Published by:
Checkpoint Systems Inc.
101 Wolf Drive
Thorofare, NJ 08086
1st Edition - August -2005
Part number: 7216425
For use with Checkpoint’s Intelligent Library System Open Plus Version 3.0.
Checkpoint, Circulation Circuit, Intelligent Library System Open Plus are registered trademarks of
Checkpoint Systems, Inc.
All rights reserved. Information in this document is subject to change without notice. Compani e s,
names and data used in examples herein are fictitious unless otherwise noted. No part of the
contents of this book may be reproduced or transmitted in any form or by any means without the
written permission of the publisher.
Portions of this software is licensed under the GPL license (see license.txt in your installation
directory). In compliance of Section 3 of the GPL terms, contact your Checkpoint Representative
for a source distribution.
Caution:This is a Caution or Warning icon. When it appears, the corresponding text i nd icates a cautionary
statement by which you must abide.
Note:This is a Note icon. When it appears, the corresponding text indicates a helpful note or tip when
using the feature.
The following usage conventions are used throughout the Intelligent Library System User
Manual.
Button Name - This describes a button or selection on the screen. For example, the
<DONE> button is represented in this document as Done.
Key Name - This describes a keystroke on a keyboard. For example Ctrl represents the
Control key on a keyboard.
ii
Important Information to our Users in North America
FCC Regulatory Compliance Statement
Checkpoint Systems, Inc., offers Radio Frequency Identification Products that have been FCC certified or
verified to 47 CFR Part 15 Subparts B/C and/or 47 CFR Part 18. Appropriately, one of the following labels
will apply to the approval:
NOTE
: This equipment has been tested and found to comply with the limits for a class A digital device,
pursuant to Part 15 of th e FC C R u le s. T he se lim i ts are designed to provide reasonable protection against
harmful interference w hen the equipment is operate d in a comm ercial environment. This equipment
generates, uses, and can radiate interference to radio communications. Operation of this equipment in a
residential area is likely to cau s e harmful interference in which ca se th e us er w il l be req ui red to c o rrec t the
interference at his own expense.
- OR -
This device complies w ith P art 15 o f th e FC C R ules. Operation is subject to th e follo w i n g two
conditions: (1) including this device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause undesired operation, which
may include intermittent decreases in detection and/or intermittent increases in alarm activity.
- OR -
NOTE: This equipment has been tested and found to comply with the limits for a miscellaneous type
ISM device, pursuant to Part 18 of the FCC Rules. This equipment generates, uses, and can radiate
radio frequency energy and, if not installed and used in accordance with the instruction manual, may
cause harmful interference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful interference to radio
communications reception, which can be determined by turning the equipment off and on, please
contact Checkpoint Systems, Inc., at 1 (800) 257-5540 for further assistance.
Equipment Safety Compliance Statement
Checkpoint Systems Radio Frequency Identification products have been designed to be safe during normal
use and, where applicable, certain components of the system or accessory sub-assemblies have been
certified, listed or recognized in accordance with
UL 1037, UL 1310, UL 60950-1, CSA C22.2 No. 205, CSA C22.2 No. 220, CSA C22.2 No. 223, CSA
C22.2 No. 60950-1. Additional approvals may be pending.
WARNING:
equipment not expressly approved by the party responsible for assuring compliance could void the user’s
authority to operate the equipment in a safe or otherwise regulatory compliant manner.
Changes or modifications to Checkpoint’s Radio Frequency Identification (RFID)
one or more
of the following Safety standards: UL 1012,
iii
Important Information to our Users in Europe
CE Compliance Statement
Where applicable, Checkpoint Systems, Inc., offers certain Radio Frequency Identification (RFID) products
that have CE Declarations of Conformity according to R&T TE D irec tive 99/5/EC.
System Electromagnetic Compatibility (EMC), has been tested and notified through Spectrum Management
Authorities using laboratories, whereby, conformity is declared by voluntarily accep ted European
T elecom mun ications Stand ards Institute (ETSI) standards EN 301489-3 and EN 300330-2.
NOTE: Certain Radio Frequency Identification (RFID) equipment have been tested and found to conform
with the CE emission and immunity requirement in Europe. This equipment generates, uses, and can radiate
radio frequency energy and, if not installed and used in accorda n c e wi th th e inst ruc tio n m a nu a l, m ay ca u se
harmful interference to radio communications. Under unusual circumstances, interference from external
sources may degrade the system performance, which may include intermittent decreases in detection and/or
intermittent increases in ala rm activity. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment experiences frequent interference from external sources or does
cause harmful interference to radio communications reception, which can be determined by turning the
equipment off and on, please contact a Checkpoint Systems representative for further assistance.
