Checkpoint Systems FISOIUS Users Manual

Intelligent Library System Open Plus (ILS) 3.0
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . .
User Guide
ISO 15693
P/N 7216425
Copyright © 3/21/06 by Checkpoint Systems Inc. Released March 21, 2006.
Published by: Checkpoint Systems Inc. 101 Wolf Drive Thorofare, NJ 08086
1st Edition - August -2005 Part number: 7216425
For use with Checkpoint’s Intelligent Library System Open Plus Version 3.0. Checkpoint, Circulation Circuit, Intelligent Library System Open Plus are registered trademarks of
Checkpoint Systems, Inc. All rights reserved. Information in this document is subject to change without notice. Compani e s,
names and data used in examples herein are fictitious unless otherwise noted. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher.
Portions of this software is licensed under the GPL license (see license.txt in your installation directory). In compliance of Section 3 of the GPL terms, contact your Checkpoint Representative for a source distribution.
Other product and company names herein may be trademarks of their respective owners. Windows and Windows 2000 © Microsoft, Inc., Redmond, Wash. Other products © or ® their respective manufacturers or copyright holders
.
Document Conventions
Caution: This is a Caution or Warning icon. When it appears, the corresponding text i nd icates a cautionary
statement by which you must abide.
Note: This is a Note icon. When it appears, the corresponding text indicates a helpful note or tip when
using the feature.
The following usage conventions are used throughout the Intelligent Library System User Manual.
Button Name - This describes a button or selection on the screen. For example, the <DONE> button is represented in this document as Done.
Key Name - This describes a keystroke on a keyboard. For example Ctrl represents the Control key on a keyboard.
ii
Important Information to our Users in North America
FCC Regulatory Compliance Statement
Checkpoint Systems, Inc., offers Radio Frequency Identification Products that have been FCC certified or verified to 47 CFR Part 15 Subparts B/C and/or 47 CFR Part 18. Appropriately, one of the following labels will apply to the approval:
NOTE
: This equipment has been tested and found to comply with the limits for a class A digital device, pursuant to Part 15 of th e FC C R u le s. T he se lim i ts are designed to provide reasonable protection against harmful interference w hen the equipment is operate d in a comm ercial environment. This equipment generates, uses, and can radiate interference to radio communications. Operation of this equipment in a residential area is likely to cau s e harmful interference in which ca se th e us er w il l be req ui red to c o rrec t the interference at his own expense.
- OR -
This device complies w ith P art 15 o f th e FC C R ules. Operation is subject to th e follo w i n g two conditions: (1) including this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation, which may include intermittent decreases in detection and/or intermittent increases in alarm activity.
- OR -
NOTE: This equipment has been tested and found to comply with the limits for a miscellaneous type ISM device, pursuant to Part 18 of the FCC Rules. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio communications reception, which can be determined by turning the equipment off and on, please contact Checkpoint Systems, Inc., at 1 (800) 257-5540 for further assistance.
Equipment Safety Compliance Statement
Checkpoint Systems Radio Frequency Identification products have been designed to be safe during normal use and, where applicable, certain components of the system or accessory sub-assemblies have been certified, listed or recognized in accordance with UL 1037, UL 1310, UL 60950-1, CSA C22.2 No. 205, CSA C22.2 No. 220, CSA C22.2 No. 223, CSA C22.2 No. 60950-1. Additional approvals may be pending.
WARNING:
equipment not expressly approved by the party responsible for assuring compliance could void the user’s authority to operate the equipment in a safe or otherwise regulatory compliant manner.
Changes or modifications to Checkpoint’s Radio Frequency Identification (RFID)
one or more
of the following Safety standards: UL 1012,
iii
Important Information to our Users in Europe
CE Compliance Statement
Where applicable, Checkpoint Systems, Inc., offers certain Radio Frequency Identification (RFID) products that have CE Declarations of Conformity according to R&T TE D irec tive 99/5/EC.
System Electromagnetic Compatibility (EMC), has been tested and notified through Spectrum Management Authorities using laboratories, whereby, conformity is declared by voluntarily accep ted European T elecom mun ications Stand ards Institute (ETSI) standards EN 301489-3 and EN 300330-2.
NOTE: Certain Radio Frequency Identification (RFID) equipment have been tested and found to conform with the CE emission and immunity requirement in Europe. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accorda n c e wi th th e inst ruc tio n m a nu a l, m ay ca u se harmful interference to radio communications. Under unusual circumstances, interference from external sources may degrade the system performance, which may include intermittent decreases in detection and/or intermittent increases in ala rm activity. However, there is no guarantee that interference will not occur in a particular installation. If this equipment experiences frequent interference from external sources or does cause harmful interference to radio communications reception, which can be determined by turning the equipment off and on, please contact a Checkpoint Systems representative for further assistance.
Equipment Safety Compliance Statement
Checkpoint Systems Radio Frequency Identification products have been designed to be safe during normal use and, where applicable, certain components of the system or accessory sub-assemblies have been declared safe according recognized in accordance with one or more 50364, EN 60742. Additional approvals may be pending.
WARNING:
expressly approved by the party responsible for assuring compliance could void the user’s authority to operate the equipment in a safe or otherwise regulatory compliant manner.
to the European Low Voltage Directive (LVD) by being certified, listed, or
of the following European safety standards; EN 60950, EN
Changes or modifications to Checkpoint’s Radio Frequency Identification equipment not
iv
T
ABLE OF
C
ONTENT S
Introduction..............................................................................................................................................1-1
Library Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3
Single Branch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Single Server, Multi-Branch Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Peer-to-Peer Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Document Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-5
Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
System Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-6
How RF Query Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
How ILS Maintains the Library’s Collection Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
Patron Checkout and Check-In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Staff Checkout and Check-In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Book Return Check-In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Inventory Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Exit Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Programming Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Off-line Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-11
RFID Tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-11
ILS Intelligent Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Local Security Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Staff Station Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13
Patron Self-Checkout Station II . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13
Portable Inventory Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Intelligent Library Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
Exception Ticket Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
CheckVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
ILS Remote Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
Tag Programming Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
CheckPASS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
Application Server...................................................................................................................................2-1
