background image

CSL CS101-2 EPC CLASS 1 GEN 2 RFID HANDHELD READER 

USER'S  MANUAL,  VERSION  1.0

 

Copyright © Convergence Systems Limited, All Rights Reserved 

187

11.2.2  Integration Process 

11.2.2.1 Use Cases and Requirements Gathering 

Before starting the development process, system integrators should fully understand the 

requirements from customer, such as the throughput requirement, latency requirement, 

bandwidth requirement. etc, that are specific to the reader. Besides, they could document the 

use cases which will help in decision making later on in the development process. 

 

11.2.2.2 Draft Solution and In-House Testing 

Once the requirements are gathered and use cases are defined, system integrators can develop a 

draft solution. Draft solution means that it is subjected to final adjustment or tuning after pilot 

testing. In-house testing allows system integrators to test the feasibility of the solution before 

deploying to customer’s site. 

 

11.2.2.3 API Programming 

The API Programming process here is different from the one in Familiarization Process. In 

Familiarization Process, system integrators should familiar with the configurations and 

functioning modes of the reader by using the API. In System Integration Process, they should 

determine and focus on the configurations and functioning modes to be used in the solution to 

fulfill user requirements. 

 

11.2.2.4 Pilot Testing 

RFID system is greatly affected by environmental factors. For example, background RF noise 

and metallic object around may affect the read range of antenna dramatically. The same RFID 

system may function well in the system integrator’s own office but fail in end-customer’s site. 

Therefore system integrators should conduct on-site pilot testing. 

 

During the on-site pilot testing, system integrators should tackle the site-specific problems that 

affect the RFID system. For example, if there is metallic object around, position of the antenna 

Summary of Contents for CS101-2

Page 1: ...www tuv com Report No 14018170 001 Appendix 9 User Manual FCCID UB4CS101C1GEN2 Total 213 pages include this page ...

Page 2: ...CSL CS101 2 EPC Class 1 Gen 2 RFID Handheld Reader User s Manual Version 1 0 CSL The One Stop Shop for RFID Solutions ...

Page 3: ...SPECIFICATION 9 4 INSTALLATION 11 4 1 DEVICES 11 4 1 1 Reader 11 4 1 2 Charger 14 4 2 POWER UP SEQUENCE 15 4 3 USAGE RECOMMENDATION 17 4 3 1 Strap Wrist Strap and Shoulder Strap 17 4 3 2 IO Connection 17 4 4 VERIFICATION AND VALIDATION 18 4 5 CAUTIONS 20 5 QUICK START 21 5 1 READER LOGIN 21 5 2 SYSTEM CONFIGURATION 22 5 3 SETUP RFID CONFIGURATION 23 5 4 READ TAGS 24 6 DEMO APPLICATION 25 6 1 INTRO...

Page 4: ...s 56 7 1 2 CS101 2 Demonstration Application 56 7 1 3 CS101 2 Keep Alive Monitor 57 7 1 4 CS101 2 Server Side Application 57 7 2 BLOCK DIAGRAMS 58 7 3 APPLICATION PROGRAMMING INTERFACE API DEFINITIONS 63 7 4 APPLICATION SCENARIOS WITH PROGRAM SOURCE CODES 155 7 5 UNIT TESTS 156 7 6 BUILD ENVIRONMENT 157 7 7 DEBUG METHODS 158 7 7 1 Log File 158 7 7 2 Error Message List 158 8 PC SIDE DEMO PROGRAMS 1...

Page 5: ... RFID BEST PRACTICES 182 11 1 INTRODUCTION 182 11 2 INTEGRATION PROCESS DETAILS 184 11 2 1 Familiarization Process 184 11 2 1 1 Familiarizing with Browser Interface 184 11 2 1 2 Familiarizing with Programming Interface 184 11 2 1 3 Full Scale Programming and Integration 185 11 2 1 4 Reader Capability Envelope Discovery 185 11 2 2 Integration Process 187 11 2 2 1 Use Cases and Requirements Gatherin...

Page 6: ...FICATION 195 12 7 BLOOD BAG TRACKING 196 12 8 PHARMACEUTICAL BOTTLES TRACKING AND ANTI COUNTERFEIT 197 12 9 VEHICLE TRACKING IN MAINTENANCE DEPOT 198 12 10 VEHICLE INFORMATION SYSTEM 199 12 11 DOCUMENT TRACKING 200 APPENDIX A RFID BASICS 201 APPENDIX B GLOSSARY 202 APPENDIX C FEDERAL COMMUNICATION COMMISSIONS COMPLIANCE 208 APPENDIX D MAXIMUM PERMISSIBLE EXPOSURE 209 ...

Page 7: ...ules in the United States the system must be professionally installed to ensure compliance with the Part 15 certification It is the responsibility of the operator and professional installer to ensure that only certified systems are deployed in the United States The use of the system in any other combination such as co located antennas transmitting the same information is expressly forbidden ...

Page 8: ...ader stand 3 Warehouse applications where the handheld is used to do long read range inventory of all the shelves apparently not a good idea to use a fixed reader and move it around up and down 4 Special applications where long read range is a MUST because the operator does not want to go near the tagged item example police inspecting the electronic license plate of a suspect vehicle with a suspic...

Page 9: ...ckage contains Handheld reader Charger with power adapter and country specific power cord Batteries 2 pieces Wrist strap Shoulder strap Sample tags User Manual in CD format 3 3 2 Unpacking Instructions Unpacking of the reader is very simple Just open up the box and take out the content to a table The charger should be connected and the 2 batteries charged for a minimum of 10 hours before first use...

Page 10: ...ed data handling for efficient management of large streams of tag data Highly configurable buffering and tag filtering modes to eliminate the redundant tag data so as to reduce wireless LAN traffic and server loading 400 kbps tag to reader data rate profile Robust performance in dense reader environments Excellent in transmit and receive mode generates a different combination of unique reader to t...

Page 11: ... Linear with excellent polarization diversity Power 14 8 Volt 1400 mAh Lithium Polymer battery RFID Frequency Ranges 902 928 MHz band Interfaces Wi Fi 802 11b g with WPA Configurable to use fixed IP address or DHCP USB RS 232 Maximum 2GB SD card storage Operating System WinCE Profession 5 0 Maximum Tag Read Rate 200 tag sec Maximum Speed of Tag 660 ft min Accessories Charger batteries wrist strap ...

Page 12: ...ight Convergence Systems Limited All Rights Reserved 11 4 Installation 4 1 Devices 4 1 1 Reader The CSL CS101 2 handheld RFID Reader is an EPCglobal Class 1 Gen 2 handheld reader product Figure 1 2 CS101 2Reader front view Status LED LCD Touch Screen Programmable LED 58 Keys Keyboard ...

Page 13: ...ANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 12 Figure 1 3 CS101 2Reader side view Figure 1 4 CS101 2Reader plan view Barcode Reader RFID Antenna Inside Handle and Battery SD Card Slot ...

Page 14: ...venient to use because it does not change when the reader reboots but the user has to make sure there is no collision with other network devices in the network If the reader is configured to be DHCP then a separate discovery program that runs on the PC side can help the user find all readers in the same local area network READER USB PC Running Active Syn Explore READER RS232 PC Running Active Syn ...

Page 15: ...CSL CS101 2 EPC CLASS 1 GEN 2 RFID HANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 14 4 1 2 Charger Figure 4 1 CS101 2Charger with AC Adaptor ...

Page 16: ...ry cannot go in in that case do not force it in just reverse the battery and it should slide in effortlessly 2 Press the power button on the upper right corner of the keypad continuously until LCD screen display appears 3 Wait till WinCE screen shows up 4 On the WinCE screen there is an application called CS101 Double click it to start the application 5 A screen will show up asking for ID and pass...

Page 17: ...LD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 16 6 After that the screen will enter the application selection page and you can start reading and writing tags inventory of tags search of tags etc ...

Page 18: ...ap and Shoulder Strap The wrist strap and shoulder strap should be attached to the handheld reader to allow additional weight support during use 4 3 2 IO Connection The IO connector consists of one USB connector mini USB and an RS232 Serial connector Firewire with dedicated cables that come with the reader Figure 4 3 IO Interface RS232 Firewire connector Reset USB Mini USB connector ...

Page 19: ... VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 18 4 4 Verification and Validation The reader comes with standard demo application to read tag and write tag Figure 4 4 WinCE Screen Double click the application CS101 Figure 4 5 Main Menu page 1 ...

Page 20: ... 2 RFID HANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 19 Figure 4 6 Main Menu page 2 Take the sample tags and put them in front of the handheld reader Figure 4 7 Tag Inventory ...

Page 21: ... S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 20 4 5 Cautions The reader default IP address is printed on the reader label To change this IP address please go to System Configuration page of the demo application to do that ...

Page 22: ... Systems Limited All Rights Reserved 21 5 Quick Start 5 1 Reader Login Press the power button to power up the reader To login input the User Name and Password then click the Login button The default administrator login name and password are as follows Login root Password root Figure 5 1 Login Screen ...

Page 23: ...ence Systems Limited All Rights Reserved 22 5 2 System Configuration System configuration allows user to set basic properties of the overall system such as identity of the reader reader name authentication requirement of the application ID and password etc Figure 5 2 System Configuration Screen ...

Page 24: ... can set up operation profile of the RFID reading and writing operation by going to the RFID Configuration screen Please set above parameters to default operation profile Please open page Link Profile as shown in Figure 5 3 You can reach the page by clicking RFID Config Link Profile Select correct values and then click Apply button Figure 5 3 Reader Configuration Screen ...

Page 25: ...nvergence Systems Limited All Rights Reserved 24 5 4 Read Tags To read tags one can use the Tag Read demo application Firstly select Tag Read in the main menu then select Scan First all Tag s EPC ID within the readable range can be read into the handheld reader Figure 5 4 Tag Read Operation ...

Page 26: ...ON 1 0 Copyright Convergence Systems Limited All Rights Reserved 25 6 Demo Application 6 1 Introduction The WinCE screen contains a short cut called CSL 101 Demo App as shown in Figure 4 1 Please double click that short cut to start the application Figure 6 1 WinCE Screen ...

