User Manual

“Halo” System: Communication Protocol 970-00002-000
EXI Wireless Systems, Confidential Page 19 of 33 July 27, 1999
5.2.2. Control Code
This 4-bit field identifies message type. A content of three data bytes (Data 1, Data 2 and Data 3) is
determined by this field.
There are two groups of message types, messages which carry Tag’s ID number and all others. An overview
of all message types is presented in the Table 2.
Table 3
Message Type Control
Code
Data 1 Data 2 Data 3
Tag ID (byte 1) Tag ID (byte 2) Tag ID (byte 3)
Normal 0 (0000) A B C D E F
Bypassed 4 (0100) A B C D E F
TIF Alarm 1 (0001) A B C D E F
Loiter 3 (0011) A B C D E F
Host Alarm is ON 2 (0010) A B C D E F
Unlock Req. is ON 5 (0101) A B C D E F
TIC Alarm 7 (0111) A B C D E F
ID Messages
Test Mode 10 (1010) A B C D E F
PIN # Entry 8 (1000) Key Key Key Key Key Key
Event (Door Open) 9 (1001) 00 00 01
Switches
configuration
11 (1011) Version # Mode / Option ID Range
No ID
Status 12 (1100) Noise Counter Input States Device Status
‘ID’ Messages
Messages which carry Tag ID number are prioritized not according to their code numbers but rather as
shown in the above table (‘Normal’ is the lowest priority and ‘Test Mode’ is the highest priority).
5.2.2.1. Normal
Message sent when the “good” Tag enters the field of coverage. “Good” Tag will not trigger the alarm.
5.2.2.2. Bypassed
This message is sent when the Controller enters ‘bypass’ mode. In this mode Tags can enter the field of
coverage without triggering the alarm. This mode is enabled by the user from the keypad or the RBC. If not
interrupted by the user, this mode will expire after 60 seconds and the Controller will revert into the
Normal mode.
5.2.2.3. TIF Alarm
This message is sent when the “bad” Tag enters the field of coverage. “Bad” Tag triggers the alarm.
5.2.2.4. Loiter
Message sent when the field is occupied for more then 1 minute with no new Tags coming in.