Check System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Self-Checkout Station Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Host Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Interrogator Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
This section cannot be hidden from view. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Edit Interrogator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Exit Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
Scheduling Checkout Cache Synchronizatio n an d Host Recon n e ctions . . . . . . . . . . . . . . . . . . . . . . .2-6
v
Synchronizing the Checkout Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-8
Downloading Inventory from the Portable Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-10
Generating Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-11
Specifying a Time Period for Any Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12
Checkout Discrepancy Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
Patron Discrepancy Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
Generic Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Exit Alarm Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21
Check In Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-23
Working with the Bridge Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-25
Changing the Op Mode of a Staff Station Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-25
Creating Staff Station Reader Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-25
Changing the Op Mode of Multiple Staff Station Readers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26
Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-26
Display System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-27
Patron Self-Checkout St ation................................................................................................... ..............3-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-1
Beginning a Self-Checkout Station Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
Presenting a Patron ID Card, Step 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-3
Scanning Items for Checkout, Step 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-5
Viewing Items that Could Not be Checked Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Finishing Checkout, Step 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-8
Loading Roll Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-8
Powering On the Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Powering Off the Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-11
Portable Inventory Reader......................................................................................................................4-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1
Inventory Wand LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Charging the Inventory Wand Battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Maintaining the Portable Data Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Charging the Portable Data Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Using the Serial Charging Cable to charge the battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Using the Universal Cable Cup to charge the battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Powering On and Off the Portable Data Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Using the Portable Data Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7
Turning On/Off Ba cklight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Checking the Status of the Batteries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Performing a Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Performing a Soft Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Performing a Hard Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
vi
Collecting Inventory Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12
Transferring Inventory Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16
Searching the Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-17
Preparing an Item Search List File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
Transferring the Search List File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Importing the Search List File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19
Scanning for Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-22
Conducting Shelf Order Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25
Selecting or Creating a Shelf Order Search File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Transferring the Shelf Order File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Importing Shelf Order File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
Shelf Order Search Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
Shelf Order Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Creating a New Search List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Creating a File from Shelf Order Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Viewing Shelf Order Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Saving Custom Search Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-34
ILS Remote Monitor.................................................................................................................................5-1
Installing Web Site Certificate on a Client Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2
Verifying Successful Certificate Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3
Setting Hyperlink on Client’s Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
Setting Up and Managing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-5
Adding a User Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
Modifying a User Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
Removing a User Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
Unlocking a Locked Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
Using ILS Remote Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-8
Launching ILS Remote Monitor in a Single Server, Multi-Branch Environment . . . . . . . . . . . . . . . . . . . . . . . . 5-8
Using ILS Remote Monitor in a Peer-to-Peer Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Changing Branch Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Viewing Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-10
Viewing and Printing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-11
Uploading Portable Inventory Reader inventory files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Logging out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Exception Ticket Printer.........................................................................................................................6-1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-1
Printer Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-2
Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
Using the Exception Ticket Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3
Setting the Printer’s Cut Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-4
vii
Inserting Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-5
Running a Self-Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-6
Installing the Cover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-6
Installing a Power Switch Cover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Installing a Connector Cover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Error Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-7
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-8
Removing Jammed Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8
Removing an Autocutter Jam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8
Cleaning the Print Head . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9
CheckVIEW...............................................................................................................................................7-1
Staff Co mputer Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Using CheckVIEW in Monitor Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-3
Using CheckVIEW in Host Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-4
Adding/Removing Self-Checkout Stations to CheckVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
Reinstalling Missing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Uninstalling CheckVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Using CheckVIEW to Shut Down a Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Affixing Tags ............................................................................................................................................8-1
