then click the button to change the DST date. Reset DST Dates — clears all DST dates for the current year. A guest can have only one shift number; but as this shift depends on the table, the access will change from one lock to another. Each cardholder can be assigned one of eight shifts or no shift and each door can be assigned to a timetable. The system can handle up to 200 different timetables. A property can set up many master users that all use the same type. Master types can be set so that a certain minimum password level is required to encode a card. Each master type has a unique code that the lock must remember, and each card of that type is encoded with that code. An HT28 lock can hold codes for up to 250 master types in memory. HT24 locks can hold codes for only 15 master types in memory. New cards lock out old cards. S — Suite A Suite can be keyed to open to its own code and the codes of any sub-suites immediately following it in the rooms list. Each additional guest code takes a slot for one master card. All guest cards Suite and sub-suite are locked out if a new code is presented for any of the guest cards. All guest cards Suite and sub-suite are locked out if a new code is presented for any of the guest cards. A Foyer lock does not record an audit trail. Each card is sequenced individually. Timetable Defines the hours for each shift and the automatic changes. The Default is '0' — no automatic changes, all shifts are 24 hrs. Requested authorization The lock can require an authorization to open, in addition to the correct code. The default is '0' — no authorization required. Office Function A lock cannot go into office mode unless this feature is checked. When checked, an automatic change or a card with the office mode privilege is required to put a lock in office mode. Locks in non-guestroom locations are typically left with this feature unchecked. Related Locks HTCombo safes operate off of the same code as the guestroom lock on the room. The safe is defined as a related lock for this room. This is only one example of a related lock. Authorizations Some authorizations, like the authorization allowing the elevator to access a particular floor, should be automatically assigned when a guestroom card is encoded. Any automatic authorizations should be checked in this list. Optional Authorizations Some authorizations, such as an in-room safe, are not given to each customer who occupies a guestroom. These optional authorizations can be assigned or denied at the time of check-in. Shift This shift is automatically encoded on the guestroom card at the time of check-in. The default is '0' — no shift. Override Privacy This check box defines if a guestroom card will open the lock if the privacy switch is thrown from the inside. If the PIN or Password level is set to 1, any operator can encode the card. If the PIN is set to 5, only operators with password levels of 5 or higher can encode cards for this guestroom. Related Locks Related locks, such as HTCombo safes, operate with the same cards as the lock they relate to. The related lock can, however, have other parameters that are different from its lock. Hardware type Defines the door open time, lookahead, and other parameters. Required Authorization The related lock can require a specific authorization to operate. Related Timetable Related locks can automatically open and can define shifts based on the timetable selected. Default Master Card This master must be previously declared in the masters list. Programming card The spare card system will only function in a related lock if the option is selected on this screen. You can select any room that appears in the selection screen. Red rooms are selected to have access to the room. To select a group of rooms, hold the left mouse button down and drag the mouse — then press the SPACE bar. The list on the right of the main keying screen shows all of the rooms allowed trough this lock and the room total. Remember that locks cannot have more cards selected than the setting on the Configurations screen. With the successive feature, you can easily copy the keying from one lock to another. All masters in the 'Copy' list will be copied. To remove a master from the 'Copy' list, highlight it and press the DELETE key. In the example above, EK, FM1, GM, and MM will all be ADDED to any existing keying for rooms 101-138. The existing keying for these rooms will not change. All of the masters in the 'Cards to delete' list will be removed from the keying of the selected rooms. To remove a master card from the 'Cards to be deleted' list, simply highlight the master card and press the DELETE key. Selective Many cards can be authorized to open a selective lock. You can use the Modify button to select individual locks from the list, but sometimes a range of cards need to be assigned to a lock. The Selective button allows you to select a beginning and end of a range of guestroom cards that should have access to this selective lock. With the IPCOM feature, peripherals can be connected to any workstation PC, but all devices must be declared in this list. Note: Declaring peripheral devices that are not connected to an HTCOM network will slow down the communications polling and may reduce system performance. Name — Applies to all Enter the name of the device — Encoder 1, for example. Peripheral Type — Applies to all Choose the device type — Reader Writer, Wall reader or Identifier Automatically Collect Openings — Applies to Readers and Identifiers Wall Readers and Identifiers can be programmed to send their openings to the system automatically, or to hold the openings until a report is requested. This feature will save time if more than one PC will be used to view the openings report. Required Authorization — Applies to Readers and Identifiers Identifiers and Wall Readers can be programmed only to accept cards in the locking plan and with a specific authorization. Set the required authorization on this screen. The timetable also assigns the hours for the shifts. Set the time table on this screen. The default is '0', no timetable with 24 hour shift assignments. The two readers can control the same door with relay 1, or they can control 2 separate doors by using relays 1 and 2. Use this parameter to define if the controller will energize only relay 1 or both relays. Both readers are assigned with the same locking plan and other parameters. Opening Delay — Applies to Wall Readers Set the time that the relay is energized after a valid card is presented. Open To Checked Out Cards — Applies to Wall Readers Online wall readers get instant updates of checked out guests and canceled master users. There are some cases when checked out guests need to be granted access, such as exit gates from parking garages. Anti-Passback Function — Applies to Wallreaders Anti-passback means that a card can enter an opening only once without being used to exit through the same opening. This prevents a person from entering and then passing the card back to be used by another person. The Onity anti-passback feature can only be used with online readers set to two door operation. Also, the anti-passback logic applies to one controller only, meaning that if a card is used to enter through controller A and then leaves through controller B, the card will not be allowed through controller A again. Note: For life safety reasons, cards are always allowed through the exit reader. Note: Don´t forget to select the cards that may have access. In HT24 DOS they where activated by default! Locking Plan — Applies to Wall Readers and Identifiers Only the cards declared in the locking plan of the