272
────────────────────────────────────────────────────
12.5 INTERFACE Screen (SYSTEM 4)
────────────────────────────────────────────────────
File exchange format is not specified for FTP. With some FTP clients, data
in a file may not be displayed correctly or correct date and time information
may not be obtained.
The 8841/42 only support generally used FTP commands. Thus, the function
of any other command used by an FTP client may not be available.
Communications Command
The 8841/42 can be operated using common RS/GPIB communications
commands. The 8802 port is set as the command input port by default. To
control the 8841/42, create a program and connect TCP via this port.
See the Application Disk (CD-R) for details of the communications
commands. Descriptions of the commands are provided in both text and
HTML format.
Use the following procedure to view the HTML format descriptions:
1. When you insert the CD-R into the CD-ROM drive, the opening page
should appear automatically. If it does not appear, open the "index.htm"
file with your Web browser.
2. Select the language to display (click the English icon).
3. Click [INTERFACE MANUAL].
4. Click the icon for your model.
(2) Compatible LAN Card
The LAN cards below are compatible with the 8841/42. (As of April 2003)
HIOKI 9578 10BASE-T LAN CARD *1
NETGEAR FA411
For the latest information, visit the HIOKI website.
*1: Sales of the HIOKI 9578 10BASE-T LAN CARD have been
discontinued. Please use the commercially available LAN cards
recommended by HIOKI.
(3) Setting
This section describes the setting procedure.
Set up the 8841/42 and connect the cable in the sequence below.
1. Insert a LAN card.
2. Set up the LAN parameters in "SYSTEM 4." (Do not connect the cable
yet.) For details, see "Setting Individual Parameters" below.
3. After setting all the parameters, press F5 [Enter].
4. Connect the LAN cable to the 8841/42 and the network.
Be sure to make the settings above before connecting the 8841/42 to the
network. Note that making these settings with the 8841/42 connected to
the network may result in illegal information being sent to the network-for
example, if the same IP address as that of another device on the network
is selected.