Types of tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-1
Applying Tags to Books . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-2
Applying Tags to Video Cassettes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-4
Applying tags to CDs and DVDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-5
To place barcode labels on CDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5
To place tags on Jewel Case CD cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5
To place content tags on CDs and DVDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6
To place tags on DiscMate DVD cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
To place tags on DiscMate CD cases: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8
Applying Tags to Audio Material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-9
To place tags on Audio Cases with Tapes on both inside sections: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9
Applying Tags to Kits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-9
Using Tag Programming Station...........................................................................................................9-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-1
How it works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Programming Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-3
New Material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
viii
Using DiscMate......................................................................................................................................10-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-1
LEDs on the Intelligent Unlocking Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Using the Standard Unlocking Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Using the Intelligent Unlocking Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
Intelligent Unlocking Station Case Insertion Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4
Linking Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-5
Configuring Hardware to Link Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5
Circuit Linking Hardware Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6
Linking Electronic Media with Confirmation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7
Linking Electronic Media Continuously . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8
Removing Linked Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10
DVD Linking Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-11
Accessing and Printing Linking Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-11
Type of Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12
Linking Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12
Check-out Detail Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13
Staff Check-In Exception Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13
Drop Box Exception Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13
CheckPASS ............................................................................................................................................11-1
Using CheckPASS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-2
T roubleshooting Guide.........................................................................................................................12-1
Contact Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-1
Self-Checkout Station Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
Valid Patron ID Not Recognized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
Nothing Happens After an Item is Scanned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Graphics Display Incorrectly or Not at All . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Printer Does Not Print . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Printer Status of Unknown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Touch Screen Does Not Respond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Self-Checkout Station Fails to Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4
Application Server Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-4
Self-Checkout Station Not Displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4
Trouble Printing a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4
Error Message Displays when Running a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
Exit Alarms Do Not Occur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
Host Status Incorrectly Reports Offline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
Exit Interrogator Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-5
Exit Alarms Do Not Occur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
No Sound Occurs for an Exit Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
Incorrect Exit Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
ix
Staff Station Reader Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-6
Valid Circuit Not Recognized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
Scanned Item Does Not Display on Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7
Recovery Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-8
Restarting the Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8
Restarting the Complete System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8
Restarting the Intelligent Library Controller program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8
CheckVIEW Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-9
Solution 1 - IP Address used on Staff computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9
Solution 2 - Correct default settings on Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9
System Connection Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-11
System Maintenance.............................................................................................................................13-1
Intelligent Library Controller System Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-1
Transaction Database Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2
Synchronize Offline Transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-3
Backup Transaction Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-4
Purge the Transaction Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-5
Compact the Transaction Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-7
Reboot the Application Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-8
Backup the Application Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-11
Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-11
Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-12
Load Paper into Patron Self-Checkout Station Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-13
Safety Warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-15
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-16
Mechanical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
Electrical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
Peripherals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
Environmental . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
x
C HAPTER
C
HAPTER
0
I
NTRODUCTION
The Intelligent Library System Open Plus 3.0 (ILS) is an integrated security tracking and database system that maintains a library’s collection using Radio Frequency Identification (RFID) to wirelessly coordinate the subscription status of library materials. This protects collections, streamlines operations, and improves patron service. When using ILS, libraries reduce losses, enhance staff productivity, increase circulation flow, and improve patron satisfaction. ILS operates in conjunction with the library’s Library Management System (LMS) or Automated Circulation System (ACS).
ILS includes the following components:
•RFID tag
Patron Identification Card
Intelligent Sensor
Patron Self-Checkout Station
Staff Station Reader
Intelligent Library Controller (Application Server)
Portable Inventory Reader (optional)
Exception Ticket Printer (optional)
ILS Remote Monitor (optional)
CheckVIEW (optional)
CheckPASS (optional)
Tag Programming Station (optional)
DiscMate (optional)
Introduction: 1-1
The following configuration illustrates an example of the ILS components and connections in a typical ILS setup.
Tag Programming Station
RFID ISO Tag
Self-Checkout Station
Staff Station Reader
Library Management System
Intelligent Library Controller
Figure 1.1
Sample Intelligent Library Sy stem Components
Intelligent Sensors
Portable Reader
Note: Your specific ILS configuration may not include one or more of the components shown.
1-2 ILS 2.5 User Guide

