Solved

Using PLT files from AutoCAD (plot to file)

Posted on 2004-10-04
3
24,621 Views
Last Modified: 2011-08-18
I had a previous question where I found out a good way to assign an action to a .plt file to send it to a plotter.

http://www.experts-exchange.com/Applications/CAD/Q_21151844.html

But my question now is to understand more about what a .plt file really is, and how similar the plotters have to be for it to work.  To me, the main scenario where you might be tempted to want to plot to a file would be where the originating site has the data in a CAD system that the recieving site doesn't have.  You want to send them an electronic file from which they can print the drawing, even though they don't have the software (in this case, AutoCAD 2004).  I think my problem is arising because the sending site has a different plotter than the one at the receiving site.  So when the (postscript?) file is copied to the printer at site 2, it has codes which may not be valid for the printer at site 2 so nothing happens.

If this is the problem, what might a solution be, to have the sending site define a "fake" printer matching the one at the receiving site?  And to use that in the plot setup?  Or is the "plot to file" independent of the hardware used?
0
Comment
Question by:mark876543
  • 2
3 Comments
 

Author Comment

by:mark876543
ID: 12219911
I worked around it by printing to Distiller and making a pdf file.  It worked ok, but the goal of this question is to explore the .plt file method.
0
 
LVL 6

Accepted Solution

by:
david_barker earned 500 total points
ID: 12224202
Plot to file is not device independent, it plots the files in the same format as if it was plotting to the printer, but just sends the data to a file instead of directly through the wire to the printer.
So if you install the same driver setup at site 1 as at site 2, the file will be compatible with the printer.
Once at site 2, in a DOS window, do someting like (if plotter in on LPT1) :
COPY MYFILE.PRN >LPT1
0
 

Author Comment

by:mark876543
ID: 12225818
Ok, thanks.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Our company has proprietary drawing files that we do not give to our customers for final documentation. Our customers now require that we give them these drawings. They understand that they are proprietary and do not require them to be in AutoCAD bu…
In this article, we will see the basic design consideration while designing a Multi-tenant web application in a simple manner. Though, many frameworks are available in the market to develop a multi - tenant application, but do they provide data, cod…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now