Sharp AR-M165-207 (serv.man25) User Manual / Operation Manual ▷ View online
47
ADVANCED TRANSMISSION METHODS
3
3
Select "RX DATA TRANSFER" with
the [
the [
] or [
] key.
4
Press the [OK] key.
5
Select "TRANSFER" with the [
] or
[
] key.
To cancel forwarding, select "NO TRANSFER".
6
Press the [OK] key.
The machine automatically dials
the forwarding number
programmed in the key operator
the forwarding number
programmed in the key operator
programs and begins forwarding the fax or faxes.
• To cancel a forwarding operation
Press the [FAX STATUS] key, and then
cancel forwarding in the same way as a
regular fax transmission. (See
"CANCELLING A FAX TRANSMISSION"
on page 26.) The fax(es) that was going to
be forwarded will return to print standby
status in your machine.
cancel forwarding in the same way as a
regular fax transmission. (See
"CANCELLING A FAX TRANSMISSION"
on page 26.) The fax(es) that was going to
be forwarded will return to print standby
status in your machine.
• If forwarding is not possible because the
other machine is busy or a transmission
error occurs, recall attempts will be made
according to the recall times setting. If
forwarding is still not successful after the
set number of recall attempts are made,
the fax(es) will return to print standby
status in your machine.
error occurs, recall attempts will be made
according to the recall times setting. If
forwarding is still not successful after the
set number of recall attempts are made,
the fax(es) will return to print standby
status in your machine.
• When forwarding is performed, all faxes
that have been received in memory to that
point are forwarded. The page that was
being printed when the problem occurred
and all following pages will be forwarded.
point are forwarded. The page that was
being printed when the problem occurred
and all following pages will be forwarded.
• After a fax is forwarded, the fax data is
automatically cleared from memory.
GH
PQR
2-SIDED
COPY
SPECIAL FUNCTION
SPECIAL FUNCTION
PRINT
ENTRY
ENTRY
RX DATA TRANSFER
GHI
OK
BACK
RX DATA TRANSFER
:12345678901234
12345678901234
123456789012
TRANSFER
:12345678901234
12345678901234
123456789012
TRANSFER
OK
Note
Pegasus-E_Fax_Ex.book 47 ページ 2004年10月18日 月曜日 午後8時41分
48
4
TRANSMISSION USING
F-CODES
F-CODES
This chapter explains F-code transmission, which gives you a convenient means of performing advanced operations
such as relay broadcast transmission and confidential transmission. Please read those sections that are of interest
to you.
such as relay broadcast transmission and confidential transmission. Please read those sections that are of interest
to you.
COMMUNICATION BETWEEN MACHINES
SUPPORTING F-CODES
SUPPORTING F-CODES
This machine supports the "F-code" standard as established by the ITU-T*.
Operations such as relay broadcast transmission and confidential transmission previously could only be performed
with another Sharp fax machine; however, F-Code communication makes it possible to perform these operations
with fax machines of other manufacturers that support F-Code communication.
Before using the functions explained in this chapter, make sure that the other fax machine supports F-Code
communication and has the same functions as your machine. (Note that the other machine may use different names
for some functions.)
Operations such as relay broadcast transmission and confidential transmission previously could only be performed
with another Sharp fax machine; however, F-Code communication makes it possible to perform these operations
with fax machines of other manufacturers that support F-Code communication.
Before using the functions explained in this chapter, make sure that the other fax machine supports F-Code
communication and has the same functions as your machine. (Note that the other machine may use different names
for some functions.)
* The ITU-T is a United Nations organization that establishes communications standards. It is a department of the International
Telecommunication Union (ITU), which coordinates global telecommunications networks and services.
BOXES AND SUB-ADDRESSES/PASSCODES
REQUIRED FOR F-CODE TRANSMISSION
REQUIRED FOR F-CODE TRANSMISSION
"Boxes" can be created in the memory of fax machines that support F-Code communication. These boxes are used
to store faxes received from other machines and documents to be transmitted when a polling request is received. Up
to 30 boxes can be created for a variety of purposes, and a name can be assigned to each box. A "sub-address"
that indicates the box's location in memory must be programmed, and if desired, a passcode can also be
programmed to control access to the box. (A sub-address must be programmed, however, a passcode can be
omitted.)
to store faxes received from other machines and documents to be transmitted when a polling request is received. Up
to 30 boxes can be created for a variety of purposes, and a name can be assigned to each box. A "sub-address"
that indicates the box's location in memory must be programmed, and if desired, a passcode can also be
programmed to control access to the box. (A sub-address must be programmed, however, a passcode can be
omitted.)
*The public box is used for normal memory polling. (See "USING POLLING MEMORY" on page 39.)
0001
SBC CORP.
11245
Document
Group 1
7732123
Product Planning
Dept.
3321
1115
7732123
7732123
Product Planning
Dept.
1115
Product
Planning
Dept.
Planning
Dept.
3333
Department
Manager
11111111
4444
Public Box*
123456
010
Section
Manager
Reports
MEMORY
Sub-address (location in memory)
Select any number up to 20 digits.
Select any number up to 20 digits.
Box name (used to manage
boxes in your machine)
Select a name of up to 36
characters.
boxes in your machine)
Select a name of up to 36
characters.