Equipment Safety Compliance Statement
Checkpoint Systems Radio Frequency Identification products have been designed to be safe during normal
use and, where applicable, certain components of the system or accessory sub-assemblies have been
declared safe according
recognized in accordance with one or more
50364, EN 60742. Additional approvals may be pending.
WARNING:
expressly approved by the party responsible for assuring compliance could void the user’s authority to
operate the equipment in a safe or otherwise regulatory compliant manner.
to the European Low Voltage Directive (LVD) by being certified, listed, or
of the following European safety standards; EN 60950, EN
Changes or modifications to Checkpoint’s Radio Frequency Identification equipment not
Using DiscMate......................................................................................................................................10-1
The Intelligent Library System Open Plus 3.0 (ILS) is an integrated security tracking and
database system that maintains a library’s collection using Radio Frequency Identification
(RFID) to wirelessly coordinate the subscription status of library materials. This protects
collections, streamlines operations, and improves patron service. When using ILS,
libraries reduce losses, enhance staff productivity, increase circulation flow, and improve
patron satisfaction. ILS operates in conjunction with the library’s Library Management
System (LMS) or Automated Circulation System (ACS).
The following configuration illustrates an example of the ILS components and
connections in a typical ILS setup.
Tag Programming Station
RFID ISO Tag
Self-Checkout Station
Staff Station Reader
Library Management
System
Intelligent Library Controller
Figure 1.1
Sample Intelligent Library Sy stem Components
Intelligent Sensors
Portable Reader
Note:Your specific ILS configuration may not include one or more of the components shown.
1-2 ILS 2.5 User Guide
Library Network Topology
In addition to supporting the Single Branch topology, ILS Version 3.0 supports the
following library topologies:
•“Single Branch”
•“Single Server, Multi-Branch Architecture”
•“Peer-to-Peer Communication”
Figure 1.2 depicts the library network topologies supported by ILS Version 3.0.
Single Branch
Single Server,
Multi-Branch
Application Server
Peer-to-Peer
= branch
Figure 1.2
Single Branch
Local Security
Controller
Peer BranchPeer Branch
Library Network Topologies Supported by ILS Version 2.5
Main Branch
Main BranchPeer Branch
The Single Branch scenario represents the current implementation of ILS, where one
Application Server controls all of the components within a single branch library.
Introduction: Library Network Topology 1-3
Single Server , Multi-Branch Architecture
New with this release, ILS Version 3.0 enables a single server to manage the circulation of
not only its only branch but multiple remote branches as well, granting the administrator
greater power and ease to manage the entire system. In this scenario, Local Security
Controllers are used to assist the Application Server.
The Local Security Controller (LSC) is a combination hardware and software solution for
a multi-branch ILS deployment. The LSC assists the Intelligent Library Controller in
maintaining the response speed of Exit Interrogators, managing the connection between
the Exit Interrogators at the branch and the remote Application Server to provide
maximum caching performance. The LSC also enables the intelligent sensors to operate
(with limitations) if the main server is down. This scenario is normally used with libraries
containing up to 20 branches.
Peer-to-Peer Communication
New with this release is the ability to run a library’s security and inventory management
system from any ILS Server. This enables a granular redundant system that is crash
resistant because each node can run the entire system, as well as, holding a complete copy
of the checkout cache database at any time.
The main Application Server communicates to each node (peer server) the latest
circulation database in a configurable matter of time (from seconds to hours or even
daily); meaning circulation records are nearly always up to date. This means that exit gates
(intelligent sensors) are updated throughout the day at every branch. This allows a patron
to walk to another branch (for example on a college campus) and their library material will
respond with the correct check-in or checkout status. This scenario is normally used for
libraries containing more than 20 branches.
1-4 ILS 2.5 User Guide
Document Overview
This manual provides a general overview of the ILS technology and illustrates the use and
operation of each component.
This manual has been designed for the librarian and administrator and contains all the
information necessary to take full advantage of the system capabilities. The Intelligent
Library System enhances your library experience because of the system's inherent ease of
use and efficiency.
This manual is organized into chapters, with each chapter describing a system peripheral,
such as the Self-Checkout Station. Each peripheral is designed with a specific system role
in mind. For example, patrons typically use the Self-Checkout Station, while Library staff
use the Portable Inventory Reader. Read the sections that apply to your role for ILS
system operation.
This manual is divided into the following chapters that cover system peripherals and
important ILS tasks.
•Introduction (See page 1-1)
•Application Server (See page 2-1)
•Self-Checkout Station (See page 3-1)
•Portable Reader (See page 4-1)
•ILS Remote Monitor (See page 5-1)
•CheckVIEW (See page 7-1)
•Exception Ticket Printer (See page 6-1)
•CheckPASS (See page 11-1)
•Tagging procedures (See page 8-1)
•Troubleshooting Guide (See page 12-1)
•System Maintenance Guide (See page 13-1)
Intended Audience
This document is intended for library staff and administrators as well as Checkpoint
Systems field service staff. The library staff includes librarians, support staff, and
temporary staff. The Field Service staff is comprised of the Checkpoint installers and
technical support personnel. These audiences need to understand the basic functions,
operations, and procedures related to the ILS.
Introduction: Document Overview 1-5
System Overview
The following sections describe how the Intelligent Library System Open Plus interacts
with a library’s circulation system to maintain its collection.
How RF Query Tags
The Intelligent Library components - Self-Checkout Station, Intelligent Sensor, Staff
Station Reader, and Portable Reader - all use a Radio Frequency (RF) antenna and
transceiver system (interrogator) which detects and reads the RFID tags. Communications
occur when an interrogator’s radio field is triggered by a tag passing through it. When
energized, the tag presents the programmed item-specific information to the interrogator
for further processing.
RFID Tag
1
0
1
A
U
.
.
.
.
.
Radio Field
Sample Interrogator
(Staff Station Reader)
.
.
.
.
.
.
.
.
?
?
?
?
?
?
Figure 1.3
RFID Tag is interrogated
The data, routed by the Intelligent Library Controller, is compared to the Library
Management System (LMS) database, in order to identify the checkout status of an item.
How ILS Maintains the Library’s Collection Database
The Intelligent Library Controller is the communications gateway between the ILS
subsystems and the library’s Library Management System (LMS) so that the check-in,
self-checkout, inventory management, and security activities can all be accomplished.
All library materials including books, CD/DVD materials, videotapes, and cassettes are
tagged with a permanent RFID tag. This tag contains information that uniquely identifies
the item within the library circulation database. Patron cards identify patrons when the
card is scanned at the Self-Checkout Station. The card stores coded information unique to
the individual patron that identifies the user to the Library Management System. The
patron can then be validated as eligible or ineligible to use the library checkout privilege.
1-6 ILS 2.5 User Guide
Patron Checkout and Check-In
Patrons use Self-Checkout Stations to checkout library materials. Self-Checkout Stations
include a patron card reader, an RFID tag, a touch screen monitor, and a printer in one
compact unit. This provides the patron with library transaction capability without any
librarian assistance. A patron scans the RFID Patron Card and library materials,
identifying the patron and linking the library materials to the individual through a
communications session with the Library Management System via the Intelligent Library
Controller.
When the patron checks out materials, the patron and checked out item information is
stored in both the LMS and ILS databases, allowing ILS to operate in both on- and off-line
modes. When materials are checked out from a Self-Checkout Station, the ILS asks the to
the patron to checkout items from the LMS. If privileges are granted then a checkout
request to the LMS is generated for each item.
If the patron is checking in library materials, the ILS makes a check-in request to the LMS,
which updates its database and reports the result back to the ILS.
Staff Checkout and Check-In
The library staff typically uses a Staff Station Reader in situations where a patron needs
help from a librarian or when a librarian is checking in or checking out library materials.
The Staff Station Reader interrogates tags and functions the same as current bar code
scanners used in Library Management Systems.
Book Return Check-In
The Staff Station Reader can also be integrated into a book return slot. When library
materials are placed in the book return, the tags on the items are read and sent to the LMS.
The LMS then updates its database and passes back the transaction status to the ILS.
Introduction: System Overview 1-7
Checkout Process
Diagrammed here is how library materials are checked out.
Self-Checkout Station
Staff Station Reader
Intelligent Library Controller
Figure 1.4
1
The RFID tag, encoded with the necessary information, is wirelessly read by either the
Check Out Flow
Intelligent Sensors
Self-Checkout Station or the Staff Station Reader.
2 The Station or Reader communicates with the Intelligent Library Controller which,
after successful verification, communicates back to the Station or Reader that the book
is checked out.
3 When exiting the library, the book passes through the Intelligent Sensors which
verifies the status of the book and allows it to exit the library without triggering an
alarm.