Page 27: ... GEN 2 RFID HANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 26 6 2 Splash Screen The splash screen will display wait until the application start up Figure 6 2 Splash Screen ...

Page 28: ...ANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 27 6 3 ID and Password Page The ID and Password page as shown in Figure 4 3 allows controlled access to this application Figure 6 3 ID and Password Page Figure 6 4 ID and Password Page ...

Page 29: ...tems Limited All Rights Reserved 28 6 4 Applications Selector Screen The Applications Selector Screen contains buttons that carry out different CS101 2functions This is a multiple screen interface where user can navigate to the next screen using the More button Figure 6 5 Applications Selector Screen 1 ...

Page 30: ...CSL CS101 2 EPC CLASS 1 GEN 2 RFID HANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 29 Figure 6 6 Applications Selector Screen 2 ...

Page 31: ...irstly select Tag Read in the main menu then select Scan First all tag s EPC ID within the readable range will be read into the handheld reader If one want to read further information from the desirable tag such as access password or kill tag password select the tag EPC ID from the EPC list then press Read Selected If the tag memory banks are locked access password is required to provide Figure 6 ...

Page 32: ...ly select Tag Write in the main menu then select Scan First to read all tags IDs into the reader now you can read further tag information by selecting any tag EPC ID from the EPC list and then clicking the button of Read Selected Different memory band can be selected to be written by highlighting the memory bank and then keying in a new value click Write Selected to start write tag at once Figure ...

Page 33: ...ader settings by entering the new ID in EPC Value and then click Write Any button If your just want to write one tag only tick the option of Stop at first tag or tick the Auto increment box to write more than one tag with the EPC value is automatically increment Figure 6 9 Tag Write Auto Increment We can check the original ID on the left column and the corresponding written ID on the right column ...

Page 34: ...N 1 0 Copyright Convergence Systems Limited All Rights Reserved 33 Enter the masking value in the Tag Group Mask so that the tag EPC ID will not be written when the prefix of tag EPC ID is same as the masking value Figure 6 11 Tag Write Masking Figure 6 12 Tag Write Result ...

Page 35: ...ce Systems Limited All Rights Reserved 34 6 4 3 Tag Inventory You can read all tags at a time by using the function of tag inventory Besides the EPC ID you can also read the ambient temperature and internal temperature of the handheld reader Figure 6 13 Inventory Main Figure 6 14 Inventory Result ...

Page 36: ... Limited All Rights Reserved 35 6 4 4 Tag Ranging The Tag Ranging provides the function for the user to read the tags with RSSI RF Signal Strength Indicator in a list so that RSSI value will keep changing when the handheld move to and from the tags Figure 6 15 Tag Ranging Main Figure 6 16 Tag Ranging Result ...

Page 37: ...ADER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 36 6 4 5 Tag Search The Tag Search application allows user to zero in onto tag using a Geiger like buzzer pattern Figure 6 17 Tag Search Figure 6 18 Tag Search ...

Page 38: ...right Convergence Systems Limited All Rights Reserved 37 6 4 6 Tag Commissioning The Tag Commissioning allows the user to associate the Bar Code ID and Tag ID and then save it into a file in CSV format Figure 6 19 Tag Commissioning tag read Figure 6 20 Tag Commissioning association ...

Page 39: ...tems Limited All Rights Reserved 38 6 4 7 Tag Authentication The Tag Authentication allows the user to compare the Barcode EPC ID based on a CSV file saved in the handheld reader with the Barcode EPC ID that can be read currently Figure 6 21 Tag Authentication Main Figure 6 22 Tag Authentication Result ...

Page 40: ...CSL CS101 2 EPC CLASS 1 GEN 2 RFID HANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 39 6 4 8 Database Management Figure 6 23 Database Management ...

Page 41: ...nventory Tag Memory Frequency Link Profile Antenna and Overheat Protection Inventory Setup Session Session number must be different from reader to reader if they are pointing into the same zone Est Tag Population Size it is the estimated population of tags to be read at a time Tag Filter Mask Set the filter to select the tags that you want to read write in the tag inventory submenu Figure 6 24 RFI...

Page 42: ...gence Systems Limited All Rights Reserved 41 Tag Memory Vendors Select the vendor type to determine the size of the memory bank Tag Bank Sizes Beside the predefine memory size from different vendors you can also change the size depending on the tag type Figure 6 25 RFID Configuration Tag Memory ...

Page 43: ...L VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 42 Link Profile Different modulation profile can be selected by the user for different situation Figure 6 26 RFID Configuration Link Profile Figure 6 27 RFID Configuration Link Profile Details ...

Page 44: ...LD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 43 Antenna Depending on the read range and the tag type you can adjust the antenna power range from 0 to 30dBm Figure 6 28 RFID Configuration Antenna ...

Page 45: ...andheld reader to avoid overheat Duty Cycle The function of duty cycle prevents the user to read write for a long time When tag read write is working over the predefined period it will stop to do the tag read write and then start it again for another predefined period Overheat Protection Set a temperature value here so that the reader will show an overheat warning when the handheld internal temper...

Page 46: ...0 Copyright Convergence Systems Limited All Rights Reserved 45 Temperature when the handheld reader temperature reaches the predefine temperature value on this page it will display the warning message and stop tag read write function Figure 6 30 RFID Configuration Temperature ...

Page 47: ...S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 46 6 4 10 Scan Barcode The Scan Barcode allows the user to scan barcode and then save it into a file in CSV format Figure 6 31 Scan Barcode Main Figure 6 32 Scan Barcode Scanning ...

Page 48: ... use the tag security to set the protection feature of the tag Firstly click Choose another Tag to scan the available tag that is within the coverage of the handheld reader then select the tag from the tag list The handheld reader can let the user to set the protection of kill password access password EPC ID TID and user bank depending on the tag type Figure 6 33 Tag Permission ...

Page 49: ...Systems Limited All Rights Reserved 48 Allow allow read write the memory bank Always Allow Tag can never be locked Password Protect need password when access the tag memory bank Always Deny tag cannot be read even correct password is provided No Change keep previous status Figure 6 34 Tag Permission ...

Page 50: ...vergence Systems Limited All Rights Reserved 49 6 4 12 System Configuration The System Configuration contains the submenu for Identity the reader user login in out beep sound for different user function Identity Set the unique name ID for the reader Figure 6 35 System Configuration Identity ...

Page 51: ...EADER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 50 User Set login name and password can restrict the unauthorized user to run the demo program in this handheld reader Figure 6 36 System Configuration User ...

Page 52: ... RFID HANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 51 Sounds Different sound melody can assign to different usage to the handheld reader Figure 6 37 System Configuration Sounds ...

Page 53: ...VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 52 Diagnostics The Diagnostics submenu allows the user to check the version of current RFID driver and MAC user can also set the trace log for debugging Figure 6 38 System Configuration Diagnostics ...

Page 54: ... 1 0 Copyright Convergence Systems Limited All Rights Reserved 53 Time Synchronization This page allows you to set the NTP server so that the system time can synchronize with NTP server when you press the Sync Now button Figure 6 39 System Configuration Time Synchronization ...

Page 55: ...UAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 54 6 4 13 Factory Defaults Factory Defaults User can use the factory defaults to reset the RFID Config System Config and data Folders into the default settings Figure 6 40 Factory Defaults ...

Page 56: ...lopment Kit The CSL CS101 2handheld reader software development kit provides the following components for quick and easy application development 1 Software specifications 2 Block diagrams 3 Application Programming Interface API definitions 4 Application scenarios with program source codes 5 Unit test plan and results 6 Build environment 7 Debug methods ...

Page 57: ... Alive Monitor all of the above inside the handheld device and then also CS101 2 Server Side Database Administration Application which resides on the WinXP server side 7 1 1 CS101 2 RFID Libraries The CS101 2 RFID Libraries consists of 3 parts 1 RfidSp 2 PosSp 3 ClsSys Util These calls are designed to be called by C applications with the PInvoke Platform Invoke method 7 1 2 CS101 2 Demonstration A...

Page 58: ...cation that is turned on during WinCE boot up to monitor health situations including 1 Battery Monitoring and Alert 2 Memory RAM Monitoring and Alert 3 Disk Space Internal Flash Monitoring and Alert 4 Disk Space SD Card Monitoring and Alert 5 SD Card Physical Action Monitoring and Alert insertion and ejection 6 Network Condition Monitoring and Alert 7 Automatic Files Backup 7 1 4 CS101 2 Server Si...

Page 59: ... PInvoke Function Call Message Response Mfc RfidSp dll LED WinXP C Ref App Sqlce Sqlce CSL RFID Module Buzzer C Ref App Web Server Web Service Proxy Main Program Web Service Intel Rfid Lib LED Buzzer Lib RfidSp Access LED Buzzer Rfid User Interface Db Access Notification Monitor Battery Sensing Battery Low Indication soap http protocol with post push over WiFi Db Manager Interactive User Input Dat...

Page 60: ...l SqlCe Database Microsoft SqlCe3 1 It has access to the data using sql commands 4 The RfidSp Access This setup the RfidSp dll This controls the Rfid Reader get back raw data from the reader the post processed data from the Rfid Middleware 5 The LED Buzzer Control This controls the 7 color LED the buzzer volume frequency 6 The Notification Monitor This alert the main program that the battery low n...

Page 61: ...an also be copied between WinCE WinXP through ActiveSync or ftp In general the database Replication between the SqlCe server on WinCE WinXP is done by the RDASync the Remote Data Access Synchronization technique from Microsoft Synchronization between Sql2005 SqlCe on WinXP is not included in the reference solution 2 The required 802 11 a b g WiFi Access Point provides intranet connection assign DH...

Page 62: ...ce Systems Limited All Rights Reserved 61 C App Client Mgr WinXP Pro NET2 0 Msmqdb lib Sql 2005 Express Msmq Msg Handling Db access WinCE Db Client DlgSetup_M Main App cfg Msmqdb xml Dataset WinXP Admin Datagrid View Msmqdb lib DlgSetup_M Main App cfg Msmqdb xml msmq service Atomic msg RxThd RxThd ...