Library Network Topology

In addition to supporting the Single Branch topology, ILS Version 3.0 supports the following library topologies:
“Single Branch”
“Single Server, Multi-Branch Architecture”
“Peer-to-Peer Communication”
Figure 1.2 depicts the library network topologies supported by ILS Version 3.0.

Single Branch

Single Server, Multi-Branch
Application Server
Peer-to-Peer
= branch
Figure 1.2
Single Branch
Local Security
Controller
Peer Branch Peer Branch
Library Network Topologies Supported by ILS Version 2.5
Main Branch
Main BranchPeer Branch
The Single Branch scenario represents the current implementation of ILS, where one Application Server controls all of the components within a single branch library.
Introduction: Library Network Topology 1-3

Single Server , Multi-Branch Architecture

New with this release, ILS Version 3.0 enables a single server to manage the circulation of not only its only branch but multiple remote branches as well, granting the administrator greater power and ease to manage the entire system. In this scenario, Local Security Controllers are used to assist the Application Server.
The Local Security Controller (LSC) is a combination hardware and software solution for a multi-branch ILS deployment. The LSC assists the Intelligent Library Controller in maintaining the response speed of Exit Interrogators, managing the connection between the Exit Interrogators at the branch and the remote Application Server to provide maximum caching performance. The LSC also enables the intelligent sensors to operate (with limitations) if the main server is down. This scenario is normally used with libraries containing up to 20 branches.

Peer-to-Peer Communication

New with this release is the ability to run a library’s security and inventory management system from any ILS Server. This enables a granular redundant system that is crash resistant because each node can run the entire system, as well as, holding a complete copy of the checkout cache database at any time.
The main Application Server communicates to each node (peer server) the latest circulation database in a configurable matter of time (from seconds to hours or even daily); meaning circulation records are nearly always up to date. This means that exit gates (intelligent sensors) are updated throughout the day at every branch. This allows a patron to walk to another branch (for example on a college campus) and their library material will respond with the correct check-in or checkout status. This scenario is normally used for libraries containing more than 20 branches.
1-4 ILS 2.5 User Guide

Document Overview

This manual provides a general overview of the ILS technology and illustrates the use and operation of each component.
This manual has been designed for the librarian and administrator and contains all the information necessary to take full advantage of the system capabilities. The Intelligent Library System enhances your library experience because of the system's inherent ease of use and efficiency.
This manual is organized into chapters, with each chapter describing a system peripheral, such as the Self-Checkout Station. Each peripheral is designed with a specific system role in mind. For example, patrons typically use the Self-Checkout Station, while Library staff use the Portable Inventory Reader. Read the sections that apply to your role for ILS system operation.
This manual is divided into the following chapters that cover system peripherals and important ILS tasks.
Introduction (See page 1-1)
Application Server (See page 2-1)
Self-Checkout Station (See page 3-1)
Portable Reader (See page 4-1)
ILS Remote Monitor (See page 5-1)
CheckVIEW (See page 7-1)
Exception Ticket Printer (See page 6-1)
CheckPASS (See page 11-1)
Tagging procedures (See page 8-1)
Troubleshooting Guide (See page 12-1)
System Maintenance Guide (See page 13-1)

Intended Audience

This document is intended for library staff and administrators as well as Checkpoint Systems field service staff. The library staff includes librarians, support staff, and temporary staff. The Field Service staff is comprised of the Checkpoint installers and technical support personnel. These audiences need to understand the basic functions, operations, and procedures related to the ILS.
Introduction: Document Overview 1-5

System Overview

The following sections describe how the Intelligent Library System Open Plus interacts with a library’s circulation system to maintain its collection.

How RF Query Tags

The Intelligent Library components - Self-Checkout Station, Intelligent Sensor, Staff Station Reader, and Portable Reader - all use a Radio Frequency (RF) antenna and transceiver system (interrogator) which detects and reads the RFID tags. Communications occur when an interrogator’s radio field is triggered by a tag passing through it. When energized, the tag presents the programmed item-specific information to the interrogator for further processing.
RFID Tag
1
0
1
A
U
.
.
.
.
.
Radio Field
Sample Interrogator (Staff Station Reader)
.
.
.
.
.
.
.
.
?
?
?
?
?
?
Figure 1.3
RFID Tag is interrogated
The data, routed by the Intelligent Library Controller, is compared to the Library Management System (LMS) database, in order to identify the checkout status of an item.

How ILS Maintains the Library’s Collection Database

The Intelligent Library Controller is the communications gateway between the ILS subsystems and the library’s Library Management System (LMS) so that the check-in, self-checkout, inventory management, and security activities can all be accomplished.
All library materials including books, CD/DVD materials, videotapes, and cassettes are tagged with a permanent RFID tag. This tag contains information that uniquely identifies the item within the library circulation database. Patron cards identify patrons when the card is scanned at the Self-Checkout Station. The card stores coded information unique to the individual patron that identifies the user to the Library Management System. The patron can then be validated as eligible or ineligible to use the library checkout privilege.
1-6 ILS 2.5 User Guide
Patron Checkout and Check-In
Patrons use Self-Checkout Stations to checkout library materials. Self-Checkout Stations include a patron card reader, an RFID tag, a touch screen monitor, and a printer in one compact unit. This provides the patron with library transaction capability without any librarian assistance. A patron scans the RFID Patron Card and library materials, identifying the patron and linking the library materials to the individual through a communications session with the Library Management System via the Intelligent Library Controller.
When the patron checks out materials, the patron and checked out item information is stored in both the LMS and ILS databases, allowing ILS to operate in both on- and off-line modes. When materials are checked out from a Self-Checkout Station, the ILS asks the to the patron to checkout items from the LMS. If privileges are granted then a checkout request to the LMS is generated for each item.
If the patron is checking in library materials, the ILS makes a check-in request to the LMS, which updates its database and reports the result back to the ILS.
Staff Checkout and Check-In
The library staff typically uses a Staff Station Reader in situations where a patron needs help from a librarian or when a librarian is checking in or checking out library materials. The Staff Station Reader interrogates tags and functions the same as current bar code scanners used in Library Management Systems.
Book Return Check-In
The Staff Station Reader can also be integrated into a book return slot. When library materials are placed in the book return, the tags on the items are read and sent to the LMS. The LMS then updates its database and passes back the transaction status to the ILS.
Introduction: System Overview 1-7
Checkout Process
Diagrammed here is how library materials are checked out.
Self-Checkout Station
Staff Station Reader
Intelligent Library Controller
Figure 1.4
1
The RFID tag, encoded with the necessary information, is wirelessly read by either the
Check Out Flow
Intelligent Sensors
Self-Checkout Station or the Staff Station Reader.
2 The Station or Reader communicates with the Intelligent Library Controller which,
after successful verification, communicates back to the Station or Reader that the book is checked out.
3 When exiting the library, the book passes through the Intelligent Sensors which
verifies the status of the book and allows it to exit the library without triggering an alarm.
1-8 ILS 2.5 User Guide
Inventory Collection
You can use the Portable Inventory Reader to inventory the library’s contents or to find individual items. The unit is a battery powered hand-held device that interrogates RFID tags as you walk by tagged items, when the unit detection head is within a ten-inch (25 cm) radius.
The Portable Inventory Reader searches for specified items using its search function. Single or multiple item IDs can be uploaded to the data terminal and when a scanned ID matches, the user receives an audible alert and the ID is displayed on the data terminal.
Figure 1.5
Portable Inventory Reader Taking Inventory
The Item Identifiers on the tagged articles are read and stored in a Portable Data Terminal which can be downloaded in real-time to the Intelligent Library Controller using the wireless data-terminal option or downloaded after the inventory is completed as a batch file using the standard data terminal. The inventory data is then communicated to the Library Management System, which compares the information from the Portable Inventory Reader to item information in the circulation database.
Introduction: System Overview 1-9
Exit Monitoring
The Intelligent Sensor protects exit/entry aisles against unchecked library materials leaving the secured area by determining whether tagged items have checked (authorized/ no alarm) or unchecked (unauthorized/alarm) events.
Intelligent Sensors
Intelligent Library Controller
Figure 1.6
Exit Monitoring
Programming Tags
The Tag Programming Station enables libraries to read and create their own RFID tags and print barcode labels. This can also be used to convert library materials with barcodes to RFID tags programmed with the barcode value. A tag format file (created by Checkpoint field service staff using the Tag Programming Application) is used to program the tags in a compatible format. Tags are programmed by printing them with the Tag Programming Station. See “RFID Tag is interrogated” on page 1-6 for an illustration of this process.
Off-line Processing
The Off-line Processing feature enables the Intelligent Library Controller and Self-Checkout Stations to continue operating when disconnected from the library’s circulation system. While the circulation system is offline, the Intelligent Library Controller records significant events on the system, which are then reported to the circulation server when synchronization reoccurs. For example, at the time of synchronization, the due date is sent to the circulation server.
When Off-line Processing is turned on, the word ON appears next to Off-line Processing. The feature is turned on or off by Checkpoint field service personnel by setting a table parameter on the Intelligent Library Controller. If using the Bridge Interface (“ILS
Without an LMS Connection”), Off-line Processing should never be turned on.
1-10 ILS 2.5 User Guide
ILS Without an LMS Connection
It is possible for ILS to operate without an active Library Management System (LMS) interconnection using the ILS Bridge Interface feature. The Bridge Interface feature allows libraries with non-supported circulation vendors or no circulation systems to use the security and Staff Station Reader functionality of the ILS.
With the Bridge Interface, the user of the ILS Control program monitors and changes the operation mode (check-in or checkout) of the Staff Station Readers. A library that is using the Bridge Interface can use a Staff Station Reader for checkout, but cannot use a Self-Checkout Station.