controller will be considered for access in the device. Required authorizations, shifts, etc are only checked after the card has been found in the access list of the device. Auto-Logoff — Applies to Identifiers only An Identifier can be set to operate only after a password has been entered. Cards The cards menu is only available if chip cards are selected in the Technologies Tab. This screen is used to define smart card operating parameters for guest cards, master cards, and special cards. Card Technology The card technology tab is used to select the type of card used for guests, masters and special cards such as blocking and programming cards. There are three tabs at the bottom of the screen to make selections for each card type. Any technologies selected on the Configuration screen Technology tab are available on this screen. If you want the software to ask which card technology you would like to use each time you encode a card, select the last option 'Before Encode'. The default type is the one selected in the drop down list. Also, each type of card can be programmed to recover information from the locks. If the box on the right of the screen is checked, the smart cards will recover the information. However, you may be using smart cards for guests and you do not wish to recover audits. In this case, do not check the box. This field sets the size of the file on the card that is used to recover the information from the locks. Once this file is created on a new card, the file size cannot be changed, that is you cannot make a card recover more information than is required at the first encoding of the card. You can, however, establish a large file and instruct the card to retrieve only a few audits. This, of course, wastes valuable space on the card. Infosmart File Size The infosmart file size must be calculated depending on the card capacity in bytes. Below there is a picture with the different type of information stored in the smart card memory with the space occupied approximately. The first 104 bytes are the size occupied by default; the different records have a size of 16 bytes approximately. The flags are kept, in ASCII format, in a file called Flags. The following is a description of all system flags and their parameters. There can be several instances of this line. The number must be between 1 and 250. The default is one half of the guest code lookahead. MULTIMASTER Allows the hotel to switch the locks between 3 master keying schemes, A, B, and C. By default, the software will fill the track. The number x can be from 1 to 9. The Safe Master card can be used in conjunction with the guest room key to open PIN pad safes. The default is 3 hours. Example: PINPADSAFE,1 PINPP Requires the hotel to enter a PIN for the PP when it is loaded. PMS Enables PMS communication PMSBUFFER If an encoder is busy and a new task is requested, this option activates a buffer so the tasks will be sent to the encoder after the previous task is finished. The maximum number of buffered messages is 4. After the 4th message is buffered a OV overflow error message will be sent to the PMS. Note: Requires display encoder. PMSFILE Enables a record of all PMS transactions called AuditPMS. After this period of time, the PP can not be used except to TEST. Use this option when connected to a PMS that does not handle error messages. Note: Requires display encoder. Note: If the MICROS command is in the file, the pre-defined information follows the Micros format. Note: If the MICROS command is in the file, the pre-defined information follows the Micros format. When connecting over Ethernet, the packets do not change. They all begin with STX and end with ETX and an LRC. But to remain consistent, the data packets remain the same. Some ports are reserved and should not be used. For example, port 80 is reserved for FTP transfers. In general, any port greater than 6000 should be available. This is the port the software is 'listening' on. The PMS must know this port number in order to connect. HTCOM Device Communication Onity devices, such as encoders, online wall readers and revalidators, are connected to the PC running the Onity software through a 2-wire network called HTCOM. This unique communications network is the backbone of many Onity installations. HTCOM operates at 9600 baud and is a 2-wire multi-drop RS485 using 9 bit data packets. The distance limitation of this daisychained network is 1500 meters or approximately 4500 feet. The end of the network should be terminated with a terminating resistor to prevent data echoes that disrupt communications. The Communications Distributor section of this manual contains some other useful information about HTCOM. IPCOM Device Communication In previous systems, including HT28 version 1, all peripheral devices connect to a single PC through the HTCOM network. Workstation PCs allowed a connection to only one local encoder. This system allows multiple Onity PCs to have independent HTCOM networks with multiple peripherals. These peripherals can be PMS encoders, terminal encoders, online wall readers or revalidators. From each workstation a high level operator can claim and address any peripheral for that local HTCOM network. There is a new button in the peripheral diagnostics screen called Make it Local that is used to claim the peripheral. There is no difference in the way terminals or PMS encoders operate if they are on the HTCOM network of a server or a workstation. The software takes care of all of the message routing 'behind the scenes. EXE is also installed. Tools is used to diagnose and repair problems with locking plan databases. Data Menu — Restore Tables This menu option will check every database in the system for errors. If errors are found you will be asked if they should be repaired. This option checks tables independently for structural type file errors. This menu option tests the data in the tables to see that it corresponds properly with the other tables. Data Menu — Pack Tables Over time, database tables can have many holes where data has been deleted. Although these holes do not contain useful data, they do take up space. This frees up memory that was being used by the 'holes'. Restore Codes This option will recover the current codes from a motorized encoder. This may be useful if you need to rebuild the system after a catastrophic failure of the main Onity server and there is no recent backup of the files. This step is also done automatically when recovering from a backup. Restore Backup If the server suffers a catastrophic failure of the hard drive or the data, the system can be recovered from a backup copy of the files. Tools will check the integrity of the backup and rebuild the files. Some data may be lost — depending on what has happened since the last backup was made. Load HT22 Tools can load hex files into an HT22I encoder. This is much faster than loading with the DOS HT21. The HT22 must be connected to the same serial port that the HTCOM network is on using a 9 pin null modem cable. This is the same cable used to connect the PC and the Windows Communications Distributor. EXE, can be modified with special parameters for special uses of the program. If ommited, the database will consider the data local directory in the same directory where the HT28. If ommited, this PC will be considered as PC station number 1 main computer. Obviously in an HT28 network only one PC can be ommmited. This way the loading is faster. It is not recommended to use this parameter eventhough it can be usefull in cases as demos or in slave PCs where the master has already checked the database intergrity.

Last updated