Page 63: ...eserved 62 Wireless Router WinXP SP2 WinCE5 0 Pro Data Acquisition App Sqlce Db sdf file usb1 1 ActiveSyn IIS web http1 1 client ActiveSync Card Reader Card Reader 2GB SDCard Db File sdf Session based data update Periodically Backup Data Update Data to Server at the End Of Day GUI for Sqlce Db export xsd Existing Backend System ...

Page 64: ...es C namespace ClslibRfidSp Dependencies Program Files W_RfidSp dll Type Definitions HRESULT_RFID_STATUS Prototype using HRESULT_RFID_STATUS ClslibRfidSp HRESULT_RFID System Int32 Description This enumerates the status in the response messages RFID_RADIO_HANDLE Prototype using RFID_RADIO_HANDLE System UInt32 Description This is the handle to the RFID radio object A zero or negative is an invalid v...

Page 65: ...d message on WinCE RFID_INVALID_RADIO_HANDLE Prototype public const RFID_RADIO_HANDLE RFID_INVALID_RADIO_HANDLE RFID_RADIO_HANDLE 0 Description This is the invalid radio handle SELECTCRITERIA_COUNT Prototype public const int SELECTCRITERIA_COUNT 4 Description This is the number of selectcriteria to set POSTMATCHCRITERIA_COUNT Prototype public const int POSTMATCHCRITERIA_COUNT 4 Description This is...

Page 66: ... interface supported E_NOTIMPL 0x80004001 Not implemented E_OUTOFMEMORY 0x8007000E Failed to allocate necessary memory E_POINTER 0x80004003 Pointer that is not valid E_UNEXPECTED 0x8000FFFF Unexpected failure S_RFID_STATUS_OK 0x00040000 RFID Success E_RFID_ERROR_ALREADY_OPEN 0x8004D8F1 Attempted to open a radio that is already open E_RFID_ERROR_BUFFER_TOO_SMALL 0x8004d8f2 Buffer supplied is too sm...

Page 67: ...radio has been detached from the system E_RFID_ERROR_CURRENTLY_NOT_ALLOWED 0x8004d902 library function is not allowed at this time E_RFID_ERROR_RADIO_NOT_RESPONDING 0x8004d903 The radio module s MAC firmware is not responding to requests Description This enumerates the Success Error status RFID_PACKET_TYPE Prototype public enum RFID_PACKET_TYPE uint RFID_PACKET_TYPE_COMMAND_BEGIN 0x0000 RFID_PACKE...

Page 68: ...E_MSGID_RadioGetLinkProfile RFID_REQUEST_TYPE_MSGID_RadioWriteLinkProfileRegister RFID_REQUEST_TYPE_MSGID_RadioReadLinkProfileRegister RFID_REQUEST_TYPE_MSGID_AntennaPortGetStatus RFID_REQUEST_TYPE_MSGID_AntennaPortSetState RFID_REQUEST_TYPE_MSGID_AntennaPortSetConfiguration RFID_REQUEST_TYPE_MSGID_AntennaPortGetConfiguration RFID_REQUEST_TYPE_MSGID_18K6CSetSelectCriteria RFID_REQUEST_TYPE_MSGID_1...

Page 69: ...tion RFID_REQUEST_TYPE_MSGID_RadioReadGpioPins RFID_REQUEST_TYPE_MSGID_RadioWriteGpioPins RFID_REQUEST_TYPE_MSGID_END RFID_REQUEST_TYPE_MSGID_RadioWriteGpioPins 43 Request ACK MsgId RFID_REQEND_TYPE_MSGID_START RFID_REQUEST_TYPE_MSGID_END 0x01 RFID_REQEND_TYPE_MSGID_Startup RFID_REQEND_TYPE_MSGID_START RFID_REQEND_TYPE_MSGID_Shutdown RFID_REQEND_TYPE_MSGID_RetrieveAttachedRadiosList RFID_REQEND_TY...

Page 70: ..._18K6CTagInventory RFID_REQEND_TYPE_MSGID_18K6CTagRead RFID_REQEND_TYPE_MSGID_18K6CTagWrite RFID_REQEND_TYPE_MSGID_18K6CTagKill RFID_REQEND_TYPE_MSGID_18K6CTagLock RFID_REQEND_TYPE_MSGID_RadioCancelOperation RFID_REQEND_TYPE_MSGID_RadioAbortOperation RFID_REQEND_TYPE_MSGID_RadioSetResponseDataMode RFID_REQEND_TYPE_MSGID_RadioGetResponseDataMode RFID_REQEND_TYPE_MSGID_MacUpdateFirmware RFID_REQEND_...

Page 71: ...D_PACKET_TYPE RFID_PACKET_TYPE_18K6C_INVENTORY_ROUND_BEGIN RFID_PACKET_TYPE_MSGID_START RFID_PACKET_TYPE_MSGID_18K6C_INVENTORY RFID_PACKET_TYPE RFID_PACKET_TYPE_18K6C_INVENTORY RFID_PACKET_TYPE_MSGID_START RFID_PACKET_TYPE_MSGID_18K6C_TAG_ACCESS RFID_PACKET_TYPE RFID_PACKET_TYPE_18K6C_TAG_ACCESS RFID_PACKET_TYPE_MSGID_START RFID_PACKET_TYPE_MSGID_ANTENNA_CYCLE_END RFID_PACKET_TYPE RFID_PACKET_TYPE...

Page 72: ...MSGID_TagInv_ClearAllTaglist RFIDMW_REQUEST_TYPE_MSGID_TagInv_UpdateAllTaglistToFile RFIDMW_REQUEST_TYPE_MSGID_TagInv_GetUpdateTaglist RFIDMW_REQUEST_TYPE_MSGID_TagInv_GetAllTaglist RFIDMW_REQUEST_TYPE_MSGID_END RFIDMW_REQUEST_TYPE_MSGID_TagInv_GetAllTaglist RFIDMW_REQEND_TYPE_MSGID_START RFIDMW_REQUEST_TYPE_MSGID_END 0x01 RFIDMW_REQEND_TYPE_MSGID_TagInv_SetAllTaglist RFIDMW_REQEND_TYPE_MSGID_STAR...

Page 73: ..._STATE Prototype public enum RFID_RADIO_POWER_STATE uint RFID_RADIO_POWER_STATE_FULL RFID_RADIO_POWER_STATE_STANDBY Description This is the power state of the radio RFID_ANTENNA_PORT_STATE Prototype public enum RFID_ANTENNA_PORT_STATE uint RFID_ANTENNA_PORT_STATE_DISABLED RFID_ANTENNA_PORT_STATE_ENABLED Description This gives the state of a logical antenna port RFID_18K6C_SELECTED Prototype public...

Page 74: ...rototype public enum RFID_18K6C_INVENTORY_SESSION_TARGET uint RFID_18K6C_INVENTORY_SESSION_TARGET_A 0 RFID_18K6C_INVENTORY_SESSION_TARGET_B 1 Description This defines the valid states for a tag s ISO 18000 6C inventory flags RFID_18K6C_MODULATION_TYPE Prototype public enum RFID_18K6C_MODULATION_TYPE uint RFID_18K6C_MODULATION_TYPE_DSB_ASK RFID_18K6C_MODULATION_TYPE_SSB_ASK RFID_18K6C_MODULATION_TY...

Page 75: ...type public enum RFID_18K6C_MILLER_NUMBER uint RFID_18K6C_MILLER_NUMBER_FM0 RFID_18K6C_MILLER_NUMBER_2 RFID_18K6C_MILLER_NUMBER_4 RFID_18K6C_MILLER_NUMBER_8 Description This is the ISO 18000 6C Miller encoding sub carrier RFID_RADIO_PROTOCOL Prototype public enum RFID_RADIO_PROTOCOL uint RFID_RADIO_PROTOCOL_ISO18K6C Description The is the tag protocol RFID_18K6C_MEMORY_BANK Prototype public enum R...

Page 76: ... RFID_18K6C_ACTION_ASLINVA_DSLINVB RFID_18K6C_ACTION_ASLINVA_NOTHING RFID_18K6C_ACTION_NOTHING_DSLINVB RFID_18K6C_ACTION_NSLINVS_NOTHING RFID_18K6C_ACTION_DSLINVB_ASLINVA RFID_18K6C_ACTION_DSLINVB_NOTHING RFID_18K6C_ACTION_NOTHING_ASLINVA RFID_18K6C_ACTION_NOTHING_NSLINVS Description This is the action performed upon the tag populations i e matching and non matching during the select operation The...

Page 77: ...ESSION_S0 RFID_18K6C_INVENTORY_SESSION_S1 RFID_18K6C_INVENTORY_SESSION_S2 RFID_18K6C_INVENTORY_SESSION_S3 Description This is the ISO 18000 6C inventory session flags that are available RFID_18K6C_INVENTORY_SESSION Prototype public enum RFID_18K6C_INVENTORY_SESSION_TARGET uint RFID_18K6C_INVENTORY_SESSION_TARGET_A RFID_18K6C_INVENTORY_SESSION_TARGET_B Description This is the valid states for a tag...

Page 78: ...ID_18K6C_TAG_PWD_PERM Prototype public enum RFID_18K6C_TAG_PWD_PERM uint RFID_18K6C_TAG_PWD_PERM_ACCESSIBLE RFID_18K6C_TAG_PWD_ALWAYS_ACCESSIBLE RFID_18K6C_TAG_PWD_SECURED_ACCESSIBLE RFID_18K6C_TAG_PWD_ALWAYS_NOT_ACCESSIBLE RFID_18K6C_TAG_PWD_PERM_NO_CHANGE Description This is the ISO 18000 6C tag password permission values RFID_18K6C_TAG_MEM_PERM Prototype public enum RFID_18K6C_TAG_MEM_PERM uint...

Page 79: ...RESPONSE_MODE uint RFID_RESPONSE_MODE_COMPACT 0x00000001 RFID_RESPONSE_MODE_NORMAL 0x00000003 RFID_RESPONSE_MODE_EXTENDED 0x00000007 Description This is the tag access operation data reporting mode RFID_MAC_RESET_TYPE Prototype public enum RFID_MAC_RESET_TYPE uint RFID_MAC_RESET_TYPE_SOFT Description This is the types of resets available on the MAC RFID_MAC_REGION Prototype public enum RFID_MAC_RE...

