Future changes to the protocol.

This protocol has a number of known deficiencies and plans exist to address these problems. These may cause software to break that is written to exactly conform to the specification given herein. If the following guidelines are followed by those who write software that utilizes this protocol, imcompatibilities are much less likely and in most cases will be smoothly accomodated.

After sending an interrogation string, the application should loop reading response lines until it sees the final ".EOF" tag. Lines containing tag,value pairs should be parsed, and the desired values extracted. Lines containing unknown tags should be ignored. Applications can be written that do not obey these guidelines, but they are far more likely to fail when protocol enhancements are made.