Passcode (key)
Select any number up to 20
digits. (Not required)
Select any number up to 20
digits. (Not required)
1115
Pegasus-E_Fax_Ex.book 48 ページ 2004年10月18日 月曜日 午後8時41分
49
TRANSMISSION USING F-CODES
4
When communication occurs involving a box, the communication will only take place if the sub-address and
passcode that the other machine sends match the sub-address and passcode programmed in your machine for that
box. Therefore, to allow communication, you must inform the other party of the sub-address and passcode of the
box. Likewise, to send a fax to a box in another machine or use polling to retrieve a document from a box, you must
know the sub-address and passcode of that box. (Note that assigning names simply makes it easier to manage
boxes; you do not need to inform the other party of a box name.) However, you must inform the other party of the
sub-address and passcode for a box.
This machine uses the term "sub-address" for the location of the memory box and the term "passcode" for the
password that allows communication; however, other fax machines of other manufacturers may use different terms.
When asking the other party for a sub-address and passcode, you may find it useful to refer to the 3-character
alphabetical terminology used by the ITU-T.
passcode that the other machine sends match the sub-address and passcode programmed in your machine for that
box. Therefore, to allow communication, you must inform the other party of the sub-address and passcode of the
box. Likewise, to send a fax to a box in another machine or use polling to retrieve a document from a box, you must
know the sub-address and passcode of that box. (Note that assigning names simply makes it easier to manage
boxes; you do not need to inform the other party of a box name.) However, you must inform the other party of the
sub-address and passcode for a box.
This machine uses the term "sub-address" for the location of the memory box and the term "passcode" for the
password that allows communication; however, other fax machines of other manufacturers may use different terms.
When asking the other party for a sub-address and passcode, you may find it useful to refer to the 3-character
alphabetical terminology used by the ITU-T.
CREATING A BOX FOR F-CODE TRANSMISSION
F-code operations that use boxes include F-code polling memory (page 50), F-code confidential transmission (page
55), and F-code relay broadcast transmission (page 58).
A box is created by programming a name for the box, and up to 10 boxes for each operation type can be created.
The information programmed in each box varies slightly depending on the type of operation. For
information on programming, editing, and deleting boxes, see "PROGRAMMING, EDITING, AND DELETING
F-CODE MEMORY BOXES" on page 74.
After you have programmed a box, inform the other party of the box's sub-address and passcode.
55), and F-code relay broadcast transmission (page 58).
A box is created by programming a name for the box, and up to 10 boxes for each operation type can be created.
The information programmed in each box varies slightly depending on the type of operation. For
information on programming, editing, and deleting boxes, see "PROGRAMMING, EDITING, AND DELETING
F-CODE MEMORY BOXES" on page 74.
After you have programmed a box, inform the other party of the box's sub-address and passcode.
Your machine
ITU-T
F-code polling memory box
F-code confidential box
F-code relay broadcast function
Sub-address
SEP
SUB
SUB
Passcode
PWD
SID
SID
If you attempt to create a box when 10 boxes have already been created for that operation type, a
message will appear and you will not be able to create the box. Delete any unused boxes and then
create the new box. (See "
message will appear and you will not be able to create the box. Delete any unused boxes and then
create the new box. (See "
PROGRAMMING, EDITING, AND DELETING F-CODE MEMORY BOXES" on
page 74.)
Note
Pegasus-E_Fax_Ex.book 49 ページ 2004年10月18日 月曜日 午後8時41分
50
F-CODE POLLING MEMORY
F-code polling memory allows one fax machine to call another fax machine and initiate reception of a document that
has been scanned into the other machine's F-code polling memory box. Calling another machine and initiating
reception is called F-code polling, and scanning a document into a memory box for another machine to retrieve by
polling is called F-code polling memory. This function is approximately the same as regular polling (page 36);
however, it uses an F-code polling memory box and is always protected by means of the sub-address and
passcode.
has been scanned into the other machine's F-code polling memory box. Calling another machine and initiating
reception is called F-code polling, and scanning a document into a memory box for another machine to retrieve by
polling is called F-code polling memory. This function is approximately the same as regular polling (page 36);
however, it uses an F-code polling memory box and is always protected by means of the sub-address and
passcode.
HOW F-CODE POLLING MEMORY WORKS
F-code polling (page 53) is when your machine calls another machine and retrieves a document that was scanned
into the polling memory box of that machine (the reverse of the above diagram).
into the polling memory box of that machine (the reverse of the above diagram).
• To perform polling or polling memory transmission without using an F-code, see page 36.
• To create an F-code polling memory box, see "PROGRAMMING F-CODE PUBLIC (POLLING MEMORY)
• To create an F-code polling memory box, see "PROGRAMMING F-CODE PUBLIC (POLLING MEMORY)
BOXES" (page 77) and "Scanning a document into polling memory (the Public Box)" (page 39).
• Unlike regular polling, the other machine's fax number is not used as a passcode for F-code polling memory.
The sub-address and passcode of the polling memory box are always used for polling security.
• The receiving machine bears the expense (phone charges) of the transmission.
3) Polling memory
box opens
1) F-code polling
(transmission request)
Sub-address and passcode
are transmitted to your machine
Sub-address and passcode
are transmitted to your machine
4) Automatic transmission
of document data
to other machine
to other machine
2) Check sub-address
and passcode
Your machine
The other machine
Product Planning
Subaddress
Passcode
Match
Do not match
Note
Pegasus-E_Fax_Ex.book 50 ページ 2004年10月18日 月曜日 午後8時41分
Click on the first or last page to see other AR-M165-207 (serv.man25) service manuals if exist.