Page 80: ...3 0x00000001 13 SET_BIT 13 RFID_RADIO_GPIO_PIN_14 0x00000001 14 SET_BIT 14 RFID_RADIO_GPIO_PIN_15 0x00000001 15 SET_BIT 15 RFID_RADIO_GPIO_PIN_16 0x00000001 16 SET_BIT 16 RFID_RADIO_GPIO_PIN_17 0x00000001 17 SET_BIT 17 RFID_RADIO_GPIO_PIN_18 0x00000001 18 SET_BIT 18 RFID_RADIO_GPIO_PIN_19 0x00000001 19 SET_BIT 19 RFID_RADIO_GPIO_PIN_20 0x00000001 20 SET_BIT 20 RFID_RADIO_GPIO_PIN_21 0x00000001 21 ...

Page 81: ...ION_FLAG RFID_FLAG_MAC_EMULATION 0x00000001 Description This is the flag for the RFID_RadioOpen function In system emulation mode user can set to MAC emulation mode while calling RadioOpen RFID_18K6CTag_FLAG Prototype public enum RFID_18K6CTag_FLAG RFID_FLAG_PERFORM_SELECT 0x00000001 RFID_FLAG_PERFORM_POST_MATCH 0x00000002 Description This is the flag for the RFID_18K6CTag functions Structures RFI...

Page 82: ...c struct RFID_RetrieveAttachedRadiosList_T public RFID_RADIO_ENUM_T radio_enum public UInt32 flags public HRESULT_RFID_STATUS status Fields in radio_enum enum of radio object in flags 0 reserved Description This is the data structure for f_RfidDev_RetrieveAttachedRadiosList operation CS101 only has a single radio object for RFID_RADIO_ENUM array of objects is not required RFID_RadioOpen_T Prototyp...

Page 83: ...eration RFID_RadioGetSetConfigurationParameter_T Prototype public struct RFID_RadioGetSetConfigurationParameter_T public RFID_RADIO_HANDLE handle public UInt16 parameter public UInt32 value out in public HRESULT_RFID_STATUS status Fields in parameter The parameter address to set out in value The value content to get set Description This is the data structure for f_RfidDev_RadioGetConfigurationPara...

Page 84: ... handle public RFID_RADIO_POWER_STATE state public HRESULT_RFID_STATUS status Fields out in state power on off state Description This is the data structure for f_RfidDev_RadioGetPowerState f_RfidDev_RadioSetPowerState operation RFID_RadioGetSetCurrentLinkProfile_T Prototype public struct RFID_RadioGetSetCurrentLinkProfile_T public RFID_RADIO_HANDLE handle public UInt32 profile public HRESULT_RFID_...

Page 85: ...dioReadWriteLinkProfileRegister_T Prototype public struct RFID_RadioReadWriteLinkProfileRegister_T public RFID_RADIO_HANDLE handle public UInt32 profile public UInt16 address public UInt16 value public HRESULT_RFID_STATUS status Fields in profile profile id 0 5 for the link profile register to be accessed in address address of the register out in value content Description This is the data structur...

Page 86: ... Fields in antennaPort always 0 for CS101 in state enabled disabled Description This is the data structure for f_RfidDev_AntennaPortSetState operation RFID_AntennaPortGetSetConfiguration_T Prototype public struct RFID_AntennaPortGetSetConfiguration_T public RFID_RADIO_HANDLE handle public UInt32 antennaPort public RFID_ANTENNA_PORT_CONFIG config const struct public HRESULT_RFID_STATUS status Field...

Page 87: ...ID_18K6CGetSelectCriteria__T Prototype public struct RFID_18K6CGetSelectCriteria__T public RFID_RADIO_HANDLE handle public UInt32 countCriteria public RFID_18K6C_SELECT_CRITERIA criteria public HRESULT_RFID_STATUS status Fields in countCriteria criteria count in criteria criteria to get Description This is the data structure for f_RfidDev_18K6CGetSelectCriteria operation RFID_18K6CSetPostMatchCrit...

Page 88: ...in criteria criteria to get Description This is the data structure for f_RfidDev_18K6CGetPostMatchCriteria operation RFID_18K6CGetSetQueryTagGroup_T Prototype public struct RFID_18K6CGetSetQueryTagGroup_T public RFID_RADIO_HANDLE handle public RFID_18K6C_TAG_GROUP group public HRESULT_RFID_STATUS status Fields out in Group the tag group for subsequent tag protocol operations applied to it This is ...

Page 89: ...c RFID_18K6C_SINGULATION_ALGORITHM_PARMS_T singulationParms public HRESULT_RFID_STATUS status Fields in parms singulation algorithm parameters Description This is the data structure for f_RfidDev_18K6CGet Set SingulationAlgorithmParameters operation RFID_18K6CSetQueryParameters_T Prototype public struct RFID_18K6CSetQueryParameters_T public RFID_RADIO_HANDLE handle public RFID_18K6C_QUERY_PARMS pa...

Page 90: ...O_HANDLE handle public RFID_18K6C_INVENTORY_PARMS invenParms in const public UInt32 flags public HRESULT_RFID_STATUS status Fields in invenParms INVENTORY_PARMS in flags 0 RFID_FLAG_PERFORM_SELECT RFID_FLAG_PERFORM_POST_MATCH Description This is the data structure for f_RfidDev_18K6CTagInventory operation RFID_18K6CTagRead_T Prototype public struct RFID_18K6CTagRead_T public RFID_RADIO_HANDLE hand...

Page 91: ...iption This is the data structure for f_RfidDev_18K6CTagWrite operation RFID_18K6CTagKill_T Prototype public struct RFID_18K6CTagKill_T public RFID_RADIO_HANDLE handle public RFID_18K6C_KILL_PARMS killParms in const public UInt32 flags public HRESULT_RFID_STATUS status Fields in killParms PARMS in flags 0 RFID_FLAG_PERFORM_SELECT RFID_FLAG_PERFORM_POST_MATCH Description This is the data structure ...

Page 92: ...de in out RFID_RESPONSE_MODE public HRESULT_RFID_STATUS status Fields in responseType currently always RFID_RESPONSE_TYPE_DATA 0xffffffff out in responseMode Compact Normal default extended Description This is the data structure for f_RfidDev_RadioGetResponseDataMode f_RfidDev_RadioSetResponseDataMode operation RFID_MacUpdateFirmware_T Prototype public struct RFID_MacUpdateFirmware_T public RFID_R...

Page 93: ...FID_MacReadWriteOemData_T public RFID_RADIO_HANDLE handle public UInt32 address public UInt32 count public UIntPtr pData UI32 ptr to an BYTE array count 4 1 public HRESULT_RFID_STATUS status Fields To Be Designed Description This is the data structure for f_RfidDev_MacReadOemData f_RfidDev_MacWriteOemData operation RFID_MacReset_T Prototype public struct RFID_MacReset_T public RFID_RADIO_HANDLE ha...

Page 94: ...D_MacBypassReadWriteRegister_T public RFID_RADIO_HANDLE handle public UInt16 address public UInt16 value public HRESULT_RFID_STATUS status Fields in address UINT16 register address out in value UINT32 value Description This is the data structure for f_RfidDev_MacBypassReadRegister f_RfidDev_MacBypassWriteRegister operation RFID_MacGetSetRegion_T Prototype public struct RFID_MacGetSetRegion_T publi...

Page 95: ... GPIO In or Out Description This is the data structure for f_RfidDev_RadioSetGpioPinsConfiguration operation RFID_RadioGetGpioPinsConfiguration_T Prototype public struct RFID_RadioGetGpioPinsConfiguration_T public RFID_RADIO_HANDLE handle public UInt32 configuration public HRESULT_RFID_STATUS status Fields configuration bit masked status of the 32 GPIOs as Input or Output pin Description This is t...

Page 96: ...andle public UInt32 flags public HRESULT_RFID_STATUS status Fields in flags unreferenced Description This is the data structure for f_RfidDev_RadioCancelOperation operation RFID_RadioAbortOperation_T Prototype public struct RFID_RadioAbortOperation_T public RFID_RADIO_HANDLE handle public UInt32 flags public HRESULT_RFID_STATUS status Fields in flags unreferenced Description This is the data struc...

Page 97: ...e identifier public UInt16 pkt_len Packet length preamble number of 32 bit words that follow the common public UInt16 res0 Reserved for future use Fields pkt_ver Packet specific version number flags Packet specific flags pkt_type Packet type identifier pkt_len Packet length preamble number of 32 bit words that follow the common res0 Reserved for future use Description This is the common packet pre...

Page 98: ...ields cmn The command context ms_ctr Current millisecond counter Description This is the command end packet RFID_PACKETMSG_ANTENNA_CYCLE_BEGIN_T Prototype public struct RFID_PACKETMSG_ANTENNA_CYCLE_BEGIN_T public RFID_PACKETMSG_COMMON_T cmn No other packet specific fields Fields cmn The command context Description This is the antenna cycle begin packet RFID_PACKETMSG_ANTENNA_CYCLE_END_T Prototype ...

Page 99: ..._ANTENNA_END_T Prototype public struct RFID_PACKETMSG_ANTENNA_END_T public RFID_PACKETMSG_COMMON_T cmn No other packet specific fields Fields cmn The command context Description This is the antenna end packet RFID_PACKETMSG_INVENTORY_CYCLE_BEGIN_T Prototype public struct RFID_PACKETMSG_INVENTORY_CYCLE_BEGIN_T public RFID_PACKETMSG_COMMON_T cmn public UInt32 ms_ctr Fields cmn The command context ms...

Page 100: ...acket specific fields Fields cmn The command context Description This is the data structure in the message RFID_PACKETMSG_18K6C_INVENTORY_ROUND_END_T Prototype public struct RFID_PACKETMSG_18K6C_INVENTORY_ROUND_END_T public RFID_PACKETMSG_COMMON_T cmn No packet specific fields Fields cmn The command context Description This is the ISO 18000 6C inventory round end packet RFID_PACKETMSG_18K6C_TAG_AC...

