background image

 

10

[0] Disable 
[1] Enable 

Default: [0] Disable 

„

 

WEPKey Length 

When WEP is enabled, Data sent between the client and the access point is 
scrambled using either a 64-bit or 128-bit key. The higher the level of encryption, 
the more secure it is. 

[0] 64 bits 

[1] 128 bits 

Default: [1] 128 bits

 

„

 

Default Key 

Activate one of the four encryption keys

 

Default: [1] WEP KEY1

 

  

„

 

WEP Key 

Define the encryption key values for Key1~Key4 using hexadecimal digits.  

When WEPKey Length “

64 Bit

” is selected, the user is required to fill in 

5

 bytes of 

hexadecimal values as the encryption key. 

When WEPKey Length “

128 Bit

” is selected, the user is required to fill in 

13

 bytes 

of hexadecimal values as the encryption key.  

 

3). EAP Menu 

EAP 

Stands for 

Extensible Authentication Protocol

. SP5600 terminal only support 

EAP-MD5. When these features are implemented, a wireless client that associates with 
an access point cannot gain access to the network until the user performs a network 
logon. Therefore, 

Identity

 and 

Password 

are needed when 

EAP

 is enabled.  

„

 

EAP Setting 

„

 

EAP ID 

„

 

EAP Password 

 

5.

 

Echo Tests

 

The terminal will echo the received data from the client or server and also signals a beep. 

The function is used to measure the coverage of the range, estimate the number of APs and 
terminals needed, and determine the AP’s deployment topology.  

1. Client Mode 
2. Server Mode 

Cipherlab provides TCPServer.exe (only for Client Mode) and TCPDemo.exe for Echo 
Tests. 

 

Once the connection of Echo Test is established, the details will be displayed as the 
illustration below. 

 

Sending  033 
Recv ok  033 
 
 
Q: 0070       T: 11M 
S: 0133

N: 0006

Summary of Contents for SP5600-C OptimusR

Page 1: ...i SP5600 Terminal User s Guide Version 1 00 ...

Page 2: ... 2 8 Keypad 4 2 9 Indicator 4 2 10 Communication 4 2 11 802 11b WLAN Specification 4 2 12 Software 4 3 Software Architecture 4 3 1 Kernel Application Manager 5 3 2 System 6 3 3 Application 11 3 4 Programming the terminal 11 3 5 Programming the communication cradle 11 4 Operations 12 4 1 Keypad operations 12 4 2 Application mode 12 4 3 System mode 13 4 4 Kernel mode 13 4 5 Application Manager 13 ...

Page 3: ...rotection against harmful interference in a residential installation This equipment generates uses and can radiated radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interferenc...

Page 4: ...rom windows to provide maximum shielding Equipment or its transmit antenna that is installed outdoors is subject to licensing Operation is subject to the following two conditions 1 this device may not cause interference and 2 this device must accept any interference including interference that may cause undesired operation of the device ...

Page 5: ...ing IP65 2 3 Physical y Dimensions 194mm L x 77mm W x 44mm H y Weight 250g including battery y Color Black y Material ABS 2 4 CPU y Toshiba 16 bit CMOS type CPU y Tunable clock up to 22MHz 2 5 Memory Program memory y 1 M Bytes flash memory is used to store the program code font constant data and so on Data memory y 256K Bytes SRAM 2 6 Reader The 8300 Series Terminal can be equipped with either Las...

Page 6: ... up to 115200bps y Standard IrDA Standard 1 0 compatible Baud rate up to 115200bps 2 11 802 11b WLAN Specification SP5600 Terminal y Frequency Range 2 4 2 5 GHz unlicensed ISM Band y Modulation DSSS with DBPSK 1M DQPSK 2M CCK 5 5 11M y Data Rate 11 5 5 2 1 Mbps Auto fallback y Channels Standard y Coverage 250M line of sight y Maximum Output Power 100mW y Compliance IEEE 802 11b Wi Fi compliance Ac...

Page 7: ...rminal the following Application Manager s menu will be shown y Download To download application programs SHX BASIC run time BC83x0 SHX BASIC programs SYN or font files 8xxx XX SHX to the terminal There are 6 resident locations and one Active Memory i e at most 7 programs can be downloaded to the terminal But only the one downloaded to the Active Memory will be activated and running To run other p...

Page 8: ...ower off when no operation is taking place during that specified period If this value is set to zero this function will be disabled Default 10 minutes 5 Power On Options There are two possible selections Program Resume which starts from the program being used during the last session before the last power off and Program Restart which starts with a new program Default Program Resume 6 Key Click Sel...

Page 9: ...r with different Frequency Duration Press ENTER key to start and then press any key to stop the test 3 LCD LED To test LCD display and LED indicator Press ENTER key to start and then press any key to stop the test 4 Keyboard To test the rubber keys Press a key and the result will be shown on the LCD display Note that the FN key should be used in conjunction with numeral keys 5 Memory To test the d...

Page 10: ...P settings to the terminal if DHCP Server is installed and the option is enabled These IP Settings also can be configured manually if DHCP is disabled Please contact your MIS engineer if you don t know how to configure it 1 DHCP DHCP stands for Dynamic Host Configuration Protocol Default 1 Enable 2 SubNet Mask The number used to identify the IP sub network indicating whether the IP address can be ...

Page 11: ... when Power Saving is enabled Default 1 Enable 6 Preamble Select either a short preamble or long preamble Select a short preamble for SP5600 terminal with high network traffic select a long preamble when the network traffic is low Default 1 Long 4 Security 1 Authentication 802 11b supports two subtypes of network authentication services open system and shared key Open system authentication is used...

Page 12: ...ey 3 EAP Menu EAP Stands for Extensible Authentication Protocol SP5600 terminal only support EAP MD5 When these features are implemented a wireless client that associates with an access point cannot gain access to the network until the user performs a network logon Therefore Identity and Password are needed when EAP is enabled EAP Setting EAP ID EAP Password 5 Echo Tests The terminal will echo the...

Page 13: ...tor User s Guide 3 4 Programming the terminal There are three software tools available for developing application programs for the terminal 1 The Application Generator 2 The BASIC Compiler 3 The C Compiler Besides Terminal Emulation program which supports ANSI VT100 VT220 and IBM is also available For detailed information please contact Syntech Information Co Ltd 3 5 Programming the communication ...

Page 14: ...ample numeral 2 can be used to produce A B or C Pressing the same key twice within one second will call the letter B Pressing the same key without halting longer than one second will cause the three letters to be shown in a circulating way Only when stop pressing the key for longer than one second or pressing another key will the system send the real key code to the application program Pressing th...

Page 15: ...e refer to section 4 1 4 5 Application Manager Although the Application Manager is part of the kernel to enter it you need to press 8 and POWER key simultaneously Or if the application program does not exist the unit will automatically go to the Application Manager s menu upon power up The three services Download Activate and Upload provided by the Application Manager are explained in Section 4 1 ...

Reviews: