Checkpoint Systems IUSR07000 Users Manual

Intelligent Library System (ILS) 2.6
User Guide
P/N 7305198
Intelligent Library System 2.6 (ILS) User Guide
Copyright © 2/15/06 by Checkpoint Systems Inc. Released February 15, 2006.
Published by: Checkpoint Systems Inc. 101 Wolf Drive Thorofare, NJ 08086
1st Edition - January 5, 2006 Part number: 7305198
For use with Checkpoint’s Intelligent Library System Version 2.6. Checkpoint, Circulation Circuit, Intelligent Library System are registered trademarks of
Checkpoint Systems, Inc. All rights reserved. Information in this document is subject to change without notice. Compani e s,
names and data used in examples herein are fictitious unless otherwise noted. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher.
Portions of this software is licensed under the GPL license (see license.txt in your installation directory). In compliance of Section 3 of the GPL terms, contact your Checkpoint Representative for a source distribution.
Other product and company names herein may be trademarks of their respective owners. Windows and Windows 2000 © Microsoft, Inc., Redmond, Wash. Other products © or ® their respective manufacturers or copyright holders
.
Document revision information
Rev Description Date Author
00 Initial Draft 1/5/06 M. Reeves 01 Edits 2/15/06 M. Reeves
Document Conventions
Caution: This is a Caution or Warning icon. When it appears, the corresponding text i nd icates a cautionary
statement by which you must abide.
Note: This is a Note icon. When it appears, the corresponding text indicates a helpful note or tip when
using the feature.
The following usage conventions are used throughout the Intelligent Library System User Manual.
Button Name - This describes a button or selection on the screen. For example, the <DONE> button is represented in this document as Done.
Key Name - This describes a keystroke on a keyboard. For example Ctrl represents the Control key on a keyboard.
ii
Important Information to our Users in North America
FCC Regulatory Compliance Statement
Checkpoint Systems, Inc., offers Radio Frequency Identification Products that have been FCC certified or verified to 47 CFR Part 15 Subparts B/C and/or 47 CFR Part 18. Appropriately, one of the following labels will apply to the approval:
NOTE
: This equipment has been tested and found to comply with the limits for a class A digital device, pursuant to Part 15 of th e FC C R u le s. T he se lim i ts are designed to provide reasonable protection against harmful interference w hen the equipment is operate d in a comm ercial environment. This equipment generates, uses, and can radiate interference to radio communications. Operation of this equipment in a residential area is likely to cau s e harmful interference in which ca se th e us er w il l be req ui red to c o rrec t the interference at his own expense.
- OR -
This device complies w ith P art 15 o f th e FC C R ules. Operation is subject to th e follo w i n g two conditions: (1) including this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation, which may include intermittent decreases in detection and/or intermittent increases in alarm activity.
- OR -
NOTE: This equipment has been tested and found to comply with the limits for a miscellaneous type ISM device, pursuant to Part 18 of the FCC Rules. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio communications reception, which can be determined by turning the equipment off and on, please contact Checkpoint Systems, Inc., at 1 (800) 257-5540 for further assistance.
Equipment Safety Compliance Statement
Checkpoint Systems Radio Frequency Identification products have been designed to be safe during normal use and, where applicable, certain components of the system or accessory sub-assemblies have been certified, listed or recognized in accordance with UL 1037, UL 1310, UL 60950-1, CSA C22.2 No. 205, CSA C22.2 No. 220, CSA C22.2 No. 223, CSA C22.2 No. 60950-1. Additional approvals may be pending.
WARNING:
equipment not expressly approved by the party responsible for assuring compliance could void the user’s authority to operate the equipment in a safe or otherwise regulatory compliant manner.
Changes or modifications to Checkpoint’s Radio Frequency Identification (RFID)
one or more
of the following Safety standards: UL 1012,
iii
Important Information to our Users in Europe
CE Compliance Statement
Where applicable, Checkpoint Systems, Inc., offers certain Radio Frequency Identification (RFID) products that have CE Declarations of Conformity according to R&T TE D irec tive 99/5/EC.
System Electromagnetic Compatibility (EMC), has been tested and notified through Spectrum Management Authorities if necessary, using accredited laboratories, whereby, conformity is declared by voluntarily accepted European Telecommunications Standards Institute (ETSI) standards EN 301489-3 and EN 300330-2.
NOTE: Certain Radio Frequency Identification (RFID) equipment have been tested and found to conform with the CE emission and immunity requirement in Europe. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accorda n c e wi th th e inst ruc tio n m a nu a l, m ay ca u se harmful interference to radio communications. Under unusual circumstances, interference from external sources may degrade the system performance, which may include intermittent decreases in detection and/or intermittent increases in ala rm activity. However, there is no guarantee that interference will not occur in a particular installation. If this equipment experiences frequent interference from external sources or does cause harmful interference to radio communications reception, which can be determined by turning the equipment off and on, please contact a Checkpoint Systems representative for further assistance.
Equipment Safety Compliance Statement
Checkpoint Systems Radio Frequency Identification products have been designed to be safe during normal use and, where applicable, certain components of the system or accessory sub-assemblies have been declared safe according recognized in accordance with one or more 50364, EN 60742. Additional approvals may be pending.
WARNING:
expressly approved by the party responsible for assuring compliance could void the user’s authority to operate the equipment in a safe or otherwise regulatory compliant manner.
to the European Low Voltage Directive (LVD) by being certified, listed, or
of the following European safety standards; EN 60950, EN
Changes or modifications to Checkpoint’s Radio Frequency Identification equipment not
iv
T
ABLE OF
C
ONTENT S
Introduction..............................................................................................................................................1-1
Library Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3
Single Branch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Single Server, Multi-Branch Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Peer-to-Peer Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Document Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-5
Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
System Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-6
How RF Query Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
How ILS Maintains the Library’s Collection Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
Patron Checkout and Check-In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Staff Checkout and Check-In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Book Return Check-In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Inventory Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Exit Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Programming Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Off-line Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-11
Intelligent Circulation Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-11
ILS Intelligent Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Local Security Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Staff Station Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13
Patron Self-Checkout Station II . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13
Portable Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Intelligent Library Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
Exception Ticket Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
CheckVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
ILS Remote Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
Circulation Circuit Programming Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
CheckPASS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
Application Server...................................................................................................................................2-1
Check System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Self-Checkout Station Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Host Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Interrogator Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
This section cannot be hidden from view. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Edit Interrogator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Exit Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
v
Scheduling Checkout Cache Synchronizatio n an d Host Recon n e ctions . . . . . . . . . . . . . . . . . . . . . . .2-6
Synchronizing the Checkout Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-8
Downloading Inventory from the Portable Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-10
Generating Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-11
Specifying a Time Period for Any Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12
Checkout Discrepancy Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
Patron Discrepancy Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
Generic Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Exit Alarm Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21
Check In Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-23
Working with the Bridge Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-25
Changing the Op Mode of a Staff Station Reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-25
Creating Staff Station Reader Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-25
Changing the Op Mode of Multiple Staff Station Readers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26
Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-26
Display System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-27
Patron Self-Checkout St ation................................................................................................... ..............3-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-1
Beginning a Self-Checkout Station Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
Presenting a Patron ID Card, Step 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-3
Scanning Items for Checkout, Step 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-5
Viewing Items that Could Not be Checked Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Finishing Checkout, Step 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-8
Loading Roll Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-8
Powering On the Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Powering Off the Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-11
Portable Reader.......................................................................................................................................4-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1
Inventory Wand LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Charging the Inventory Wand Battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Maintaining the Portable Data Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Charging the Portable Data Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Using the Serial Charging Cable to charge the battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Using the Universal Cable Cup to charge the battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Powering On and Off the Portable Data Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Using the Portable Data Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7
Turning On/Off Ba cklight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Checking the Status of the Batteries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Performing a Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
vi
Performing a Soft Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Performing a Hard Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Collecting Inventory Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12
Transferring Inventory Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16
Searching the Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-17
Preparing an Item Search List File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
Transferring the Search List File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Importing the Search List File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19
Scanning for Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-22
Conducting Shelf Order Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25
Selecting or Creating a Shelf Order Search File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Transferring the Shelf Order File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Importing Shelf Order File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
Shelf Order Search Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
Shelf Order Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Creating a New Search List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Creating a File from Shelf Order Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Viewing Shelf Order Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Saving Custom Search Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-34
ILS Remote Monitor.................................................................................................................................5-1
Installing Web Site Certificate on a Client Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2
Verifying Successful Certificate Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3
Setting Hyperlink on Client’s Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
Setting Up and Managing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-5
Adding a User Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
Modifying a User Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
Removing a User Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
Unlocking a Locked Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7
Using ILS Remote Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-8
Launching ILS Remote Monitor in a Single Server, Multi-Branch Environment . . . . . . . . . . . . . . . . . . . . . . . . 5-8
Using ILS Remote Monitor in a Peer-to-Peer Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Changing Branch Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Viewing Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-10
Viewing and Printing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-11
Uploading Portable Reader inventory files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Logging out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Exception Ticket Printer....................................................................................................... ..................6-1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-1
Printer Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-2
Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
vii
Using the Exception Ticket Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3
Setting the Printer’s Cut Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-4
Inserting Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-5
Running a Self-Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-6
Installing the Cover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-6
Installing a Power Switch Cover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Installing a Connector Cover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Error Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-7
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-8
Removing Jammed Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8
Removing an Autocutter Jam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8
Cleaning the Print Head . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9
CheckVIEW...............................................................................................................................................7-1
Staff Co mputer Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Using CheckVIEW in Monitor Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-3
Using CheckVIEW in Host Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-4
Adding/Removing Self-Checkout Stations to CheckVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
Reinstalling Missing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Uninstalling CheckVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Using CheckVIEW to Shut Down a Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Circulation Circuit Programmer ............................................................................................................8-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-1
What is included . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
How it works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Programming Circulation Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-2
Configuring the CCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Programming Circuits for RFID Items Only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Programming Continuously . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Programming Circuits for RFID and Barcode Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5
Removing the CCP Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-7
Label Printing Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
Fault appears when printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
Resetting the Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
LabelView does not find *.inf file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
Configuring the Print Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8
Configuring the Print Driver Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8
Affixing Circulation Circuits...................................................................................................................9-1
Types of Circulation Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-1
viii
Applying Circulation Circuits to Books . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2
Applying Circulation Circuits to Video Cassettes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-3
Applying Circulation Circuits to CDs and DVDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-4
To place barcode labels on CDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
To place Circulation Circuits on Jewel Case CD cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
To place content Circulation Circuits on CDs and DVDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
To place Circulation Circuits on DiscMate DVD cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6
To place Circulation Circuits on DiscMate CD cases: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7
Applying Circulation Circuits to Audio Material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-8
To place Circulation Circuits on Audio Cases with T apes on Both Inside Sections: . . . . . . . . . . . . . . . . . . 9-8
Applying Circulation Circuits to Kits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-8
Using DiscMate......................................................................................................................................10-1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-1
LEDs on the Intelligent Unlocking Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Using the Standard Unlocking Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Using the Intelligent Unlocking Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
Intelligent Unlocking Station Case Insertion Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4
Linking Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-5
Configuring Hardware to Link Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5
Circuit Linking Hardware Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6
Linking Electronic Media with Confirmation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7
Linking Electronic Media Continuously . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8
Removing Linked Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10
DVD Linking Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-11
Accessing and Printing Linking Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-11
Type of Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12
Linking Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12
Check-out Detail Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13
Staff Check-In Exception Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13
Drop Box Exception Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13
CheckPASS ............................................................................................................................................1 1-1
Using CheckPASS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-2
T roubleshooting Guide.........................................................................................................................12-1
Contact Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-1
Self-Checkout Station Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
Valid Patron ID Not Recognized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
Nothing Happens After an Item is Scanned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Graphics Display Incorrectly or Not at All . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Printer Does Not Print . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Printer Status of Unknown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
ix
Touch Screen Does Not Respond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Self-Checkout Station Fails to Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4
Application Server Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-4
Self-Checkout Station Not Displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4
Trouble Printing a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-4
Error Message Displays when Running a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
Exit Alarms Do Not Occur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
Host Status Incorrectly Reports Offline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
Exit Interrogator Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-5
Exit Alarms Do Not Occur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-5
No Sound Occurs for an Exit Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
Incorrect Exit Alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
Staff Station Reader Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-6
Valid Circuit Not Recognized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6
Scanned Item Does Not Display on Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7
Recovery Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-8
Restarting the Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8
Restarting the Complete System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8
Restarting the Intelligent Library Controller program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8
CheckVIEW Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-9
Solution 1 - IP Address used on Staff computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9
Solution 2 - Correct default settings on Self-Checkout Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9
System Connection Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-11
System Maintenance.............................................................................................................................13-1
Intelligent Library Controller System Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-1
Transaction Database Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2
Synchronize Offline Transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-3
Backup Transaction Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-4
Purge the Transaction Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-5
Compact the Transaction Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-7
Reboot the Application Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-8
Backup the Application Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-11
Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-11
Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-12
Load Paper into Patron Self-Checkout Station Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-13
Safety Warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-15
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-16
Mechanical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
Electrical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
Peripherals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
Environmental . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-16
x
C HAPTER
C
HAPTER
0
I
NTRODUCTION
The Intelligent Library System 2.6 (ILS) is an integrated security tracking and database system that maintains a library’s collection using Radio Frequency Identification (RFID) to wirelessly coordinate the subscription status of library materials. This protects collections, streamlines operations, and improves patron service. When using ILS, libraries reduce losses, enhance staff productivity, increase circulation flow, and improve patron satisfaction. ILS operates in conjunction with the library’s Library Management System (LMS) or Automated Circulation System (ACS).
ILS includes the following components:
Circulation Circuit (inventory tag)
Patron Identification Card
Intelligent Sensor
Patron Self-Checkout Station
Staff Station Reader
Intelligent Library Controller (Application Server)
Portable Reader (optional)
Exception Ticket Printer (optional)
ILS Remote Monitor (optional)
CheckVIEW (optional)
CheckPASS (optional)
Circulation Circuit Programming Station (optional)
DiscMate (optional)
Introduction: 1-1
The following configuration illustrates an example of the ILS components and connections in a typical ILS setup.
Circulation Circuit
Programming Station
Staff Station Reader
Circulation Circuit
Self-Checkout Station
Intelligent Sensors
Intelligent Library Controller
Library Management System
Note: Your specific ILS configuration may not include one or more of the components shown.
1-2 ILS 2.5 User Guide
Figure 1.1
Portable Reader
Sample Intelligent Library Sy stem Components
Library Network Topology
In addition to supporting the Single Branch topology, ILS Version 2.6 supports the following library topologies:
“Single Branch”
“Single Server, Multi-Branch Architecture”
“Peer-to-Peer Communication”
Figure 1.2 depicts the library network topologies supported by ILS Version 2.6.
Single Branch
Single Server, Multi-Branch
Application Server
Peer-to-Peer
= branch
Figure 1.2
Single Branch
Local Security
Controller
Peer Branch Peer Branch
Library Network Topologies Supported by ILS Version 2.5
Main Branch
Main BranchPeer Branch
The Single Branch scenario represents the current implementation of ILS, where one Application Server controls all of the components within a single branch library.
Introduction: Library Network Topology 1-3
Single Server , Multi-Branch Architecture
New with this release, ILS Version 2.6 enables a single server to manage the circulation of not only its only branch but multiple remote branches as well, granting the administrator greater power and ease to manage the entire system. In this scenario, Local Security Controllers are used to assist the Application Server.
The Local Security Controller (LSC) is a combination hardware and software solution for a multi-branch ILS deployment. The LSC assists the Intelligent Library Controller in maintaining the response speed of Exit Interrogators, managing the connection between the Exit Interrogators at the branch and the remote Application Server to provide maximum caching performance. The LSC also enables the intelligent sensors to operate (with limitations) if the main server is down. This scenario is normally used with libraries containing up to 20 branches.
Peer-to-Peer Communication
New with this release is the ability to run a library’s security and inventory management system from any ILS Server. This enables a granular redundant system that is crash resistant because each node can run the entire system, as well as, holding a complete copy of the checkout cache database at any time.
The main Application Server communicates to each node (peer server) the latest circulation database in a configurable matter of time (from seconds to hours or even daily); meaning circulation records are nearly always up to date. This means that exit gates (intelligent sensors) are updated throughout the day at every branch. This allows a patron to walk to another branch (for example on a college campus) and their library material will respond with the correct check-in or checkout status. This scenario is normally used for libraries containing more than 20 branches.
1-4 ILS 2.5 User Guide
Document Overview
This manual provides a general overview of the ILS technology and illustrates the use and operation of each component.
This manual has been designed for the librarian and administrator and contains all the information necessary to take full advantage of the system capabilities. The Intelligent Library System enhances your library experience because of the system's inherent ease of use and efficiency.
This manual is organized into chapters, with each chapter describing a system peripheral, such as the Self-Checkout Station. Each peripheral is designed with a specific system role in mind. For example, patrons typically use the Self-Checkout Station, while Library staff use the Portable Reader. Read the sections that apply to your role for ILS system operation.
This manual is divided into the following chapters that cover system peripherals and important ILS tasks.
Introduction (See page 1-1)
Application Server (See page 2-1)
Self-Checkout Station (See page 3-1)
Portable Reader (See page 4-1)
ILS Remote Monitor (See page 5-1)
CheckVIEW (See page 7-1)
Exception Ticket Printer (See page 6-1)
CheckPASS (See page 11-1)
Tagging procedures (See page 9-1)
Troubleshooting Guide (See page 12-1)
System Maintenance Guide (See page 13-1)
Intended Audience
This document is intended for library staff and administrators as well as Checkpoint Systems field service staff. The library staff includes librarians, support staff, and temporary staff. The Field Service staff is comprised of the Checkpoint installers and technical support personnel. These audiences need to understand the basic functions, operations, and procedures related to the ILS.
Related Documentation
The following documents provide additional ILS and related information.
Release Notes
Circulation Circuit Programming Station User Manual
Introduction: Document Overview 1-5
System Overview
The following sections describe how the Intelligent Library System interacts with a library’s circulation system to maintain its collection.
How RF Query Circuits
The Intelligent Library components - Self-Checkout Station, Intelligent Sensor, Staff Station Reader, and Portable Reader - all use a Radio Frequency (RF) antenna and transceiver system (interrogator) which detects and reads the Intelligent Circulation Circuits. Communications occur when an interrogator’s radio field is triggered by a circuit passing through it. When energized, the circuit presents the programmed item-specific information to the interrogator for further processing.
Circulation
Circuit
1
0
1
A
U
.
.
.
.
.
Radio Field
Sample Interrogator (Staff Station Reader)
.
.
.
.
.
.
.
?
?
?
?
?
?
Figure 1.3
.
Circulation Circuit Interrogated
The data, routed by the Intelligent Library Controller, is compared to the Library Management System (LMS) database, in order to identify the checkout status of an item.
How ILS Maintains the Library’s Collection Database
The Intelligent Library Controller is the communications gateway between the ILS subsystems and the library’s Library Management System (LMS) so that the check-in, self-checkout, inventory management, and security activities can all be accomplished.
All library materials including books, CD/DVD materials, videotapes, and cassettes are tagged with a permanent RFID Circulation Circuit™ (inventory tag). This tag contains information that uniquely identifies the item within the library circulation database. Patron cards identify patrons when the card is scanned at the Self-Checkout Station. The card stores coded information unique to the individual patron that identifies the user to the Library Management System. The patron can then be validated as eligible or ineligible to use the library checkout privilege.
1-6 ILS 2.5 User Guide
Patron Checkout and Check-In
Patrons use Self-Checkout Stations to checkout library materials. Self-Checkout Stations include a patron card reader, an RFID Circulation Circuit interrogator, a touch screen monitor, and a printer in one compact unit. This provides the patron with library transaction capability without any librarian assistance. A patron scans the RFID Patron Card and library materials, identifying the patron and linking the library materials to the individual through a communications session with the Library Management System via the Intelligent Library Controller.
When the patron checks out materials, the patron and checked out item information is stored in both the LMS and ILS databases, allowing ILS to operate in both on- and off-line modes. When materials are checked out from a Self-Checkout Station, the ILS asks the to the patron to checkout items from the LMS. If privileges are granted then a checkout request to the LMS is generated for each item.
If the patron is checking in library materials, the ILS makes a check-in request to the LMS, which updates its database and reports the result back to the ILS.
Staff Checkout and Check-In
The library staff typically uses a Staff Station Reader in situations where a patron needs help from a librarian or when a librarian is checking in or checking out library materials. The Staff Station Reader interrogates tags and functions the same as current bar code scanners used in Library Management Systems.
Book Return Check-In
The Staff Station Reader can also be integrated into a book return slot. When library materials are placed in the book return, the tags on the items are read and sent to the LMS. The LMS then updates its database and passes back the transaction status to the ILS.
Introduction: System Overview 1-7
Checkout Process
Diagrammed here is how library materials are checked out.
Self-Checkout Station
Staff Station Reader
Intelligent Library Controller
Figure 1.4
1
The Circulation Circuit, encoded with the necessary information, is wirelessly read by
Check Out Flow
Intelligent Sensors
either the Self-Checkout Station or the Staff Station Reader.
2 The Station or Reader communicates with the Intelligent Library Controller which,
after successful verification, communicates back to the Station or Reader that the book is checked out.
3 When exiting the library, the book passes through the Intelligent Sensors which
verifies the status of the book and allows it to exit the library without triggering an alarm.
1-8 ILS 2.5 User Guide
Inventory Collection
You can use the Portable Reader to inventory the library’s contents or to find individual items. The unit is a battery powered hand-held device that interrogates RFID Circulation Circuits as you walk by tagged items, when the unit detection head is within a ten-inch (25 cm) radius.
The Portable Reader searches for specified items using its search function. Single or multiple item IDs can be uploaded to the data terminal and when a scanned ID matches, the user receives an audible alert and the ID is displayed on the data terminal.
Figure 1.5
Portable Reader Taking Inventory
The Item Identifiers on the tagged articles are read and stored in a Portable Data Terminal which can be downloaded in real-time to the Intelligent Library Controller using the wireless data-terminal option or downloaded after the inventory is completed as a batch file using the standard data terminal. The inventory data is then communicated to the Library Management System, which compares the information from the Portable Reader to item information in the circulation database.
Introduction: System Overview 1-9
Exit Monitoring
The Intelligent Sensor protects exit/entry aisles against unchecked library materials leaving the secured area by determining whether tagged items have checked (authorized/ no alarm) or unchecked (unauthorized/alarm) events.
Intelligent Sensors
Intelligent Library Controller
Figure 1.6
Exit Monitoring
Programming Circuits
The optional Circulation Circuit Programming Station allows libraries to read and create their own RFID Circulation Circuit tags and print barcode labels. This can also be used to convert library materials with barcodes to RFID tags programmed with the barcode value. A tag format file (created by Checkpoint field service staff using the Tag Designer software) is used to program the tags in a compatible format. Tags are programmed by passing them over the Circulation Circuit Programming Station. See “Circulation Circuit
Interrogated” on page 1-6 for an illustration of this process.
Off-line Processing
The Off-line Processing feature enables the Intelligent Library Controller and Self-Checkout Stations to continue operating when disconnected from the library’s circulation system. While the circulation system is offline, the Intelligent Library Controller records significant events on the system, which are then reported to the circulation server when synchronization reoccurs. For example, at the time of synchronization, the due date is sent to the circulation server.
When Off-line Processing is turned on, the word ON appears next to Off-line Processing. The feature is turned on or off by Checkpoint field service personnel by setting a table parameter on the Intelligent Library Controller. If using the Bridge Interface (“ILS
Without an LMS Connection”), Off-line Processing should never be turned on.
1-10 ILS 2.5 User Guide
ILS Without an LMS Connection
It is possible for ILS to operate without an active Library Management System (LMS) interconnection using the ILS Bridge Interface feature. The Bridge Interface feature allows libraries with non-supported circulation vendors or no circulation systems to use the security and Staff Station Reader functionality of the ILS.
With the Bridge Interface, the user of the ILS Control program monitors and changes the operation mode (check-in or checkout) of the Staff Station Readers. A library that is using the Bridge Interface can use a Staff Station Reader for checkout, but cannot use a Self-Checkout Station.
Components
The following sections describe in detail each of the ILS system components.
Intelligent Circulation Circuit
The Intelligent Circulation Circuit is an advanced RFID integrated circuit bonded to a label which is then attached to library material.
Figure 1.7
The circuit stores 96 programmable bits of information about an item that can be read on a single Radio Frequency, 13.56 MHz, up to a distance of 4 feet (1.2 m). The circuit allows for the reading of multiple circuits using an anticollision algorithm, as well as error detection and correction methods.
Intelligent Circulation Circuit
Introduction: Components 1-11
ILS Intelligent Sensor
The ILS Intelligent Sensor (exit gates) provides security at library exits and corrals by generating a radio field that gathers circuit information from a distance up to 24 inches (61 cm). Two intelligent sensors form a secure aisle up to 48 inches (122 cm) wide for circuit detection range. Additionally, the sensor communicates back to the Library Management System via the Intelligent Library Controller in real-time, determining whether an item has been checked out. If items in the interrogation field are not properly checked out, an alarm sounds and the book title appears on an exit alarm screen.
Figure 1.8
ILS Intelligent Sensors
Local Security Controller
The Local Security Controller (LSC) is a combination hardware and software solution for a single server, multi-branch ILS deployment. The LSC assists the Intelligent Library Controller in maintaining the response speed of Intelligent Sensors (exit gates), managing the connection between the Exit Interrogators at the branch and the remote Application Server to provide maximum caching performance. The LSC also enables the exit gates to operate (with limitations) if the main server is down. This scenario is normally used with libraries containing up to 20 branches.
Figure 1.9
Local Security Controller
1-12 ILS 2.5 User Guide
St aff S t ation Reader
The Staff Station Reader functions as an interface to ILS and circulation activities for library personnel. The Staff Station Reader reads RFID Circulation Circuits (tags) when a book is placed on the reader at up to 12 inches (30 cm) from the reader in a vertical direction. The Staff Station Reader communicates thro ugh data links with both the Library Management System and ILS, providing library staff the ability to perform typical functions with both the library system and RFID tagged items. For example, library staff can find the status of RFID tagged items that have been processed by ILS.
Figure 1.10
ILS Staff Station Reader
Patron Self-Checkout St ation II
The Self-Checkout Station enables a library patron to checkout library materials without the assistance of the library staff. The system may report messages if there is a problem conducting the checkout transaction; for example, overdue fines have locked the patron’s account.
Figure 1.11
ILS Self-Checkout Station
Introduction: Components 1-13
The Self-Checkout Station supports multiple languages simultaneously. When programmed, a language selection screen is presented to the patron to select a language for the self-checkout transaction.
A typical scenario for a patron to check out a book is as follows.
1 A patron arrives at the Self-Checkout Station and selects a language (if using multiple
languages).
2 The patron is identified by the system with their patron ID card. 3 The system confirms the patron’s eligibility to conduct a transaction through validation
of the patron ID card.
4 The patron is led through the transaction process by communication with the system
through a touch screen monitor. The patron checks out items by passing them one at a time over a short-range wireless interrogator that is located in the Self-Checkout Station.
a The short-range interrogator generates a radio field, which activates and
interrogates the tagged item.
b The interrogated item ID is passed to the Intelligent Library Controller. c The Intelligent Library Controller determines the item status and actions that can be
taken via communications with the Library Management System.
d The Intelligent Library Controller updat es the Self-Checkout Station, which notifies
the patron about their transaction status.
5 After the patron scans all the items to be checked out, the patron touches Done and
receives a receipt for the transaction, listing all materials checked out and the respective due dates.
Portable Reader
The Portable Reader provides inventory management functions, such as inventory reconciliation and item search. The device consists of a hand-held, rechargeable battery operated wand that generates a radio field that scans RFID tagged items. The wand is attached with cabling to a data terminal, which can be carried in one hand or strapped onto the wrist, storing information read by the wand. The data stored in the terminal can be downloaded to the Intelligent Library Controller in real-time either with the standard data terminal or wirelessly.
1-14 ILS 2.5 User Guide
The wand can also be used for item searches and shelf order checking. Item information is uploaded to the data terminal, allowing you to scan the ID. Once found, an audible alert sounds and the ID displays.
Inventory Wand
Portable Data Terminal
Figure 1.12
ILS Portable Reader
Intelligent Library Controller
The Intelligent Library Controller software:
Functions as the communications gateway between the Intelligent Library subsystems and the Library Management System
Identifies and configures all peripheral Intelligent Library sub-systems
Tracks and directs all ILS transactions
The Intelligent Library Controller operates whether the Library Management System is on-line or off-line. In off-line mode, the server tracks whether an item is being checked out, checked in, and determines whether tagged items going through secured areas are authorized. If unauthorized items are detected by the system, the server signals the Intelligent Sensor (the gates) to alarm. Any transactions that occur independent of the Library Management System are updated when the ILS system comes back on-line.
The Intelligent Library Controller interfaces to the Library Management System and other subsystem components using the 3M Card (NIC). The Ethernet NIC uses the TCP/IP protocol and session and the physical cable is 10BaseT.
©
protocol (SIP2) over an Ethernet Network Interface
Exception Ticket Printer
New in ILS Version 2.6 is the option to automatically print a hold receipt for library material at designated book drops. This means that when library material is returned via a book drop, if the library material is designated with a hold, a print er automatically prints a receipt. This frees library staff from having to manually check-in each item for its hold status. Instead, a staff member just checks the print receipt and then secures the receipt with the item on hold.
Introduction: Components 1-15
One exception ticket printer can service multiple interrogators. This means that a receipt might print at the exception ticket printer near Drop Box A for a book that is returned at Drop Box B.
CheckVIEW
New in Version 2.6 is the CheckVIEW utility, enabling library staff to remotely monitor up to four different Self-Checkout Stations at one time from any computer within the library. This enables library staff to manage issues such as:
Patrons who are having difficulty using the touch screen
Stations that may have hardware or system problems
Viewing the patrons’ check out list to reconcile any discrepancies concerning availability
Staff members can use their mouse and keyboard to assist patrons by assuming control of a specific Self-Checkout Station window to step a patron through a checkout procedure.
ILS Remote Monitor
New in Version 2.6, ILS Remote Monitor is an optional utility that allows library staff operating in a single server, multi-branch or peer-to-peer environment to view the status of other branches on the network from any computer on that network. This enables a staff member to monitor system status, identify a troublesome Self-Checkout Station, print a pre-run report, or transfer files.
The ILS Remote Monitor works on any computer (with a web browser) that is connected to the library network.
Circulation Circuit Programming St ation
The optional Circulation Circuit Programming Station programs Circulation Circuits, either with the retrospective item identifier from the existing barcode or when new materials are added to the collection. This reduces the time it takes to convert a library collection from barcode to RFID Circulation Circuits as well as add additional materials.
The Circulation Circuit Programming Station enables the library to easily link new materials into ILS instead of waiting several weeks for pre-programmed tags. In addition, the Circulation Circuit Programming Station can be integrated into an optional portable
1-16 ILS 2.5 User Guide
workstation that allows the library staff to program Circulation Circ uits while moving around the library.
Figure 1.13
Circulation Circuit Programmer
When adding a new item to the collection and programming the Circulation Circuit, the library can also print a barcode label. In many cases, libraries will continue to support the use of barcodes in addition to the RFID inventory Circulation Circuits, mainly for compatibility with other branch libraries still using barcodes.
Using the Circulation Circuit Programming Station software application, libraries program the Circulation Circuits by passing them over the tag programming surface. After programming the Circulation Circuit, the application automatically reads, verifies, and displays the data that was written to the Circulation Circuit. Refer to “Affixing Circulation
Circuits” on page 9-1 for instructions on how to attach circuits to library materials.
There is separate Circulation Circuit Programmer User Guide available that describes the usage of this product.
CheckPASS
CheckPASS is an optional utility (new in Version 2.6) that allows library patrons to pay library fees at a Self-Checkout Station, without staff assistance. Outside of the ILS product, patrons use a self-service unit to add cash to their account balances. Within ILS, patrons are reminded of outstanding library fees when they attempt to check out materials. They can then pay with the touch of a button at the Self-Checkout Station. Patrons save time and library staff is freed to perform other tasks.
See “CheckPASS” on page 11-1 for further information.
Introduction: Components 1-17
Notes
1-18 ILS 2.5 User Guide
C HAPTER
C
HAPTER
0
A
PPLICATION
The Application Server hardware hosts the Intelligent Library Controller software, which is the core-processing component of the Intelligent Library System. The Intelligent Library Controller performs many functions, including:
Storing transactions performed at the Self-Checkout Stations
Downloading inventory data from the ILS Portable Reader
Generating reports
Connecting to the Library Management System (LMS)
S
ERVER
In addition, the Intelligent Library Controller provides a single station for system configuration and diagnostics. If the LMS becomes unavailable, the Intelligent Library Controller can support automated checkout functions without the LMS, using a feature known as Off-Line Processing. Off-Line Processing is a site-specific option, so it may not be available to you.
This chapter describes the Application Server and its components and how they operate within the ILS. It also provides information on:
Checking system, host, interrogator, and exit alarm status (page 2-2)
Scheduling Checkout Cache Synchronization and Host Reconnections (page 2-6)
Synchronizing the Checkout Cache (page 2-8)
Downloading inventory information from the Portable Reader (page 2-10)
Generating, saving, and printing reports, including Checkout Discrepancy, Patron Discrepancy, Exit Alarm, Check-In Exception, and Generic reports (page 2-11)
Communicating and coordinating data exchange with Local Security Controllers at remote branches (page 2-25)
Working in Bridge Mode (page 2-25)
Application Server: 2-1
Loading...
+ 67 hidden pages