Page 101: ...code from tag access 0 NoError RFID_18K6C_TAG_ACCESS_CRC_INVALID ACCESS_TIMEOUT BACKSCATTER_ERROR ACCESS_ERROR res0 reserved res1 reserved tag_data Variable length access data 2 16Byte for EPC Gen2 Description This is the ISO 18000 6C tag access packet RFID_PACKETMSG_18K6C_INVENTORY_AND_DATA_T Prototype public unsafe struct RFID_PACKETMSG_18K6C_INVENTORY_AND_DATA_T public RFID_PACKETMSG_COMMON_T c...

Page 102: ...ult subtype public UInt32 context Context specific data for fault Fields cmn The command context ms_ctr Current millisecond counter fault_type Fault type fault_subtype Fault subtype context Context specific data for fault Description This is the non critical fault packet RFID_PACKETMSG_CARRIER_INFO_T Prototype public struct RFID_PACKETMSG_CARRIER_INFO_T public RFID_PACKETMSG_COMMON_T cmn public UI...

Page 103: ...iption This represents the version information for components in the system RFID_RADIO_INFO Prototype public struct RFID_RADIO_INFO public UInt32 length public RFID_VERSION driverVersion public UInt32 cookie public UInt32 idLength public IntPtr pUniqueId Fields length The length of the structure in bytes sizeof RFID_RADIO_INFO driverVersion The version information for the radio s bus driver cookie...

Page 104: ...cription This is used in the RetrieveAttachedRadiosList function The data that will be returned from a request to list the radios that are attached to the system On CS101 a process should only able to get a single radio object RFID_RADIO_LINK_PROFILE_ISO18K6C_CONFIG Prototype public struct RFID_RADIO_LINK_PROFILE_ISO18K6C_CONFIG public UInt32 length public RFID_18K6C_MODULATION_TYPE modulationType...

Page 105: ...smitting and then attempting to receive the backscattered signal from tags minT2Delay The minimum amount of ISO 18000 6C T2 time in microseconds after receiving a tag response before a radio may transmit again txPropagationDelay The number of microseconds for a signal to propagate through the radio s transmit chain Description This is used in the RFID_RadioGetLinkProfile function RFID_RADIO_LINK_P...

Page 106: ...ive Signal Strength Indication RSSI samples to be averaged realtimeRssiEnabled Reserved for future use realtimeWidebandRssiSamples Reserved for future use realtimeNarrowbandRssiSamples Reserved for future use iso18K6C This is the link profile configuration information A union of RFID_RADIO_LINK_PROFILE_ISO18K6C_CONFIG iso18K6C Description This is used in the RadioGetLinkProfile function This has t...

Page 107: ... numberInventoryCycles field numberInventoryCycles The number of inventory rounds to perform with this antenna port Zero indicates that the antenna usage will be controlled by the dwellTime field physicalRxPort The physical receive antenna port associated with the logical antenna port between 0 and 3 physicalTxPort The physical transmit antenna port associated with the logical antenna port between...

Page 108: ...ed on the tag populations i e matching and non matching enableTruncate truncate EPC when the tag is singulated A non zero value requestes that the EPC is truncated A zero value requests the entire EPC Description This is the matching and non matching action to take when a selection mask matches doesn t match RFID_18K6C_SELECT_CRITERION Prototype public struct RFID_18K6C_SELECT_CRITERION public RFI...

Page 109: ..._18K6C_SINGULATION_CRITERION public UInt32 match BOOL32 public RFID_18K6C_SINGULATION_MASK mask UCHAR 32 Fields match Indicates if the associated tag protocol operation will be applied to matching or non matching tags A non zero value indicates that the tag protocol operation is applied to matching tags A zero value of indicates that tag protocol operation is applied to non matching tags mask The ...

Page 110: ...ll time and inventory round count constraints still apply however the operation will be prematurely terminated if the maximum number of tags have the tag protocol operation applied to them pCallback Callback function assigned in the library context An value that is passed through unmodified to the application specified callback function It is usually 0 pCallbackCode A pointer to a 32 bit integer t...

Page 111: ... another inventory cycle run A non zero value indicates that the target should be toggled Note that if the target is toggled retryCount and repeatUntilNoTags will also apply to the new target repeatUntilNoTags A flag that indicates whether or not the singulation algorithm should continue performing inventory rounds until no tags are singulated A non zero value indicates that for each execution of ...

Page 112: ...values are 0 255 maxQueryRepCount The maximum number of ISO 18000 6C QueryRep commands that will follow the ISO 18000 6C Query command during a single inventory round Valid values are 0 255 toggleTarget A flag that indicates if after performing the inventory cycle for the specified target i e A or B if the target should be toggled i e A to B or B to A and another inventory cycle run A non zero val...

Page 113: ...ggleTarget is non zero or terminating the inventory tag access operation Valid values are 0 255 maxQueryRepCount The maximum number of ISO 18000 6C QueryRep commands that will follow the ISO 18000 6C Query command during a single inventory round Valid values are 0 255 toggleTarget A flag that indicates if after performing the inventory cycle for the specified target i e A or B if the target should...

Page 114: ...cess operation Valid values are 0 255 maxQueryRepCount The maximum number of ISO 18000 6C QueryRep commands that will follow the ISO 18000 6C Query command during a single inventory round Valid values are 0 255 toggleTarget A flag that indicates if after performing the inventory cycle for the specified target i e A or B if the target should be toggled i e A to B or B to A and another inventory cyc...

Page 115: ...ithm parameters with adjust dynamicQThresh this contains the DynamicQ singulation algorithm parameters with threshold Description This is the ISO 18000 6C tag singulation algorithm parameters RFID_18K6C_QUERY_PARMS Prototype public struct RFID_18K6C_QUERY_PARMS public RFID_18K6C_TAG_GROUP tagGroup public RFID_18K6C_SINGULATION_ALGORITHM_PARMS_T singulationParms Fields tagGroup tag group to be used...

Page 116: ...read count The nubmer of 16 bit words to read If this value is zero and bank is RFID_18K6C_MEMORY_BANK_EPC the read will return the contents of the tag EPC memory starting at the 16 bit word specified by offset through the end of the EPC If this value is zero and bank is not RFID_18K6C_MEMORY_BANK_EPC the read will return for the chosen memory bank data starting from the 16 bit word specified by o...

Page 117: ...blic RFID_18K6C_MEMORY_BANK bank public UInt16 count 1 8 public UInt16 reserved 0 public fixed ushort pOffset 8 fixed public fixed ushort pData 8 Fields length The length of this structure sizeof RFID_18K6C_WRITE_SEQUENTIAL_PARMS bank The memory bank to write to count The number of 16 bit words that will be written Valid values are 1 to 8 reserved Reserved Set to zero pOffset Pointer to an array o...

Page 118: ...e performed verifyRetryCount If verify is non zero this is the number of retries in the event of a verification failure Valid values are 0 to 7 accessPassword The access password A value of zero indicates no access password sequential random tag write parameters random random tag write parameters Description This is the parameter for ISO 18000 6C tag write operation RFID_18K6C_KILL_PARMS Prototype...

Page 119: ... for ISO 18000 6C tag lock operation RFID_18K6C_TAG_PERM Prototype public struct RFID_18K6C_TAG_PERM public RFID_18K6C_TAG_PWD_PERM killPasswordPermissions public RFID_18K6C_TAG_PWD_PERM accessPasswordPermissions public RFID_18K6C_TAG_MEM_PERM epcMemoryBankPermissions public RFID_18K6C_TAG_MEM_PERM tidMemoryBankPermissions public RFID_18K6C_TAG_MEM_PERM userMemoryBankPermissions Fields killPasswor...

Page 120: ...lds m_MSB most significant QWord m_CSB center significant QWord m_LSB least significant QWord Description This is a structure used by PECRECORD_T e g if the 96 bits Gen2 EPC contains 0x30101234 56789012 12345678 then m_MSB 0x30101234 m_CSB 0x56789012 m_LSB 0x12345678 PECRECORD_T Prototype public struct PECRECORD_T public ushort m_seqnum Byte 0 1 local time sequence public ushort m_Pc 2 3 public UI...

Page 121: ...unnormalized RSSI value m_AntCtrl unnormalized Antenna Control values initialize as 0x0000 Description This PEC PC EPC CRC inventory data record is used in the middleware data list C App communicates find read write with RfidMw using this PEC record format Function Definitions f_RfidSpDll_Initialize Prototype public static extern HRESULT_RFID f_RfidSpDll_Initialize IntPtr hWnd Parameters Inputs Ou...

Page 122: ... Message None Description No operation Reserved for further use f_RfidMw_Uninitialize Prototype public static extern HRESULT_RFID f_RfidMw_Uninitialize Message None Description No operation Reserved for further use f_RfidMw_PostCmd Prototype public static extern HRESULT_RFID f_RfidMw_PostCmd ref RfidMw_Cmd_T sRfidMw_cmd Message None Description No operation Reserved for further use f_RfidMw_TagInv...

Page 123: ...ers in ref PECRECORD_T st_PecRec Message RFIDMW_REQEND_TYPE_MSGID_TagInv_AddATag notification Description This adds a single tag to the RfidMw in the format defined by RfidMw f_RfidMw_TagInv_FindATag Prototype public static extern HRESULT_RFID f_RfidMw_TagInv_FindATag ref PECRECORD_T st_PecRec Parameters in ref PECRECORD_T st_PecRec Message RFIDMW_REQEND_TYPE_MSGID_TagInv_FindATag notification Des...

Page 124: ... f_RfidMw_TagInv_GetUpdateTaglist Prototype public static extern HRESULT_RFID f_RfidMw_TagInv_GetUpdateTaglist Parameters None Message RFIDMW_REQEND_TYPE_MSGID_TagInv_GetUpdateTaglist notification Description This gets only rows of updated tags from RfidMw f_RfidMw_TagInv_GetAllTaglist Prototype public static extern HRESULT_RFID f_RfidMw_TagInv_GetAllTaglist Parameters None Message RFIDMW_REQEND_T...

Page 125: ... f_RfidMw_TagInv_PecRssiMin_Set ref UInt16 val Parameters in ref UInt16 val Message RFIDMW_REQEND_TYPE_MSGID_TagInv_ notification Description This sets the Rssi Threshold of the RfidMw module Tag data is not added to the cached data list if its Rssi element is below threshold f_RfidMw_TagInv_PecRssiMin_Get Prototype public static extern HRESULT_RFID f_RfidMw_TagInv_PecRssiMin_Get ref UInt16 val Pa...