1-8 ILS 2.5 User Guide
Inventory Collection
You can use the Portable Inventory Reader to inventory the library’s contents or to find
individual items. The unit is a battery powered hand-held device that interrogates RFID
tags as you walk by tagged items, when the unit detection head is within a ten-inch
(25 cm) radius.
The Portable Inventory Reader searches for specified items using its search function.
Single or multiple item IDs can be uploaded to the data terminal and when a scanned ID
matches, the user receives an audible alert and the ID is displayed on the data terminal.
Figure 1.5
Portable Inventory Reader Taking Inventory
The Item Identifiers on the tagged articles are read and stored in a Portable Data Terminal
which can be downloaded in real-time to the Intelligent Library Controller using the
wireless data-terminal option or downloaded after the inventory is completed as a batch
file using the standard data terminal. The inventory data is then communicated to the
Library Management System, which compares the information from the Portable
Inventory Reader to item information in the circulation database.
Introduction: System Overview 1-9
Exit Monitoring
The Intelligent Sensor protects exit/entry aisles against unchecked library materials
leaving the secured area by determining whether tagged items have checked (authorized/
no alarm) or unchecked (unauthorized/alarm) events.
Intelligent Sensors
Intelligent Library Controller
Figure 1.6
Exit Monitoring
Programming Tags
The Tag Programming Station enables libraries to read and create their own RFID tags
and print barcode labels. This can also be used to convert library materials with barcodes
to RFID tags programmed with the barcode value. A tag format file (created by
Checkpoint field service staff using the Tag Programming Application) is used to program
the tags in a compatible format. Tags are programmed by printing them with the Tag
Programming Station. See “RFID Tag is interrogated” on page 1-6 for an illustration of
this process.
Off-line Processing
The Off-line Processing feature enables the Intelligent Library Controller and
Self-Checkout Stations to continue operating when disconnected from the library’s
circulation system. While the circulation system is offline, the Intelligent Library
Controller records significant events on the system, which are then reported to the
circulation server when synchronization reoccurs. For example, at the time of
synchronization, the due date is sent to the circulation server.
When Off-line Processing is turned on, the word ON appears next to Off-line Processing.
The feature is turned on or off by Checkpoint field service personnel by setting a table
parameter on the Intelligent Library Controller. If using the Bridge Interface (“ILS
Without an LMS Connection”), Off-line Processing should never be turned on.
1-10 ILS 2.5 User Guide
ILS Without an LMS Connection
It is possible for ILS to operate without an active Library Management System (LMS)
interconnection using the ILS Bridge Interface feature. The Bridge Interface feature
allows libraries with non-supported circulation vendors or no circulation systems to use
the security and Staff Station Reader functionality of the ILS.
With the Bridge Interface, the user of the ILS Control program monitors and changes the
operation mode (check-in or checkout) of the Staff Station Readers. A library that is using
the Bridge Interface can use a Staff Station Reader for checkout, but cannot use a
Self-Checkout Station.
Components
The following sections describe in detail each of the ILS system components.
RFID Tag
The RFID tag an advanced RFID integrated circuit bonded to a label which is then
attached to library material.
Figure 1.7
The tag stores 96 programmable bits of information about an item that can be read on a
single Radio Frequency, 13.56 MHz, up to a distance of 4 feet (1.2 m). The tag allo ws fo r
the reading of multiple tags using an anticollision algorithm, as well as error detection and
correction methods.
RFID Tag
Introduction: Components 1-11
ILS Intelligent Sensor
The ILS Open Plus Exit Gate provides security at library exits and corrals by generating a
radio field that gathers tag information from a distance up to 24 inches (61 cm). Two
intelligent sensors form a secure aisle up to 48 inches (122 cm) wide for tag detection
range. Additionally, the sensor communicates back to the Library Management System
via the Intelligent Library Controller in real-time, determining whether an item has been
checked out. If items in the interrogation field are not properly checked out, an alarm
sounds and the book title appears on an exit alarm screen.
Figure 1.8
ILS Intelligent Sensors
Local Security Controller
The Local Security Controller (LSC) is a combination hardware and software solution for
a single server, multi-branch ILS deployment. The LSC assists the Intelligent Library
Controller in maintaining the response speed of Intelligent Sensors (exit gates), managing
the connection between the Exit Interrogators at the branch and the remote Application
Server to provide maximum caching performance. The LSC also enables the exit gates to
operate (with limitations) if the main server is down. This scenario is normally used with
libraries containing up to 20 branches.
Figure 1.9
Local Security Controller
1-12 ILS 2.5 User Guide
St aff S t ation Reader
The Staff Station Reader functions as an interface to ILS and circulation activities for
library personnel. The Staff Station Reader reads RFID tags when a book is placed on the
reader at up to 12 inches (30 cm) from the reader in a vertical direction. The Staff Station
Reader communicates through data links with both the Library Management System and
ILS, providing library staff the ability to perform typical functions with both the library
system and RFID tagged items. For example, library staff can find the status of RFID
tagged items that have been processed by ILS.
Figure 1.10
ILS Staff Station Reader
Patron Self-Checkout St ation II
The Self-Checkout Station enables a library patron to checkout library materials without
the assistance of the library staff. The system may report messages if there is a problem
conducting the checkout transaction; for example, overdue fines have locked the patron’s
account.
Figure 1.11
ILS Self-Checkout Station
Introduction: Components 1-13
The Self-Checkout Station supports multiple languages simultaneously. When
programmed, a language selection screen is presented to the patron to select a language for
the self-checkout transaction.
A typical scenario for a patron to check out a book is as follows.
1 A patron arrives at the Self-Checkout Station and selects a language (if using multiple
languages).
2 The patron is identified by the system with their patron ID card.
3 The system confirms the patron’s eligibility to conduct a transaction through validation
of the patron ID card.
4 The patron is led through the transaction process by communication with the system
through a touch screen monitor. The patron checks out items by passing them one at a
time over a short-range wireless interrogator that is located in the Self-Checkout
Station.
a The short-range interrogator generates a radio field, which activates and
interrogates the tagged item.
b The interrogated item ID is passed to the Intelligent Library Controller.
c The Intelligent Library Controller determines the item status and actions that can be
taken via communications with the Library Management System.
d The Intelligent Library Controller updat es the Self-Checkout Station, which notifies
the patron about their transaction status.
5 After the patron scans all the items to be checked out, the patron touches Done and
receives a receipt for the transaction, listing all materials checked out and the
respective due dates.
Portable Inventory Reader
The Portable Inventory Reader provides inventory management functions, such as
inventory reconciliation and item search. The device consists of a hand-held, rechargeable
battery operated wand that generates a radio field that scans RFID tagged items. The wand
is attached with cabling to a data terminal, which can be carried in one hand or strapped
onto the wrist, storing information read by the wand. The data stored in the terminal can be
downloaded to the Intelligent Library Controller in real-time either with the standard data
terminal or wirelessly.
1-14 ILS 2.5 User Guide
The wand can also be used for item searches and shelf order checking. Item information is
uploaded to the data terminal, allowing you to scan the ID. Once found, an audible alert
sounds and the ID displays.
Inventory Wand
Portable Data Terminal
Figure 1.12
ILS Portable Reader
Intelligent Library Controller
The Intelligent Library Controller software:
•Functions as the communications gateway between the Intelligent Library subsystems
and the Library Management System
•Identifies and configures all peripheral Intelligent Library sub-systems
•Tracks and directs all ILS transactions
The Intelligent Library Controller operates whether the Library Management System is
on-line or off-line. In off-line mode, the server tracks whether an item is being checked
out, checked in, and determines whether tagged items going through secured areas are
authorized. If unauthorized items are detected by the system, the server signals the
Intelligent Sensor (the gates) to alarm. Any transactions that occur independent of the
Library Management System are updated when the ILS system comes back on-line.
The Intelligent Library Controller interfaces to the Library Management System and other
subsystem components using the 3M
Card (NIC). The Ethernet NIC uses the TCP/IP protocol and session and the physical
cable is 10BaseT.
protocol (SIP2) over an Ethernet Network Interface
Exception Ticket Printer
New in ILS Version 3.0 is the option to automatically print a hold receipt for library
material at designated book drops. This means that when library material is returned via a
book drop, if the library material is designated with a hold, a print er automatically prints a
receipt. This frees library staff from having to manually check-in each item for its hold
status. Instead, a staff member just checks the print receipt and then secures the receipt
with the item on hold.
Introduction: Components 1-15
One exception ticket printer can service multiple interrogators. This means that a receipt
might print at the exception ticket printer near Drop Box A for a book that is returned at
Drop Box B.
CheckVIEW
New in Version 3.0 is the CheckVIEW utility, enabling library staff to remotely monitor
up to four different Self-Checkout Stations at one time from any computer within the
library. This enables library staff to manage issues such as:
•Patrons who are having difficulty using the touch screen
•Stations that may have hardware or system problems
•Viewing the patrons’ check out list to reconcile any discrepancies concerning
availability
Staff members can use their mouse and keyboard to assist patrons by assuming control of
a specific Self-Checkout Station window to step a patron through a checkout procedure.
ILS Remote Monitor
New in Version 3.0, ILS Remote Monitor is an optional utility that allows library staff
operating in a single server, multi-branch or peer-to-peer environment to view the status of
other branches on the network from any computer on that network. This enables a staff
member to monitor system status, identify a troublesome Self-Checkout Station, print a
pre-run report, or transfer files.
The ILS Remote Monitor works on any computer (with a web browser) that is connected
to the library network.
Tag Programming Station
The Tag Programming Station programs RFID tags, either with the retrospective item
identifier from the existing barcode or when new materials are added to the collection.
This reduces the time it takes to convert a library collection from barcode to RFID tags as
well as add additional materials.
1-16 ILS 2.5 User Guide
The Tag Programming Station enables the library to easily link new materials into ILS
instead of waiting several weeks for pre-programmed tags.
Figure 1.13
Tag Programming Station
When adding a new item to the collection and programming the RFID tag, the library can
also print a barcode label. In many cases, libraries will continue to support the use of
barcodes in addition to the RFID tags, mainly for compatibility with other branch libraries
still using barcodes.
Using the Tag Programming Application, libraries program the RFID tags by printing
them. Refer to “Affixing Tags” on page 8-1 for instructions on how to attach circuits to
library materials.
CheckPASS
CheckPASS is an optional utility that allows library patrons to pay library fees at a
Self-Checkout Station, without staff assistance. Outside of the ILS product, patrons use a
self-service unit to add cash to their account balances. Within ILS, patrons are reminded of
outstanding library fees when they attempt to check out materials. They can then pay with
the touch of a button at the Self-Checkout Station. Patrons save time and library staff is
freed to perform other tasks.
See “CheckPASS” on page 11-1 for further information.
Introduction: Components 1-17
Notes
1-18 ILS 2.5 User Guide
C HAPTER
C
HAPTER
0
A
PPLICATION
The Application Server hardware hosts the Intelligent Library Controller software, which
is the core-processing component of the Intelligent Library System Open Plus. The
Intelligent Library Controller performs many functions, including:
•Storing transactions performed at the Self-Checkout Stations
•Downloading inventory data from the ILS Portable Inventory Reader
•Generating reports
•Connecting to the Library Management System (LMS)
S
ERVER
In addition, the Intelligent Library Controller provides a single station for system
configuration and diagnostics. If the LMS becomes unavailable, the Intelligent Library
Controller can support automated checkout functions without the LMS, using a feature
known as Off-Line Processing. Off-Line Processing is a site-specific option, so it may not
be available to you.
This chapter describes the Application Server and its components and how they operate
within the ILS. It also provides information on:
•Checking system, host, interrogator, and exit alarm status (page 2-2)
•Scheduling Checkout Cache Synchronization and Host Reconnections (page 2-6)
•Synchronizing the Checkout Cache (page 2-8)
•Downloading inventory information from the Portable Inventory Reader (page 2-10)
•Generating, saving, and printing reports, including Checkout Discrepancy, Patron
Discrepancy, Exit Alarm, Check-In Exception, and Generic reports (page 2-11)
•Communicating and coordinating data exchange with Local Security Controllers at
remote branches (page 2-25)
•Working in Bridge Mode (page 2-25)
Application Server: 2-1
Check System St atus
The Intelligent Library Controller provides current information on the status of the ILS
system and ILS Portable Inventory Reader. You also use it to generate reports.
The four main sections of the Intelligent Library Controller window include:
•Self-Checkout Station Status (page 2-2)
•Host Status (page 2-4)
•Interrogator Status (page 2-4)
•Exit Alarms (page 2-6)
With the exception of the Interrogator Status section, these sections can be displayed or
hidden from view.
Menu
Bar
Self-Check
out Station
Status
Button
Bar
Host
Status
Interrogator
Status
Exit Alarms
Figure 2.1
Intelligent Library Controller window
You navigate using the menu bar or the button bar. The button bar provides shortcut
buttons to the most commonly-used features. Use the Hide button to hide or show
individual areas of the window.
Self-Checkout St ation S tatus
The Self-Checkout Station Status section displays information about the operational state
of the Self-Checkout Stations, including:
•Station Name
Displays the name of each Self-Checkout Station.
2-2 ILS Open Plus 3.0 Installation Manual
Loading...
+ 164 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.