Components

The following sections describe in detail each of the ILS system components.

RFID Tag

The RFID tag an advanced RFID integrated circuit bonded to a label which is then attached to library material.
Figure 1.7
The tag stores 96 programmable bits of information about an item that can be read on a single Radio Frequency, 13.56 MHz, up to a distance of 4 feet (1.2 m). The tag allo ws fo r the reading of multiple tags using an anticollision algorithm, as well as error detection and correction methods.
RFID Tag
Introduction: Components 1-11

ILS Intelligent Sensor

The ILS Open Plus Exit Gate provides security at library exits and corrals by generating a radio field that gathers tag information from a distance up to 24 inches (61 cm). Two intelligent sensors form a secure aisle up to 48 inches (122 cm) wide for tag detection range. Additionally, the sensor communicates back to the Library Management System via the Intelligent Library Controller in real-time, determining whether an item has been checked out. If items in the interrogation field are not properly checked out, an alarm sounds and the book title appears on an exit alarm screen.
Figure 1.8
ILS Intelligent Sensors

Local Security Controller

The Local Security Controller (LSC) is a combination hardware and software solution for a single server, multi-branch ILS deployment. The LSC assists the Intelligent Library Controller in maintaining the response speed of Intelligent Sensors (exit gates), managing the connection between the Exit Interrogators at the branch and the remote Application Server to provide maximum caching performance. The LSC also enables the exit gates to operate (with limitations) if the main server is down. This scenario is normally used with libraries containing up to 20 branches.
Figure 1.9
Local Security Controller
1-12 ILS 2.5 User Guide