Page 126: ...YPE_MSGID_TagInv_ notification Description This gets the AntCtrl Threshold of the RfidMw module f_RfidDev_Initialize Prototype public static extern HRESULT_RFID f_RfidDev_Initialize Description No operation Reserved for further use f_RfidDev_Uninitialize Prototype public static extern HRESULT_RFID f_RfidDev_Uninitialize Description No operation Reserved for further use f_RfidDev_Startup Prototype ...

Page 127: ..._RetrieveAttachedRadiosList_T st_RfidSpReq_RetrieveAttachedRadiosList Parameters out ref RFID_RetrieveAttachedRadiosList_T st_RfidSpReq_RetrieveAttachedRadiosList Message RFID_REQEND_TYPE_MSGID_RetrieveAttachedRadiosList notification Description Retrieves the list of radio modules attached to the system If succeeded application can open the Radio Object then f_RfidDev_RadioOpen Prototype public st...

Page 128: ...r Parameters in ref RFID_RadioGetSetConfigurationParameter_T st_RfidSpReq_RadioSetConfigurationParameter Message RFID_REQEND_TYPE_MSGID_RadioSetConfigurationParameter notification Description This sets the low level configuration parameter of the radio f_RfidDev_RadioGetConfigurationParameter Prototype public static extern HRESULT_RFID f_RfidDev_RadioGetConfigurationParameter ref RFID_RadioGetSetC...

Page 129: ...ioGetOperationMode Message RFID_REQEND_TYPE_MSGID_RadioGetOperationMode notification Description This sets the radio s operation mode The operation mode will remain in effect until it is explicitly changed via RFID_RadioSetOperationMode f_RfidDev_RadioSetPowerState Prototype public static extern HRESULT_RFID f_RfidDev_RadioSetPowerState ref RFID_RadioGetSetPowerState_T st_RfidSpReq_RadioSetPowerSt...

Page 130: ...etCurrentLinkProfile Prototype public static extern HRESULT_RFID f_RfidDev_RadioGetCurrentLinkProfile ref RFID_RadioGetSetCurrentLinkProfile_T st_RfidSpReq_RadioGetCurrentLinkProfile Parameters out ref RFID_RadioGetSetCurrentLinkProfile_T st_RfidSpReq_RadioGetCurrentLinkProfile Message RFID_REQEND_TYPE_MSGID_RadioGetCurrentLinkProfile notification Description This gets the current link profile for...

Page 131: ...adWriteLinkProfileRegister_T st_RfidSpReq_RadioReadLinkProfileRegister Parameters out ref RFID_RadioReadWriteLinkProfileRegister_T st_RfidSpReq_RadioReadLinkProfileRegister Message RFID_REQEND_TYPE_MSGID_RadioReadLinkProfileRegister notification Description This retrieves the contents of a link profile register for the specified link profile f_RfidDev_AntennaPortGetStatus Prototype public static e...

Page 132: ...is sets the configuration for a radio s antenna port f_RfidDev_AntennaPortGetConfiguration Prototype public static extern HRESULT_RFID f_RfidDev_AntennaPortGetConfiguration ref RFID_AntennaPortGetSetConfiguration_T st_RfidSpReq_AntennaPortGetConfiguration Parameters out ref RFID_AntennaPortGetSetConfiguration_T st_RfidSpReq_AntennaPortGetConfiguration Message RFID_REQEND_TYPE_MSGID_AntennaPortGetC...

Page 133: ...T_CRITERION criteria01 Message RFID_REQEND_TYPE_MSGID _18K6CGetSelectCriteria notification Description This retrieves the configured tag selection criteria for the ISO 18000 6C select command f_RfidDev_18K6CSetPostMatchCriteria01 Prototype public static extern HRESULT_RFID f_RfidDev_18K6CSetPostMatchCriteria01 ref RFID_18K6CSetPostMatchCriteria__T st_RfidSpReq_18K6CSetPostMatchCriteria ref RFID_18...

Page 134: ...gGroup Prototype public static extern HRESULT_RFID f_RfidDev_18K6CSetQueryTagGroup ref RFID_18K6CGetSetQueryTagGroup_T st_RfidSpReq_18K6CSetQueryTagGroup Parameters in ref RFID_18K6CGetSetQueryTagGroup_T st_RfidSpReq_18K6CSetQueryTagGroup Message RFID_REQEND_TYPE_MSGID_18K6CSetQueryTagGroup notification Description This specifies which tag group will have subsequent tag protocol operations applied...

Page 135: ...FID_18K6CGetSetCurrentSingulationAlgorithm_T st_RfidSpReq_18K6CGetCurrentSingulationAlgorithm Parameters out ref RFID_18K6CGetSetCurrentSingulationAlgorithm_T st_RfidSpReq_18K6CGetCurrentSingulationAlgorithm Message RFID_REQEND_TYPE_MSGID_18K6CGetCurrentSingulationAlgorithm notification Description This retrieves the currently active singulation algorithm f_RfidDev_18K6CSetSingulationAlgorithmPara...

Page 136: ...ryParameters ref RFID_18K6CSetQueryParameters_T st_RfidSpReq_18K6CSetQueryParameters Parameters in ref RFID_18K6CSetQueryParameters_T st_RfidSpReq_18K6CSetQueryParameters Message RFID_REQEND_TYPE_MSGID_18K6CSetQueryParameters notification Description This configures the parameters for the ISO 18000 6C query command Failure to call this prior to executing the first tag protocol operation will resul...

Page 137: ...eters in ref RFID_18K6CTagInventory_T st_RfidSpReq_18K6CTagInventory Message RFIDMW_REQEND_TYPE_MSGID_18K6CTagInventory notification Description This executes a tag inventory for the tags of interest If the RFID_FLAG_PERFORM_SELECT flag is specified the tag population is partitioned i e ISO 18000 6C select prior to the inventory operation If the RFID_FLAG_PERFORM_POST_MATCH flag is specified the p...

Page 138: ...sponse packets will be returned to the application via the application supplied callback function Each tag read record is grouped with its corresponding tag inventory record An application may prematurely stop a read operation by calling RFID_Radio Cancel Abort Operation f_RfidDev_18K6CTagWrite Prototype public static extern HRESULT_RFID f_RfidDev_18K6CTagWrite ref RFID_18K6CTagWrite_T st_RfidSpRe...

Page 139: ...eq_RadioSetResponseDataMode Message RFIDMW_REQEND_TYPE_MSGID_RadioSetResponseDataMode notification Description This sets the operation response data reporting mode for tag protocol operations The reporting mode will remain in effect until a subsequent call to RFID_RadioSetResponseDataMode The mode may not be changed while the radio is executing a tag protocol operation f_RfidDev_RadioGetResponseDa...

Page 140: ...MacReadOemData Message RFIDMW_REQEND_TYPE_MSGID_MacReadOemData notification Description This reads one or more 32 bit words from the MAC s OEM configuration data f_RfidDev_MacWriteOemData Prototype public static extern HRESULT_RFID f_RfidDev_MacWriteOemData ref RFID_MacReadWriteOemData_T st_RfidSpReq_MacWriteOemData Parameters out ref RFID_MacReadWriteOemData_T st_RfidSpReq_MacWriteOemData Message...

Page 141: ...ror ref RFID_MacClearError_T st_RfidSpReq_MacClearError Parameters in ref RFID_MacClearError_T st_RfidSpReq_MacClearError Message RFID_REQEND_TYPE_MSGID_MacClearError notification Description This attempts to clear the error state for the radio module s MAC firmware f_RfidDev_MacBypassWriteRegister Prototype public static extern HRESULT_RFID f_RfidDev_MacBypassWriteRegister ref RFID_MacBypassReadW...

Page 142: ...idDev_MacGetRegion Prototype public static extern HRESULT_RFID f_RfidDev_MacGetRegion ref RFID_MacGetSetRegion_T st_RfidSpReq_MacGetRegion Parameters out ref RFID_MacGetSetRegion_T st_RfidSpReq_MacGetRegion Message RFID_REQEND_TYPE_MSGID_MacGetRegion notification Description This gets the regulatory mode region for the MAC s operation f_RfidDev_RadioSetGpioPinsConfiguration Prototype public static...

Page 143: ...ULT_RFID f_RfidDev_RadioReadGpioPins ref RFID_RadioReadWriteGpioPins_T st_RfidSpReq_RadioReadGpioPins Parameters out ref RFID_RadioReadWriteGpioPins_T st_RfidSpReq_RadioReadGpioPins Message RFID_REQEND_TYPE_MSGID_RadioReadGpioPins notification Description This reads the specified radio module s GPIO pins Attempting to read from an output GPIO pin results in an error f_RfidDev_RadioWriteGpioPins Pr...

Page 144: ...RadioCancelOperation Parameters in ref RFID_RadioCancelOperation_T st_RfidSpReq_RadioCancelOperation Message RFID_REQEND_TYPE_MSGID_RadioCancelOperation notification Description This cancels the current RfidSp tag operation RfidSp will return after all the pending message for the current operations are sent to the application f_RfidDev_RadioAbortOperation Prototype public static extern HRESULT_RFI...

Page 145: ...is BUZZER_SOUND Prototype public enum BUZZER_SOUND uint BUZZER_LOW_SOUND BUZZER_MIDDLE_SOUND BUZZER_HIGH_SOUND Description This is the volume of the buzzer on pda Macros Not needed Function Definitions f_PosSp_Initialize Prototype public static extern int f_PosSp_Initialize Parameters None Description Initialization of the POS SP library at the caller thread f_PosSp_Uninitialize Prototype public s...

Page 146: ...y f_PosSp_LedSetOn Prototype public static extern bool f_PosSp_LedSetOn uint Color Parameters Color 32bits COLORREF in the format of 0x00bbggrr bb blue gg green rr red color byte Description This turns on the Led f_PosSp_LedBlink Prototype public static extern bool f_PosSp_LedBlink uint colorRGB short Period short OnTime Parameters colorRGB 32bits COLORREF in the format of 0x00bbggrr Period repeti...

