C
ONFIGURATION
C
OMMAND
S
ET
- F
IRMWARE
R
EVISION
2.4.0_
BETA
-
V
ERSION
1.0.0
4 HOW TO TEST THE FALCOM MAMBOII USING
FIRMWARE 2.4.0 AND LATER
The MAMBOII operating with firmware version 2.4.0 and later can be simply configured
using the
FALCOM Workbench software
. For more details, please refer to a separate
manual “
FALCOMWorkbenchUserGuide.pdf
”.
For more detailed information how to perform a Bluetooth connection, please refer to a
separate manual
“
MAMBOII_Getting_Started.pdf
”
.
4.1 How to test the MAMBOII-EVAL-KIT
For more detailed information how to test a MAMBOII EVAL-KIT, please refer to a
separate manual
“
MAMBOII_EVAL_KIT_getting_started.pdf
”
.
4.2 What kind of rules should be considered to prepare your
applications with MAMBOII:
•
Read carefully this document and write down all events, states and actions,
which will be used in your application.
•
Decide, what kind of alarms will be executed and channel(s) to be
transmitted along (SMS, TCP).
•
Decide, when these alarms will execute
•
Determine, which system state must already be
present
and which particular
event the system will be waiting for to execute one or more alarms.
•
Try always to filter alarms by using 1 event and up to 4 states. A small
difference between alarms enables you to reproduce more than 1 alarm for
one event.
•
Make sure, when an event occurs, it does not affect other alarms except the
premeditated one.
•
Use
TIMER-
events to activate events and execute actions at regular interval.
Use
TRIGGER-
events to execute various actions at a particular time. Use
COUNTER-
events to limit the number of alarms. However, be careful when
you use them. Write down all alarms, which will be executed either the
TIMER, COUNTER
or
TRIGGER
and compare them with other already
configured alarms, to check if conflicts between them take place. They
should never create a situation in which an empty action causes an error, the
errors may be caused repeatedly affecting on system performances.
•
Avoid executing of false alarms when
TIMER, COUNTER
and
TRIGGER
are in
use.
This confidential document is a property of FALCOM and may not be copied or circulated without previous permission.
Page 234 of 271