St aff S t ation Reader

The Staff Station Reader functions as an interface to ILS and circulation activities for library personnel. The Staff Station Reader reads RFID tags when a book is placed on the reader at up to 12 inches (30 cm) from the reader in a vertical direction. The Staff Station Reader communicates through data links with both the Library Management System and ILS, providing library staff the ability to perform typical functions with both the library system and RFID tagged items. For example, library staff can find the status of RFID tagged items that have been processed by ILS.
Figure 1.10
ILS Staff Station Reader

Patron Self-Checkout St ation II

The Self-Checkout Station enables a library patron to checkout library materials without the assistance of the library staff. The system may report messages if there is a problem conducting the checkout transaction; for example, overdue fines have locked the patron’s account.
Figure 1.11
ILS Self-Checkout Station
Introduction: Components 1-13
The Self-Checkout Station supports multiple languages simultaneously. When programmed, a language selection screen is presented to the patron to select a language for the self-checkout transaction.
A typical scenario for a patron to check out a book is as follows.
1 A patron arrives at the Self-Checkout Station and selects a language (if using multiple
languages).
2 The patron is identified by the system with their patron ID card. 3 The system confirms the patron’s eligibility to conduct a transaction through validation
of the patron ID card.
4 The patron is led through the transaction process by communication with the system
through a touch screen monitor. The patron checks out items by passing them one at a time over a short-range wireless interrogator that is located in the Self-Checkout Station.
a The short-range interrogator generates a radio field, which activates and
interrogates the tagged item.
b The interrogated item ID is passed to the Intelligent Library Controller. c The Intelligent Library Controller determines the item status and actions that can be
taken via communications with the Library Management System.
d The Intelligent Library Controller updat es the Self-Checkout Station, which notifies
the patron about their transaction status.
5 After the patron scans all the items to be checked out, the patron touches Done and
receives a receipt for the transaction, listing all materials checked out and the respective due dates.

Portable Inventory Reader

The Portable Inventory Reader provides inventory management functions, such as inventory reconciliation and item search. The device consists of a hand-held, rechargeable battery operated wand that generates a radio field that scans RFID tagged items. The wand is attached with cabling to a data terminal, which can be carried in one hand or strapped onto the wrist, storing information read by the wand. The data stored in the terminal can be downloaded to the Intelligent Library Controller in real-time either with the standard data terminal or wirelessly.
1-14 ILS 2.5 User Guide
The wand can also be used for item searches and shelf order checking. Item information is uploaded to the data terminal, allowing you to scan the ID. Once found, an audible alert sounds and the ID displays.
Inventory Wand
Portable Data Terminal
Figure 1.12
ILS Portable Reader

Intelligent Library Controller

The Intelligent Library Controller software:
Functions as the communications gateway between the Intelligent Library subsystems and the Library Management System
Identifies and configures all peripheral Intelligent Library sub-systems
Tracks and directs all ILS transactions
The Intelligent Library Controller operates whether the Library Management System is on-line or off-line. In off-line mode, the server tracks whether an item is being checked out, checked in, and determines whether tagged items going through secured areas are authorized. If unauthorized items are detected by the system, the server signals the Intelligent Sensor (the gates) to alarm. Any transactions that occur independent of the Library Management System are updated when the ILS system comes back on-line.
The Intelligent Library Controller interfaces to the Library Management System and other subsystem components using the 3M Card (NIC). The Ethernet NIC uses the TCP/IP protocol and session and the physical cable is 10BaseT.
©
protocol (SIP2) over an Ethernet Network Interface

Exception Ticket Printer

New in ILS Version 3.0 is the option to automatically print a hold receipt for library material at designated book drops. This means that when library material is returned via a book drop, if the library material is designated with a hold, a print er automatically prints a receipt. This frees library staff from having to manually check-in each item for its hold status. Instead, a staff member just checks the print receipt and then secures the receipt with the item on hold.
Introduction: Components 1-15
One exception ticket printer can service multiple interrogators. This means that a receipt might print at the exception ticket printer near Drop Box A for a book that is returned at Drop Box B.

CheckVIEW

New in Version 3.0 is the CheckVIEW utility, enabling library staff to remotely monitor up to four different Self-Checkout Stations at one time from any computer within the library. This enables library staff to manage issues such as:
Patrons who are having difficulty using the touch screen
Stations that may have hardware or system problems
Viewing the patrons’ check out list to reconcile any discrepancies concerning availability
Staff members can use their mouse and keyboard to assist patrons by assuming control of a specific Self-Checkout Station window to step a patron through a checkout procedure.

ILS Remote Monitor

New in Version 3.0, ILS Remote Monitor is an optional utility that allows library staff operating in a single server, multi-branch or peer-to-peer environment to view the status of other branches on the network from any computer on that network. This enables a staff member to monitor system status, identify a troublesome Self-Checkout Station, print a pre-run report, or transfer files.
The ILS Remote Monitor works on any computer (with a web browser) that is connected to the library network.

Tag Programming Station

The Tag Programming Station programs RFID tags, either with the retrospective item identifier from the existing barcode or when new materials are added to the collection. This reduces the time it takes to convert a library collection from barcode to RFID tags as well as add additional materials.
1-16 ILS 2.5 User Guide
The Tag Programming Station enables the library to easily link new materials into ILS instead of waiting several weeks for pre-programmed tags.
Figure 1.13
Tag Programming Station
When adding a new item to the collection and programming the RFID tag, the library can also print a barcode label. In many cases, libraries will continue to support the use of barcodes in addition to the RFID tags, mainly for compatibility with other branch libraries still using barcodes.
Using the Tag Programming Application, libraries program the RFID tags by printing them. Refer to “Affixing Tags” on page 8-1 for instructions on how to attach circuits to library materials.

CheckPASS

CheckPASS is an optional utility that allows library patrons to pay library fees at a Self-Checkout Station, without staff assistance. Outside of the ILS product, patrons use a self-service unit to add cash to their account balances. Within ILS, patrons are reminded of outstanding library fees when they attempt to check out materials. They can then pay with the touch of a button at the Self-Checkout Station. Patrons save time and library staff is freed to perform other tasks.
See “CheckPASS” on page 11-1 for further information.
Introduction: Components 1-17
Notes
1-18 ILS 2.5 User Guide
C HAPTER
C
HAPTER
0
A
PPLICATION
The Application Server hardware hosts the Intelligent Library Controller software, which is the core-processing component of the Intelligent Library System Open Plus. The Intelligent Library Controller performs many functions, including:
Storing transactions performed at the Self-Checkout Stations
Downloading inventory data from the ILS Portable Inventory Reader
Generating reports
Connecting to the Library Management System (LMS)
S
ERVER
In addition, the Intelligent Library Controller provides a single station for system configuration and diagnostics. If the LMS becomes unavailable, the Intelligent Library Controller can support automated checkout functions without the LMS, using a feature known as Off-Line Processing. Off-Line Processing is a site-specific option, so it may not be available to you.
This chapter describes the Application Server and its components and how they operate within the ILS. It also provides information on:
Checking system, host, interrogator, and exit alarm status (page 2-2)
Scheduling Checkout Cache Synchronization and Host Reconnections (page 2-6)
Synchronizing the Checkout Cache (page 2-8)
Downloading inventory information from the Portable Inventory Reader (page 2-10)
Generating, saving, and printing reports, including Checkout Discrepancy, Patron Discrepancy, Exit Alarm, Check-In Exception, and Generic reports (page 2-11)
Communicating and coordinating data exchange with Local Security Controllers at remote branches (page 2-25)
Working in Bridge Mode (page 2-25)
Application Server: 2-1

Check System St atus

The Intelligent Library Controller provides current information on the status of the ILS system and ILS Portable Inventory Reader. You also use it to generate reports.
The four main sections of the Intelligent Library Controller window include:
Self-Checkout Station Status (page 2-2)
Host Status (page 2-4)
Interrogator Status (page 2-4)
Exit Alarms (page 2-6)
With the exception of the Interrogator Status section, these sections can be displayed or hidden from view.
Menu Bar

Self-Check out Station Status

Button Bar
Host Status
Interrogator Status
Exit Alarms
Figure 2.1
Intelligent Library Controller window
You navigate using the menu bar or the button bar. The button bar provides shortcut buttons to the most commonly-used features. Use the Hide button to hide or show individual areas of the window.
Self-Checkout St ation S tatus
The Self-Checkout Station Status section displays information about the operational state of the Self-Checkout Stations, including:
Station Name
Displays the name of each Self-Checkout Station.
2-2 ILS Open Plus 3.0 Installation Manual
Loading...
+ 164 hidden pages