Page 147: ...zzer f_PosSp_ToneOff Prototype public static extern void f_PosSp_ToneOff Parameters None Description This stops a playing tone f_PosSp_MelodyPlay Prototype public static extern void f_PosSp_MelodyPlay int ToneID short Duration uint SoundLevel Parameters ToneID 0 4 Duration duration ms SoundLevel one of the value in BUZZER_SOUND enumeration Description This plays 1 of the 5 predefined melody for th...

Page 148: ... Parameters None Description This powers down the WiFi device f_PosSp_WiFiReset Prototype public static extern bool f_PosSp_WiFiReset Parameters None Description This resets the WiFi device f_PosSp_GpioIni Prototype public static extern bool f_PosSp_GpioIni Parameters None Description This initializes the 4 GPIOs set them to HI f_PosSp_GpioUnini Prototype public static extern bool f_PosSp_GpioUnin...

Page 149: ... GPIOs Valid values are 0 to 3 iState the state 1 HI or 0 LO to be written Description This writes HI or LO state to a GPIO f_PosSp_GpioRead Prototype public static extern bool f_PosSp_GpioRead int iGpio ref char piState Parameters iGpio index of GPIOs Valid values are 0 to 3 piState the state 1 HI or 0 LO to be read Description This reads the current state of a GPIO ClsSysUtil Overview This is a ...

Page 150: ...kingApp Prototype public static void f_LaunchBlockingApp string strPath string strParms Parameters strPath path and executable filename strParms paramter list Description This lauch a blockiong App Launch in a new process f_Ping Prototype public static int f_Ping string addr ulong udCount ref string strResult Parameters addr IP address of the destination udCount number of ping packets strResult th...

Page 151: ...latform TestGslSdk is a simple C application it can turn on off the on board LED play a tone single tone generation or a build in melody at a given volume duration start restart stop the WiFi device get the IPAddress from DNS ping a remote server get the current battery level control 4 GPIOs control set options open send data receive data close the 2 serial port TestGslSdk can be enhanced to a sys...

Page 152: ...dll dll Function Definitions GwesPowerOffSystem Prototype public extern static void GwesPowerOffSystem Description This suspends CS101 s pda ResetPocketPC Prototype public uint ResetPocketPC Description This resets CS101 s pda using standard KernelIoCtrl Procedure Code using System using System Collections Generic using System ComponentModel using System Data using System Drawing using System Text...

Page 153: ...esPowerOffSystem void This API is OEM implementation dependent DllImport Coredll dll a suspend operation on GslPos pda public extern static void GwesPowerOffSystem public uint ResetPocketPC KernelIo may be called by CF NET only uint bytesReturned 0 uint IOCTL_HAL_REBOOT CTL_CODE FILE_DEVICE_HAL 15 METHOD_BUFFERED FILE_ANY_ACCESS return KernelIoControl IOCTL_HAL_REBOOT IntPtr Zero 0 IntPtr Zero 0 r...

Page 154: ...CSL CS101 2 EPC CLASS 1 GEN 2 RFID HANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 153 ...

Page 155: ...CSL CS101 2 EPC CLASS 1 GEN 2 RFID HANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 154 ...

Page 156: ...ANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 155 7 4 Application Scenarios with Program Source Codes Additional application scenarios with program source codes will be supplied and included here in future versions of user manuals ...

Page 157: ... RFID HANDHELD READER USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 156 7 5 Unit Tests Basic unit tests for performance tuning will be added and included here in future versions of user manuals ...

Page 158: ...SION 1 0 Copyright Convergence Systems Limited All Rights Reserved 157 7 6 Build Environment The build environment consists of tools and the corresponding configurations of the Visual Studio Details will be added and included here in future versions of the user manuals ...

Page 159: ...served 158 7 7 Debug Methods 7 7 1 Log File The log file provides an important method to track problems The log file should be captured and sent to CSL support team asap if any bug is encountered 7 7 2 Error Message List The list of error messages that can be seen on the screen will be listed and included here in future versions ...

Page 160: ...ader Refer to the file compatibility matrix xls for the compatibility of demo program and reader firmware Please make sure Microsoft NET Framework Version 2 0 Redistributable Package is installed before using the demo program Normally the executed file of demo program is archived as RAR or ZIP file The archived file is distributed through email ftp server or website Please extract the demo program...

Page 161: ...f this chapter is to recommend the best practices of using the CSL CS101 2 Reader The following areas will be covered in this document z General usage z Write tag z Event and alert z System 9 2 General Tips This will be added in future version of user manual 9 3 System Tips This will be added in future version of user manual 9 4 Write Tag Tips This will be added in future version of user manual ...

Page 162: ... or augment with RFID The advantages of RFID over barcode are widely publicized consisting of the following Features RFID Barcode Line of Sight Line of sight is not required Must be line of sight visible items must be tediously separated out for reading very inconvenient Storage Store data up to 1 Kbyte No storage capability Anti Counterfeit Ability Hard to counterfeit hard to find can be stowed i...

Page 163: ... dynamic multi destination fulfillment 6 etc Physical locations where RFID can be applied include 1 Distribution centers 2 Warehouses Shelves 3 Warehouse Loading Unloading Zone Yard Management 4 Retail shops in conjunction with fulfillment center 5 Returns warranty processing office 6 Vehicle windshields 7 etc It is widely believed that the adoption of RFID will happen in the following sequence in...

Page 164: ...ms Limited All Rights Reserved 163 Initial Customer Interests RFI or RFQ Business Process Analysis Customer Expectation Management Technology Selection Pilot Test Optimization Customization Test Commissioning Maintenance Statistics Hardware Configuration Software Configuration System Integration Training ...

Page 165: ...tor may be applying RFID to the whole process or may only be able to apply RFID to part of the process The most important principle is NOT to force change the business process to adapt for RFID implementation but to have RFID implementation slip in as effortlessly and as un noticeably as possible Closed Loop or Open Loop Mandate Satisfaction Only ROI Expected Business Nature ROI Analysis Business ...

Page 166: ...s of tags Tagging Quality Requirements Writing Data onto Tag Required Correlation with Barcode on Tagging Density of Tags No pallet Mobile or Stationary Target Velocity of Tags Meters sec Yield Requirement Tag Lifetime Requirement Real time Time Critical Data Processing Use Initial Feasibility Planning of Applying RFID to Business RFID Project Goals Definition Agreement with All Stakeholders ...

Page 167: ...ents Throughput Estimation Detailed Feasibility Planning of Applying RFID to Business Number of Nodes Node to node Separation Distances Data Networking Requirements Network Traffic Estimation Typical Read Range Requirement Redundancy Requirements Maintenance Requirements Fault Tolerance Requirements Monitoring Requirements Backup Requirements Control Automation Requirements ...

Page 168: ...ppropriate technology must be chosen for the job The following are questions to help you choose the appropriate technology Active or Passive RFID Technology Antenna Tag Interaction Scheme backscatter bistatic Air Protocol EPC iPX ISO18000 7 Frequency Setting for Compliance Networking Option wired or wireless Antenna single dual antenna box 1 2 3 or more pairs Tag size form factor single dual anten...

Page 169: ...res The truth is even if 100 read is not achieved the user can still benefit in the sense of ROI efficiency lead time cycle time etc to a substantial extent It is this extent that should be considered as the result not a 100 score It is almost like getting married to a man or woman you will never find the perfect half but even if she or he is not perfect you still get to enjoy from the marriage Yi...

Page 170: ...d exercise as some kind of minimally realistic testing must be implemented even at this stage to help better define the hardware configuration that in turn can give more insight for software configuration and system integration Reader 2D Floor Plan Placement Antenna 2D Floor Plan Placement Antenna 3D Alignment Antenna Tag Separation Design Static Tag Collection Statistics Antenna Isolation Measure...

Page 171: ...e and time filter such as system date and time hour minute and second time filter define various time intervals time slots repeat modes etc The fourth step is to configure capture point such as capture point type capture point area capture point details The fifth step is to configure IO such as sensor input name control output name default positions etc The sixth step is to configure tag and tag f...

Page 172: ...tems Limited All Rights Reserved 171 Users Management Set Up Capture Point Set Up Network Configuration Set Up Statistics Set Up Overall Configuration Backup Audio Video Set Up Database Set Up Report Set Up System Configuration Set Up IO Set Up Tag Tag Filter Set Up Time Time Filter Set Up Event Set Up ...

Page 173: ...y be carried out in two steps 1 in house integration and test 2 onsite integration and test System Blocks Diagram Performance Metrics Logging Re configuration redesign Network Connections Map Connection and Function Test Tagged Operation Test Data Flow Map Physical Blocks Architecture Hardware Units Preparation Backend server plug ins boot up Sensors or Input Simulators connect Output or Output Si...

Page 174: ...te If the site does not run round the clock shifts then it is OK to do the initial testing when it is off shift and temporarily clearing up the site for testing if something is in the way Eventually when good enough results are obtained through tuning and optimization in off shift time then the testing should be conducted in the actual shift when the operation will happen in the future The emphasi...

Page 175: ... for extended time for reliability Set up RFID system as realistic as possible Track behavior of system all the way Measure site specific parameters Test and optimize RFID operations See next section Check Mounting Structures for Potential Collisions Check network traffic is within limits Do overload tests Set up tags target as realistic as possible Check user satisfaction on interface friendlines...

Page 176: ...unfortunate fact that RFID application involves too many topics RF transmitter circuits antennas propagation static and dynamic scattering backscatter and bistatic scattering RF receiving circuits software all layers it is not an easy task to give a 10 steps to successful RFID implementation rule based implementation guideline that works in all environment Optimize capture point time slotting Opti...

Page 177: ...of their performance expectation then some customization may be necessary The following are just a few possibilities and suggestions for customization Note that these customizations require the cooperation of the solution provider i e the manufacturer of the products Very few solution providers are willing to do this without good business justification though Antenna Transmitting Pattern Tag Paras...

Page 178: ...of the RFID system in the end customer company must be taught the basics of the operation plus the necessary tricks in day to day trouble shooting and fault isolation up to a certain extent of course Train overall architecture Train common problems handling Train on board user interface Train browser based interface Train debugging Train material handling methods Train upgrading methods Train envi...

Page 179: ...est and commissioning plan early in the project This is particularly valid if the system integrator has done similar jobs before However sometimes a T C document too early in the way will make it very difficult to accommodate for surprisingly low performances due to some uncontrollable environmental or business process related factors So really it is at the system integrator s own discretion and w...

Page 180: ...tatistics Maintenance of the RFID system is important It includes preventive maintenance collection and analysis of statistics of operation etc Track all environmental parameters Visual check all equipment Track all tag collection statistics Track CRC error statistics Track all cables wear and tear Occasional Regular Reboot Track network efficiency statistics ...

Page 181: ...ght Convergence Systems Limited All Rights Reserved 180 10 3 Readers for Different Business Applications For different business applications one should use the appropriate corresponding readers such as multiport fixed reader integrated reader handheld reader embedded reader module etc ...

Page 182: ...use access control and item level tracking Products Part Number Photo Business Application Antenna Mono static area or zonal antenna long range CS 771 LHCP CS 771 RHCP Logistics Warehouse management Distribution center Transportation management Asset management Baggage management Antenna Monostatic access control antenna CS 713 Access control Human animal tracking Antenna Brickyard near field ante...

Page 183: ...ity This section describes the best practice for system integrator to familiarize and integrate with an RFID reader from getting the reader out of the box to deploying the system in production environment The following flowcharts show the typical familiarization and integration process of CSL CS101 2reader They represent what a typical system integrator will go through when they adopt the CS101 2t...

Page 184: ...R S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 183 2 Integration Process Pilot Testing Use Cases and Requirement Gathering Draft Solution and In House Testing API Programming Finalizing Solution Scaling Middleware Testing ...

Page 185: ... try to configure the reader by setting up the operation profile trigger action and event By collecting read tags result under various configurations system integrators can experience the behavior and characteristics of the reader For details of the usage of browser interface please refer to chapter 6 11 2 1 2 Familiarizing with Programming Interface The CSL CS101 2reader provides two sets of Appl...

Page 186: ...and The API includes a number of commands with different parameters When programming the reader one should understand clearly the command s usage effect and the meaning of each parameter since they affect the reader performance directly One example is the set operation profile command The parameter duplicateEliminationTime is the time interval in which duplicate tags will be eliminated such that t...

Page 187: ... 186 the machines fastest possible read and or best possible yields for various profile combinations etc Once the capability envelope is discovered the system integrator can then work on business projects knowing what the reader is capable of doing and knowing the projects are not requiring the reader to do something it cannot handle ...

Page 188: ...to test the feasibility of the solution before deploying to customer s site 11 2 2 3 API Programming The API Programming process here is different from the one in Familiarization Process In Familiarization Process system integrators should familiar with the configurations and functioning modes of the reader by using the API In System Integration Process they should determine and focus on the confi...

Page 189: ...tion It plays an important role in the integration of reader and therefore it must be fully tested as well CSL provides service for such testing System integrators can give the executable of the middleware to CSL for long term testing to ensure that the middleware is free of problem after running continuously Moreover all API calls requested by the middleware are logged in the reader which allows ...

Page 190: ...rocess for identifying malfunction reader For example reading testing tags from all readers and then collecting the read data from edge server Analysis of the data helps assessing the reader health 5 Remote reboot of reader and remote control of power grid should be supported since the readers may distribute in vast area 6 During network failure reader is not able to send tags read to trusted serv...

Page 191: ...in warehouse inventory is being monitored continuously Inventory data are updated in real time giving warehouse manager real time visibility to inventory level and status This is particularly important for time sensitive merchandise It also helps identifying potential theft for high value merchandise greatly reduce the labor cost and human error Recommendation The CSL CS101 2reader is has extremel...

Page 192: ... in many access control systems The read range of HF is short such that presenting of access card in front of the read point is required This process can cause congestion under high traffic of access especially right before and after the office hour Suggested Approach For access control system with high traffic of access UHF has advantage over HF because the employees do not have to present the ac...

Page 193: ...code can be scanned at a time and line of sight is required Suggested Approach Tagging of reusable pallets allows tracking them throughout the entire operation and maintenance cycle This usage can even be extended to track movement of goods on the pallet throughout the distribution cycle This offers the pallet providers as well as the goods distributors a complete visibility of their pallets and g...

Page 194: ...rove the visibility of the work in progress Parts and subassemblies within the manufacturing plant are tracked precisely such that more accurate part level and work in progress records are available Moreover automatic monitoring of work in progress status on semi finished assemblies throughout the production cycle can reduce downtime and ensure on time delivery Combining RFID reader with output de...

Page 195: ...ontrol systems rely on backend server and database for security controls If the server is down or network service is not available the whole access control system fails Suggested Approach Autonomous access control system with embedded event engine for security controls Recommendation With the embedded event engine in CSL CS 461 reader autonomous tag group filtering for access control is achieved T...

Page 196: ...ing input and output devices RFID technology can be applied to verification of tag existence in pallet or carton In this case infrared sensor is used to trigger the start inventory in reader When the pallet or carton passes the read point status of infrared sensor changes which triggers the reader to start inventory If no tag is read after the trigger output device such as alarm is turned on This ...

Page 197: ...ainst patient s blood type by cross checking the RFID tags on both the blood bag and patient s wristband In this way chance that a patient being transfused the wrong blood type due to human error is greatly reduced Moreover by equipping RFID read points in the blood bank real time inventory data can be grasped giving medical staff real time visibility to inventory level and status Recommendation O...

Page 198: ...ain visibility for pharmaceutical product can be facilitated It provides the track and trace of drugs as distributed throughout the entire supply chain which in turns protects the public health Pharmaceutical manufacturers can also benefit from reduced liability brand protection and additional revenue that was previously diverted to makers of counterfeit drugs Recommendation The CSL CS 777 near fi...

Page 199: ...epot The process is completely automatic in the sense that the vehicle does not have to stop for being recorded Moreover no staff is involved in the process and thus human errors can be eliminated The vehicles movement record gives accurate maintenance checking and repairing history which is important for vehicle management such as identifying obsolete parts Recommendation One of the challenges in...

Page 200: ...ly been tracked visually or optically Suggested Approach RFID technology can be applied to the label on the windshield or to a stand on the dashboard or to the inside of the Taxi light box on top of a taxi or even directly onto the front and back license plate The reader antenna can be mounted either on a low overhang footbridge or simply on a pole on the side of the road Recommendation The CS101 ...

Page 201: ...ed Suggested Approach RFID technology has made a dramatic improvement in tracking and managing documents By tagging the documents and equipping read points for checking in and out status and location of documents can be traced easily Other usages such as inventory checking and locating lost documents can also be achieved Recommendation Different antennas are designed to be used with the CSL CS 461...

Page 202: ...inges on an RFID tag The RFID tag consists of an antenna coupled to an RFID IC This IC converts the AC voltage it receives at the antenna port to DC voltage that in turn is used to empower the digital circuit inside The digital circuit then turns on and off some components connected to the antenna port thereby changing its scattering behavior in a pre designed clock rate This changing of antenna p...

Page 203: ...ands used to explore and modify a Tag population Continuous wave Typically a sinusoid at a given frequency but more generally any Interrogator waveform suitable for powering a passive Tag without amplitude and or phase modulation of sufficient magnitude to be interpreted by a Tag as transmitted data Cover coding A method by which an Interrogator obscures information that it is transmitting to a Ta...

Page 204: ...ing logic See also inventory enabling trigger trigger inventory disabling trigger and resultant action Extended temperature range 40 C to 65 C see nominal temperature range Full duplex communications A communications channel that carries data in both directions at once See also half duplex communications Half duplex communications A communications channel that carries data in one direction at a ti...

Page 205: ...the number of simultaneously active Interrogators is modest relative to the number of available channels for example 10 active Interrogators operating in 50 available channels Network failure data backlog Tag data buffered in reader memory during network failure Buffered tags are sent to trusted server when network is restored Nominal temperature range 25 C to 40 C see extended temperature range O...

Page 206: ...gs read are buffered in reader until client application polls the read result A tag will only be reported once in each polling trigger Protocol Collectively a physical layer and a Tag identification layer specification Q A parameter that an Interrogator uses to regulate the probability of Tag response An Interrogator commands Tags in an inventory round to load a Q bit random or pseudo random numbe...

Page 207: ...defined above within which there is a single active Interrogator at any given time Singulation Identifying an individual Tag in a multiple Tag environment Slot Slot corresponds to the point in an inventory round at which a Tag may respond Slot is the value output by a Tag s slot counter Tags reply when their slot i e the value in their slot counter is zero See also Q above Slotted random anticolli...

Page 208: ...USER S MANUAL VERSION 1 0 Copyright Convergence Systems Limited All Rights Reserved 207 A stimulus that causes the reader to recognize it and do something about it Trusted Server Server for automatic data submission by the reader using the event engine ...

Page 209: ... cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures y Reorient or relocate the receiving antenna y Increase the separation between the equipment and receiver y Consult the dealer or an qualified radio TV technician for assistance FC...

Page 210: ... transmitter s radiating structures and the body of the user or nearby persons Transmitters designed to be used by consumers or workers that can be easily re located such as a wireless modem operating in a laptop computer are considered mobile devices if they meet the 20 centimeter separation requirement The FCC rules for evaluating mobile devices for RF compliance are found in 47 CFR 2 1091 Porta...

Page 211: ... appropriate warning signs and labels can also be used to establish such awareness by providing prominent information on the risk of potential exposure and instructions on methods to minimize such exposure risks General Population Uncontrolled Exposure The general population uncontrolled exposure limits are applicable to situations in which the general public may be exposed or in which persons who...

Page 212: ... permissible exposure MPE is calculated to show the required separation distance that must be maintained during installation to maintain compliance with the power density limit The following formula was used to calculate the Power Density 2 4 R PG S π where S Power density P Power feeding to the embedded patch antenna G Tx gain of the antenna linear gain R Distance from the antenna For the EUT the...

Page 213: ...ible exposure MPE is calculated to show the required separation distance that must be maintained during installation to maintain compliance with the power density limit The following formula was used to calculate the Power Density 2 4 R PG S π where S Power density P Power feeding to the embedded patch antenna G Tx gain of antenna linear gain R Distance from the antenna For the EUT the calculation...

Reviews: