Datalogic Viper-NET User Manual

Page 1
Viper-NET™
User’s Manual
Page 2
Page 3
Viper-NET™
USER'S MANUAL
Page 4
DATALOGIC S.p.A. Via Candini 2 40012 - Lippo di Calderara di Reno Bologna - Italy
Viper-NET™ - User's Manual
Ed.: 07/2005
ALL RIGHTS RESERVED Datalogic reserves the right to make modifications and improvements without prior notification.
Datalogic shall not be liable for technical or editorial errors or omissions contained herein, nor for incidental or consequential damages resulting from the use of this material.
Product names mentioned herein are for identification purposes only and may be trademarks and or registered trademarks of their respective companies.
© Datalogic S.p.A. 2001 - 2005
822000522 (Rev. B)
Page 5

CONTENTS

DATALOGIC END USER LICENSE AGREEMENT..................................... v
REFERENCES ........................................................................................... vii
Conventions ................................................................................................. vii
Reference Documentation ...........................................................................vii
Services and Support................................................................................... vii
SAFETY REGULATIONS.......................................................................... viii
General Safety Rules.................................................................................. viii
Laser Safety..................................................................................................ix
Radio Compliance....................................................................................... xiii
Information for the User ..............................................................................xiii
Bluetooth® Approval....................................................................................xiv
FCC .............................................................................................................xv
POWER SUPPLY ........................................................................................xv
Compliance..................................................................................................xv
GENERAL VIEW ....................................................................................... xvi
1 INTRODUCTION .......................................................................................... 1
1.1 Viper-NET™ Terminal Description................................................................ 1
1.2 Bluetooth® Module ....................................................................................... 1
1.3 Package Contents......................................................................................... 2
1.4 Accessories................................................................................................... 3
2 CONNECTIONS ........................................................................................... 4
2.1 Terminal Connection to the Host Computer.................................................. 4
2.1.1 RS232/USB Direct Connection .....................................................................4
2.1.2 WLAN Connections....................................................................................... 5
2.1.3 WPAN Connections ......................................................................................6
2.2 Connection Cables........................................................................................ 7
3 USE AND FUNCTIONING............................................................................ 8
3.1 Terminal Startup ........................................................................................... 8
3.2 Using the Stylus ............................................................................................ 9
3.3 Barcode Scanning....................................................................................... 10
3.4 Description of the Keys (32-key Models) .................................................... 11
3.4.1 System Control and Power Keys ................................................................ 11
3.4.2 Key Selection.............................................................................................. 12
3.4.3 Special Key Sequences .............................................................................. 13
3.5 Description of the Keys (48-key Models) .................................................... 15
3.5.1 System Control and Power Keys ................................................................ 15
3.5.2 Key Selection.............................................................................................. 16
iii
Page 6
3.5.3 Special Key Sequences .............................................................................. 17
3.6 STATUS Indicators .....................................................................................18
3.6.1 LED Status.................................................................................................. 18
3.6.2 Status Bar ................................................................................................... 19
3.7 Data Capture Configuration ........................................................................ 20
3.7.1 Configure .................................................................................................... 20
3.7.2 Capture ....................................................................................................... 24
3.8 Control Panel .............................................................................................. 25
3.8.1 Registry....................................................................................................... 26
3.8.2 Files Admin ................................................................................................. 27
3.8.3 Wireless Communications........................................................................... 29
3.8.4 Bluetooth® Manager Device Setup............................................................. 30
3.9 Windows Connections ................................................................................ 32
3.9.1 Microsoft® ActiveSync® ............................................................................. 32
3.9.2 Remote Desktop Connection ...................................................................... 33
3.10 Backup Directory File Management ............................................................ 34
4 MAINTENANCE .........................................................................................35
4.1 Charging the Batteries ................................................................................ 35
4.2 Replacing the Batteries............................................................................... 36
4.3 Cleaning the Terminal................................................................................. 37
5 TECHNICAL FEATURES........................................................................... 38
5.1 Technical Data ............................................................................................ 38
5.2 Reading Diagrams ...................................................................................... 39
6 TEST CODES............................................................................................. 41
GLOSSARY................................................................................................ 44
INDEX......................................................................................................... 46
iv
Page 7

DATALOGIC END USER LICENSE AGREEMENT

BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR BY USING DATALOGIC EQUIPMENT THAT INCLUDES THIS SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, THEN DO NOT DOWNLOAD, INSTALL, USE THE SOFTWARE NOR DATALOGIC EQUIPMENT.
The following terms and conditions govern your use of the Software except to the extent that a particular program (a) is the subject of a separate written agreement with Datalogic or (b) includes a separate “click-on” license agreement as part of the installation and/or download process. Should a conflict arise between the provisions of the foregoing documents, the order of precedence shall be (1) the written agreement, (2) the click-on agreement, and (3) this agreement (“Agreement”).
1. License. Subject to the terms and conditions of and except as otherwise provided in this Agreement, Datalogic S.p.A. (“Datalogic”) and its suppliers grant to Customer (“Customer”) a nonexclusive and nontransferable license to use the specific program modules, feature set(s) or feature(s) in object code form only as well as associated media, printed materials and “online” or electronic documentation (the “Software”) for which Customer has paid, if required, the license fees. The Software is licensed not sold. The license shall be subject to each of the following limitations:
Unless otherwise expressly provided in the documentation, Customer shall use the Software solely as embedded in, for execution on, or (where the applicable documentation permits installation on non-Datalogic equipment) for communication with Datalogic equipment owned or leased by Customer;
Customer’s use of the Software shall be limited to use on a single hardware chassis, on a single central processing unit, as applicable, or use on such greater number of chassis or central processing units as Customer may have paid Datalogic the required license fee; and
Customer’s use of the Software shall also be limited, as applicable and set forth in Customer’s purchase order or in Datalogic’s product catalog, user documentation, or web site, to a maximum number of (a) seats (i.e. users with access to the installed Software), (b) concurrent users, sessions, ports, and/or issued and outstanding IP addresses, and/or (c) central processing unit cycles or instructions per second. Customer’s use of the Software shall also be limited by any other restrictions set forth in Customer’s purchase order or in Datalogic’s product catalog, user documentation or web site for the Software.
2. General Limitations. Except as otherwise expressly provided under this Agreement, Customer shall have no right, and
Customer specifically agrees not to (i) transfer, assign or sublicense its license rights to any other person, or use the Software on unauthorized or secondhand Datalogic equipment, and any such attempted transfer, assignment or sublicense shall be void; (ii) correct errors to or otherwise modify or adapt the Software or create derivative works based upon the Software, or to permit third parties to do the same; or (iii) decompile, decrypt, reverse engineer, disassemble or otherwise reduce the Software to human-readable form to gain access to trade secrets or confidential information in the Software. To the extent required by law, at Customer's request, Datalogic shall provide Customer with the interface information needed to achieve interoperability between the Software and another independently created program, upon payment of Datalogic's applicable fee. Customer shall observe strict obligations of confidentiality with respect to such information.
3. Upgrades and Additional Copies. For purposes of this Agreement, “Software” shall include (and the terms and conditions of
this Agreement shall apply to) any upgrades, updates, bug fixes or modified versions (collectively, “Upgrades”) or backup copies of the Software licensed or provided to Customer by Datalogic or an authorized distributor for which Customer has paid the applicable license fees. Notwithstanding any other provision of this Agreement: (1) customer has no license or right to use any such additional copies or upgrades unless customer, at the time of acquiring such copy or upgrade, already holds a valid license to the original Software and has paid the applicable fee for the upgrade, if required; (2) use of upgrades is limited to Datalogic equipment for which customer is the original end user, purchaser or lessee or who otherwise holds a valid license to use the Software which is being upgraded; and (3) use of additional copies is limited to backup purposes only.
4. Proprietary Notices. Customer agrees to maintain and reproduce all copyright and other proprietary notices on all copies, in
any form, of the Software in the same form and manner that such copyright and other proprietary notices are included on the Software. Except as expressly authorized in this Agreement, Customer shall not make any copies or duplicates or any Software without the prior written permission of Datalogic. Customer may make such backup copies of the Software as may be necessary for Customer’s lawful use, provided Customer affixes to such copies all copyright, confidentiality, and proprietary notices that appear on the original.
5. Protection of Information. Customer agrees that aspects of the Software and associated documentation, including the
specific design and structure of individual programs, constitute trade secrets and/or copyrighted material of Datalogic. Customer shall not disclose, provide, or otherwise make available such trade secrets or copyrighted material in any form to any third party without the prior written consent of Datalogic. Customer shall implement reasonable security measures to protect such trade secrets and copyrighted material. Software and documentation shall remain solely property of Datalogic.
v
Page 8
6. Limited Warranty. If Customer obtained the Software directly from Datalogic, then Datalogic warrants that during the
Warranty Period (as defined below): (i) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (ii) the Software will substantially conform to its published specifications. The “Warranty Period” means a period beginning on the date of Customer’s receipt of the Software and ending on the later of (a) ninety (90) days from the date of initial shipment of the Software by Datalogic, or (b) the end of the minimum period required by the law of the applicable jurisdiction. The limited warranties extend only to Customer as the original licensee. Customer's sole and exclusive remedy and the entire liability of Datalogic and its suppliers under these limited warranties will be, at Datalogic’s sole option, repair or replacement of the Software if reported (or, upon request, returned) to Datalogic. Except as expressly granted in this Agreement, the Software is provided AS IS and with all faults. Datalogic does not warrant that the Software is error free or that Customer will be able to operate the Software without problems or interruptions. In addition, due to the continual development of new techniques for intruding upon and attacking networks, Datalogic does not warrant that the Software or any equipment, system or network on which the Software is used will be free of vulnerability to intrusion or attack. This warranty does not apply if the Software (a) is licensed for beta, evaluation, testing or demonstration purposes for which Datalogic does not receive a license fee, (b) has been altered, except by Datalogic, (c) has not been installed, operated, repaired, or maintained in accordance with instructions supplied by Datalogic, (d) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident, or (e) is used in ultra hazardous activities. If Customer obtained the Software from a Datalogic reseller, the terms of any warranty shall be as provided by such distributor, and Datalogic provides Customer no warranty with respect to such Software. The Software may contain support for programs written in Java. Java technology is not fault tolerant and is not designed, manufactured, or intended for use or resale as online control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines, or weapons systems, in which the failure of Java technology could lead directly to death, personal injury, or severe physical or environmental damage. Microsoft Inc. has contractually obligated Datalogic to make this disclaimer.
7. Disclaimer of Warranties. Except as specified in this warranty, all expressed or implied conditions, representations, and
warranties including, without limitation, any implied warranty or condition of merchantability, fitness for a particular purpose, non­infringement, satisfactory quality or arising from a course of dealing, usage, or trade practice, are hereby excluded to the extent allowed by applicable law. To the extent that an implied warranty cannot be excluded, such warranty is limited in duration to the warranty period.
8. Disclaimer of Liabilities. In no event will Datalogic or its suppliers be liable for any lost revenue, profit, or data, or for
special, indirect, consequential, incidental, or punitive damages however caused and arising out of the use of or inability to use the Software even if Datalogic has been advised of the possibility of such damages. In no event shall Datalogic or its suppliers' liability to customer, whether in contract, tort (including negligence), or otherwise, exceed the price paid by customer. The foregoing limitations shall apply even if the above-stated warranty fails of its essential purpose.
9. Term and Termination. This Agreement is effective until terminated. Customer may terminate this Agreement at any time by
destroying all copies of Software including any documentation. Customer’s license rights under this Agreement will terminate immediately without notice from Datalogic if Customer fails to comply with any provision of this Agreement. Upon termination, Customer must destroy all copies of Software in its possession or control.
10. Customer Records. Customer grants to Datalogic and its independent accountants the right to examine Customer’s books,
records and accounts during Customer’s normal business hours to verify compliance with this Agreement. In the event such audit discloses non-compliance with this Agreement, Customer shall promptly pay to Datalogic the appropriate license fees.
11. General Provisions. This Agreement shall be governed by and construed in accordance with the laws of Italy. All
disputes arising out of or in connection with this Agreement will be subject to the exclusive jurisdiction of the competent Court of the place where Datalogic has its registered office. If any portion hereof is found to be void or unenforceable, the remaining provisions of this Agreement shall remain in full force and effect. Except as expressly provided herein, this Agreement constitutes the entire agreement between the parties with respect to the license of the Software and supercedes any conflicting or additional terms contained in the purchase order.
vi
Page 9

REFERENCES

CONVENTIONS

This manual uses the following conventions:
“User” refers to anyone using a Viper-NET™ Terminal. “Terminal” refers to the Viper-NET™ Terminal. “You” refers to the System Administrator or Technical Support person using this manual to install, configure, operate, maintain or troubleshoot a Viper-NET™ Terminal.

REFERENCE DOCUMENTATION

For further information regarding Viper-NET™ refer to the SDK Help on-Line.

SERVICES AND SUPPORT

Datalogic provides several services as well as technical support through its website. Log on to www.datalogic.com and click on the including:
links indicated for further information
- PRODUCTS
Search through the links to arrive at your product page where you can download specific
Manuals and Software & Utilities
- SERVICES & SUPPORT
- Datalogic Services Warranty Extensions and Maintenance Agreements
- Authorised Repair Centres
- CONTACT US
E-mail form and listing of Datalogic Subsidiaries
vii
Page 10

SAFETY REGULATIONS

Read this manual carefully before performing any type of connection to the Viper-NET™ terminal. The user is responsible for any damages caused by incorrect use of
NOTE

GENERAL SAFETY RULES

Use only the components supplied by the manufacturer for the specific Viper­NET™ terminal being used.
Do not attempt to disassemble the Viper-NET™ terminal, as it does not contain parts that can be repaired by the user. Any tampering will invalidate the warranty.
When replacing the batteries or at the end of the operative life of the Viper­NET™ terminal, disposal must be performed in compliance with the laws in force.
Do not submerge the Viper-NET™ terminal in liquid products.
the equipment or by inobservance of the indication supplied in this manual.
viii
Page 11

LASER SAFETY

The laser light is visible to the human eye and is emitted from the window indicated in the figure.
CAUTION-CLASS 2
LASER LIGHT
WHEN OPEN
DO NOT STARE
INTO BEAM
AVOID EXPOSURE
LASER LIGHT
IS EMITTED FROM
THIS APERTURE
This product complies with 21 CFR Subchapter J
LASER LIGHT - DO NOT STARE INTO BEAM
MAX. OUTPUT RADIATION 1.4 mW - EMITTED WAVE LENGTH 630~680 nm
CLASS 2 LASER PRODUCT
EN60825-1:2001
Laser output window
DATALOGIC S.P.A. Via Candini, 2 Calderara di Reno (BO) Italy
Model VIPER-NET 301 - 102
ÌD05100000GÎ
S/N: D05100000 12 – 14 Vdc Max 1A
Manufactured September 2005
FCC ID: OMJ0010 contains FCC ID: LDK102040
218441
N2468
!
ix
Page 12
I D F E
La luce laser è visibile all'occhio umano e viene emessa dalla finestra indicata nella figura.
LUCE LASER NON FISSARE IL FASCIO APPARECCHIO LASER DI CLASSE 2 MINIMA POTENZA DI USCITA: LUNGHEZZA D'ONDA EMESSA: CONFORME A EN 60825-1 (2001)
Die Laserstrahlung ist für das menschliche Auge sichtbar und wird am Strahlaustrittsfenster ausgesendet (siehe Bild).
LASERSTRAHLUNG NICHT IN DER STRAHL BLINKEN PRODUKT DER LASERKLASSE 2 MAXIMALE AUSGANGLEISTUNG: WELLENLÄNGE: ENTSPR. EN 60825-1 (2001)
Le rayon laser est visible à l'oeil nu et il est émis par la fenêtre désignée sur l'illustration dans la figure.
RAYON LASER EVITER DE REGARDER LE RAYON APPAREIL LASER DE CLASSE 2 PUISSANCE DE SORTIE: LONGUER D'ONDE EMISE: CONFORME A EN 60825-1 (2001)
La luz láser es visible al ojo humano y es emitida por la ventana indicada en la figura.
RAYO LÁSER NO MIRAR FIJO EL RAYO APARATO LÁSER DE CLASE 2 MÁXIMA POTENCIA DE SALIDA: LONGITUD DE ONDA EMITIDA: CONFORME A EN 60825-1 (2001)
ENGLISH
The following information is provided to comply with the rules imposed by international authorities and refers to the correct use of your terminal.
STANDARD LASER SAFETY REGULATIONS This product conforms to the applicable requirements of both CDRH 21 CFR 1040 and EN 60825-1 at the date of manufacture. For installation, use and maintenance, it is not necessary to open the device.
Use of controls or adjustments or performance of procedures other than those specified herein may result in exposure to hazardous
CAUTION
visible laser light.
The product utilizes a low-power laser diode. Although staring directly at the laser beam momentarily causes no known biological damage, avoid staring at the beam as one would with any very strong light source, such as the sun. Avoid that the laser beam hits the eye of an observer, even through reflective surfaces such as mirrors, etc.
x
Page 13
ITALIANO
Le seguenti informazioni vengono fornite dietro direttive delle autorità internazionali e si riferiscono all’uso corretto del terminale.
NORMATIVE STANDARD PER LA SICUREZZA LASER Questo prodotto risulta conforme alle normative vigenti sulla sicurezza laser alla data di produzione: CDRH 21 CFR 1040 e EN 60825-1. Non si rende mai necessario aprire l’apparecchio per motivi di installazione, utilizzo o manutenzione.
L'utilizzo di procedure o regolazioni differenti da quelle descritte nella documentazione può provocare un'esposizione pericolosa
ATTENZIONE
a luce laser visibile.
Il prodotto utilizza un diodo laser a bassa potenza. Sebbene non siano noti danni riportati dall’occhio umano in seguito ad una esposizione di breve durata, evitare di fissare il raggio laser così come si eviterebbe qualsiasi altra sorgente di luminosità intensa, ad esempio il sole. Evitare inoltre di dirigere il raggio laser negli occhi di un osservatore, anche attraverso superfici riflettenti come gli specchi.
DEUTSCH
Die folgenden Informationen stimmen mit den Sicherheitshinweisen überein, die von internationalen Behörden auferlegt wurden, und sie beziehen sich auf den korrekten Gebrauch vom Terminal.
NORM FÜR DIE LASERSICHERHEIT Dies Produkt entspricht am Tag der Herstellung den gültigen EN 60825-1 und CDRH 21 CFR 1040 Normen für die Lasersicherheit. Es ist nicht notwendig, das Gerät wegen Betrieb oder Installations-, und Wartungs­arbeiten zu öffnen.
Jegliche Änderungen am Gerät sowie Vorgehensweisen, die nicht in dieser Betriebsanleitung beschrieben werden, können ein
ACHTUNG
gefährliches Laserlicht verursachen.
Der Produkt benutzt eine Laserdiode. Obwohl zur Zeit keine Augenschäden von kurzen Einstrahlungen bekannt sind, sollten Sie es vermeiden für längere Zeit in den Laserstrahl zu schauen, genauso wenig wie in starke Lichtquellen (z.B. die Sonne). Vermeiden Sie es, den Laserstrahl weder gegen die Augen eines Beobachters, noch gegen reflektierende Oberflächen zu richten.
xi
Page 14
FRANÇAIS
Les informations suivantes sont fournies selon les règles fixées par les autorités internationales et se refèrent à une correcte utilisation du terminal.
NORMES DE SECURITE LASER Ce produit est conforme aux normes de sécurité laser en vigueur à sa date de fabrication: CDRH 21 CFR 1040 et EN 60825-1. Il n’est pas nécessaire d’ouvrir l’appareil pour l’installation, l’utilisation ou l’entretien.
L'utilisation de procédures ou réglages différents de ceux donnés ici peut entrainer une dangereuse exposition à lumière laser
ATTENTION
visible.
Le produit utilise une diode laser. Aucun dommage aux yeux humains n’a été constaté à la suite d’une exposition au rayon laser. Eviter de regarder fixement le rayon, comme toute autre source lumineuse intense telle que le soleil. Eviter aussi de diriger le rayon vers les yeux d’un observateur, même à travers des surfaces réfléchissantes (miroirs, par exemple).
ESPAÑOL
Las informaciones siguientes son presentadas en conformidad con las disposiciones de las autoridades internacionales y se refieren al uso correcto del terminal.
NORMATIVAS ESTÁNDAR PARA LA SEGURIDAD LÁSER Este aparato resulta conforme a las normativas vigentes de seguridad láser a la fecha de producción: CDRH 21 CFR 1040 y EN 60825-1. No es necesario abrir el aparato para la instalación, la utilización o la manutención.
La utilización de procedimientos o regulaciones diferentes de aquellas describidas en la documentción puede causar una
ATENCIÓN
exposición peligrosa a la luz láser visible.
El aparato utiliza un diodo láser a baja potencia. No son notorios daños a los ojos humanos a consecuencia de una exposición de corta duración. Eviten de mirar fijo el rayo láser así como evitarían cualquiera otra fuente de luminosidad intensa, por ejemplo el sol. Además, eviten de dirigir el rayo láser hacia los ojos de un observador, también a través de superficies reflectantes como los espejos.
xii
Page 15

RADIO COMPLIANCE

In radio systems configured with portable terminals and access points, the frequencies to be used must be allowed by the spectrum authorities of the specific country in which the installation takes place. Be absolutely sure that the system frequencies are correctly set to be compliant with the spectrum requirements of the country.
The Radio Card used in this product automatically adapts to the frequencies set by the system and does not require any parameter settings.
For RadioReady versions, the correct conformity label for your radio model must be applied to the Viper-NET™ terminal to indicate that the terminal is in conformity with the directives related to the Viper-
NOTE
NET™/RF version.
The following shows the correspondence between the Viper-NET™ models and the Radio modules:
Viper-NET™ 300-XXX for 802.11b (Wi-Fi) radio cards
Viper-NET™ 100-XXX for radio ready models
Viper-NET™ 301-XXX for 802.11b (Wi-Fi) radio cards + Bluetooth
®

INFORMATION FOR THE USER

ENGLISH
Contact the competent authority responsible for the management of radio frequency devices of your country to verify the eventual necessity of a user license. Refer to the web site
Prendi contatto con l'autorità competente per la gestione degli apparati a radio frequenza del tuo paese, per verificarne l'eventuale necessità della licenza d'uso. Inoltre puoi trovare ulteriori informazioni al sito:
http://europa.eu.int/comm/enterprise/rtte/spectr.htm.
http://europa.eu.int/comm/enterprise/rtte/spectr.htm for further information.
ITALIANO
xiii
Page 16
FRANÇAIS
Contactez l'autorité compétente en la gestion des appareils à radio fréquence de votre pays pour vérifier la nécessité du permis d'usage. Pour tout renseignement vous pouvez vous adresser au site web:
http://europa.eu.int/comm/enterprise/rtte/spectr.htm.
DEUTSCH
Um die Notwendigkeit der Verwendungslizenz zu prüfen, wenden Sie sich an die Behörde, die auf der Radiofrequenzgerätsführung Ihres Lands bewandert ist. Weitere Informationen sind verfügbar auf dem Web Site:
http://europa.eu.int/comm/enterprise/rtte/spectr.htm.
ESPAÑOL
Contacta con la autoridad competente para la gestión de los dispositivos de radio frecuencia de tu país, para verificar si es necesario la licencia de uso. Además se puede encontrar mas información en el sitio web:
http://europa.eu.int/comm/enterprise/rtte/spectr.htm.

BLUETOOTH® APPROVAL

This product is equipped with the following certified Bluetooth module:
Product Name Bluetooth ID
Datalogic Bluetooth Radio Module B01322
xiv
Page 17
FCC
This device must be opened by qualified personnel only.
Modifications or changes to this equipment without the expressed written approval of Datalogic could void the authority to use the equipment.
This device complies with PART 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference which may cause undesired operation.
All Wi-Fi models contain FCC ID: LDK102040.
WARNING: FCC RF EXPOSURE GUIDELINES
To satisfy FCC RF exposure compliance requirements, this device should be used in hand-held, hand-operated configurations only. The device and its antenna must maintain a separation distance of 20 cm or more from a person’s body, except for the hands and wrists, to satisfy RF exposure compliance. This device is designed to be used in a person’s hands and its operating configurations do not support normal transmissions while it is carried in pockets or holsters next to a person’s body.
This device must not be co-located or operated in conjunction with any other transmitting device.

POWER SUPPLY

For battery charging, this device is intended to be supplied by a UL Listed or CSA Certified Power Unit marked "Class 2" or "LPS" output rated 12-14 V, minimum 1 A which supplies power directly to the charger via the jack connector.

COMPLIANCE

xv
Page 18

GENERAL VIEW

H
A
B
E
Key:
A) Good Read LED B) Battery low / Keyboard status / User programmable LED C) Display D) Charging status LED E) Keyboard F) Connector for direct RS232 or USB connection G) Laser beam output window H) Recharge contacts I) Trigger J) IrDA port
F
C
D
G
H
I
J
xvi
Page 19

INTRODUCTION

1
1 INTRODUCTION

1.1 VIPER-NET™ TERMINAL DESCRIPTION

The Viper-NET™ is the latest addition in Datalogic’s Mobile@work™ family for industrial environments.
The pistol shape, superior protection class, great drop resistance, and wide operating temperature range make the Viper-NET™ the ideal solution for warehouse and distribution center environments.
The rugged case of the Viper-NET™ houses the latest mobile and wireless technologies, including the Intel® XScale™ @ 400 MHz powerful processor. A bright and reflective TFT daylight readable color display with touch screen provides an optimal interface.
The terminal is always ready to use thanks to numerous communication ports (IrDA, RS232, USB). The Windows CE.NET architecture allows data capture, collection and communication with simple icons and intuitive graphic interface.
The Viper-NET™ product line offers two scan engine models: Laser High Performance (high visibility) and Laser Extra Long Range (autofocus), allowing codes to be read from near contact to several meter distances. These different options make it possible to respond to any warehouse or retail need.
Wireless communication is guaranteed thanks to RF WLAN technology, compliant with the IEEE 802.11b (Wi-Fi) standard. The Viper-NET™ product line includes Bluetooth same technology.
A full set of accessories and software tools, two keyboard options, easy to use interfaces, and long-lasting Li-Ion batteries make the Viper-NET™ ideal for the harshest mobile applications.
1.2 BLUETOOTH® MODULE
Viper-NET™ XX1-XXX models are equipped with a Bluetooth communications to other devices which use this standard, for example BT printers.
Connections are not guaranteed at temperatures below 0° C.
®
models, allowing connection with printers or other equipment with the
®
module for radio
1
Page 20
1
VIPER-NET™
1.3 PACKAGE CONTENTS
Viper-NET™ - Package Contents
The Viper-NET™ terminal package contains:
1 Viper-NET™ terminal;
1 rechargeable battery pack;
1 CD-ROM Datalogic-NET SDK (Windows CE .NET SDK for Datalogic
Terminals);
1 user’s manual;
3 styluses with clips and 3 bi-adhesive strips;
1 frame with 3 overlays;
Any other packages will contain the accessories necessary for the Viper-NET™ terminal connection to the host computer and to the network: the cradle, power supply, and one or more connection cables.
Remove all the components from their packaging, check their integrity and congruity with the packing documents.
CAUTION
NOTE
2
Keep the original packaging for use when sending products to the technical assistance center. Damage caused by improper packaging is not covered under the warranty.
Rechargeable battery packs are not initially charged. Therefore the first operation to perform is to charge them. See paragraph 4.1.
Page 21
INTRODUCTION
1.4 ACCESSORIES
Charger
94A154840 MBC9600 multi-slot battery charger (4 slots)
Batteries
94ACC4661 B-9600 LI BATTERY PACK 2000 mAh@7.2 V
Power Supply
FPS18 Power Supply for Viper-NET™ terminal (through CAB-405 or CAB-406) and for the MBC9600 multi-slot battery charger:
94ACC4595 FPS18 power supply without cord 94ACC1150 Power cord EU 3- pin 94ACC1160 Power cord AUS 3- pin
Cables
94A051000 CAB-405 cable for RS232 direct connection between the terminal and the PC. It also provides a power jack for connection to the FPS18.
94A051001 CAB-406 cable for USB direct connection between the terminal and the PC. It also provides a power jack for connection to the FPS18.
Various
94ACC1260 Pouch Style DL9600 (5 pcs) 94ACC1272 Functional Case Viper-NET™ 94ACC1240 Shoulder Strap (5 pcs) 94ACC1250 Heavy Duty Belt (5 pcs) 94ACC1230 Swivel for Functional Case (10 pcs) 94ACC1301 Stylus Pen (20 pcs) 94ACC1291 Belt Holster Right for Viper-NET™ 94ACC1292 Belt Holster Left for Viper-NET™
1
3
Page 22
2
VIPER-NET™
2 CONNECTIONS

2.1 TERMINAL CONNECTION TO THE HOST COMPUTER

2.1.1 RS232/USB Direct Connection

You can use a cable to connect the Viper-NET™ terminal to a host computer to transfer data.
This cable also allows connection to an external power supply to charge the batteries.
USB communication may not be completely guaranteed while batteries are simultaneously in charge. Avoid the CAB-
CAUTION
406 connection to power supply when USB link is active.
C
B
A
Key:
A Host computer C Viper-NET™ terminal B RS232 cable or USB cable D Power supply
4
94A051000 (RS232)
94A051001 (USB)
D
Page 23
CONNECTIONS
2
2.1.2 WLAN Connections
Viper-NET™ Wi-Fi models can communicate with the host using the on-board radio frequency module and an Access Point connected to the host computer.
A
B
Key: A) Viper-NET™ terminal B) Access point
5
Page 24
2
2.1.3 WPAN Connections
Viper-NET™ Bluetooth a printer, within a range of 10 m, using the on-board Bluetooth
B
A
®
models can communicate with a Bluetooth® device, such as
®
module.
VIPER-NET™
Key:
A) Viper-NET™ terminal
®
B) Bluetooth
printer
6
Page 25
CONNECTIONS
2.2 CONNECTION CABLES
The following cable is listed with its order number.
RS232 Direct Connection: cable 94A051000
HOST/PC side
9-PIN
(female)
3
2 3
1
6
8
CD
DSR
CTS
RX
TX
2
Viper-NET™ side
7-PIN
(male)
1
4
VEXT
Supply jack
5 7
GND
USB Direct Connection: cable 94A051001
HOST/PC side
USB Connector
(female)
1
2 5
3
Supply jack
4 7
V+
D-
D+
VEXT
GND
6
Viper-NET™ side
7-PIN
(male)
1
2
6
7
Page 26
3
VIPER-NET™

3 USE AND FUNCTIONING

The use of the Viper-NET™ terminal depends on the application software loaded. However there are several parameters that can be set and utilities that can be used to perform some basic functions such as barcode scanning, communications, file management, etc.
3.1 TERMINAL STARTUP
The Viper-NET™ terminal turns on when the batteries or the external supply are inserted.
After the batteries are installed, use the [ON/OFF] key or the trigger button to turn on the terminal. Use the [OFF] key to turn it off.
As soon as the terminal is on, the Windows CE .NET desktop configuration will appear on the screen.
Use the stylus as suggested in paragraph 3.2 to select icons and options.
8
Page 27
USE AND FUNCTIONING
3
The terminal goes into power-off (low power with display off), when it is no longer used for more than a programmable timeout, which is defined in the POWER applet of the Control Panel. In this mode it can be awakened (resuming operation) by the [ON/OFF] key or a trigger press.
The terminal can also be awakened or turned off by the application program.
NOTE

3.2 USING THE STYLUS

The stylus selects items and enters information. The stylus functions as a mouse.
Tap:
Drag:
Tap-and-hold:
The stylus is factory aligned; however, it is possible to align the cursor on the screen with the tip of the stylus. Enter the STYLUS applet of the Control Panel and tap the center of each target that appears on the screen with the tip of the stylus.
Touch the screen once with the stylus to open items and select options.
Hold the stylus on the screen and drag across the screen to select text and images. Drag in a list to select multiple items.
Tap and hold the stylus on an item to see a list of actions available for that item. On the pop-up menu that appears, tap the action you want to perform.
9
Page 28
3
VIPER-NET™
3.3 BARCODE SCANNING
To scan barcodes, point the Viper-NET™ terminal laser beam onto the code from a distance within the reading range while pressing the trigger. See the reading diagrams in chapter 0 for the reading range of your model.
The lighted band emitted by the laser must completely intercept the barcode as shown in the figure below. If enabled, the Good Read LED and the emission of an acoustic signal will indicate that the scan has taken place correctly.
To enable the barcode scanning refer to par. 3.7.1
10
Page 29
USE AND FUNCTIONING
f
3

3.4 DESCRIPTION OF THE KEYS (32-KEY MODELS)

This version of the Viper-NET™ terminal provides a keyboard having a total of 32 keys.
The keyboard can be divided as follows:
System control
and power keys
General and special keys

3.4.1 System Control and Power Keys

On/Of
LIGHT
By pressing this key and the terminal trigger simultaneously, a system software reset is performed.
By pressing these keys and the terminal trigger simultaneously, a system hardware reset is performed.
Powers the terminal ON or OFF.
Switch on/off the display backlight.
11
Page 30
3
A
F
E
A
/
,
B
p
W
\
)
@
2 1
$
(
8 7
VIPER-NET™
3.4.2 Key Selection
The following image shows the function, numeric and special keys provided on the keyboard:
F9
A
.
F1
SCRL
M
FUNC
F10
F2
+
F5
I
P
<
&
F
S
''
F1
J
=
F7
N
SHIFT
>
'
[
*
%
4
V
?
!
sLk
Ca
STAT
BKTAB
Y
TAB
DEL
C
F11
:
F3
G
-
F6
K
F8
CAPSLK
lpha
]
Q
F5 F6
T
¦
F2 F3
5
F10
Z
INS
0
F12
;
{
R
9
U
_
^
6
X
#
PrtScr
3
SPC
BKSP
ENTER
D
F4
H
L
ESC
O
CTRL
}
~
LT
Some of these keys carry extra symbols and are logically divided in up to 5 sections according to the following figure:
C
B
A
?
!
1
D
E
V
12
Page 31
USE AND FUNCTIONING
3
Each section corresponds to a symbol that can be obtained using the corresponding keyboard method according to the following scheme:
A) function of the key when preceded by a SHIFT key press;
B) function of the key when preceded by a FUNC key press;
C) function of the key when in Alpha mode;
D) function of the key when preceded by a CTRL key press;
E) function of the key when directly pressed.

3.4.3 Special Key Sequences

M
FUNC
SCROLL
E
This sequence locks the arrow keys so that they are always active to "scroll" through display selections. Pressing this sequence again returns the arrow keys to their normal function (singularly selectable with FUNC).
ALT
H
The ALT key press preceding any keyboard key or key sequence takes the same effect as on a standard PC. Ex.: ALT - F8 corresponds to ALT - F8 on a PC.
O
CTRL
The CTRL key press preceding any keyboard key enables the character positioned on the right upper part above the key. Ex: CTRL - 6 corresponds to the ˜ character.
M
FUNC
N
SHIFT
The FUNC and SHIFT key press preceding any keyboard key corresponds to the SHIFT + key press on the PC. Ex.: FUNC - SHIFT - F5 corresponds to SHIFT - F5 on a PC.
M
FUNC
O
CTRL
The FUNC and CTRL key press preceding any keyboard key corresponds to the CTRL + key press on the PC. Ex.: FUNC - CTRL - F8 corresponds to CTRL - F8 on a PC.
N
SHIFT
The SHIFT key press preceding any keyboard key enables the character positioned on the left upper corner of the key. Ex: SHIFT - 5 corresponds to the % character.
13
Page 32
3
VIPER-NET™
FUNC
NOTE
M
FUNC
The FUNC key press preceding any keyboard key enables the character positioned on the left upper part above the key. Ex: FUNC - 5 corresponds to the \ character.
The Alpha key press enters a special mode through which
CAPSLK
Alpha
it is possible to digit all the alphabetic characters positioned above the keys. To exit the Alpha mode and return to the keyboard normal functioning it is necessary to press the Alpha key again.
CAPSLK
M
Alpha
The FUNC key and Alpha key pressed in the stated sequence when not in Alpha mode switch the case of the characters positioned above the keys. To use the alphabetic characters it is necessary to enter the alpha mode.
Once the Alpha mode has been entered, press the Alpha key again to exit this mode. Otherwise, it will not be possible to use other keyboard functions.
14
Page 33
USE AND FUNCTIONING
f

3.5 DESCRIPTION OF THE KEYS (48-KEY MODELS)

This version of the Viper-NET™ terminal provides a keyboard having a total of 48 keys.
3
The keyboard can be divided as follows:

System control and power keys

General and special keys
3.5.1
System Control and Power Keys
On/Of
LIGHT
By pressing this key and the terminal trigger simultaneously, a system software reset is performed.
By pressing these keys and the terminal trigger simultaneously, a system hardware reset is performed.
Powers the terminal ON or OFF
Switch on/off the display backlight.
15
Page 34
3
V
_
=
-
|
\:;
/.,
YXW
R
K
F8
F1 F6 F5
R
$
(
T
A
)
A
VIPER-NET™
3.5.2 Key Selection
The following image shows the alphabetic, numeric and special keys provided on the keyboard:
[
IJ
SCRLK
PRTSC
OP
><
U
FUNC
&
BREAK
ESC
TAB
S P
C E
CAPSLK
A
SCROLL
EFGH
+
]
LMN
Q
F7
*
7
F4
89
%
^
4
F2
!
#
12@3
F10
SHIFT
0
Some of these keys carry extra symbols and are logically divided in up to 3 sections according to the following figure:
B
A
F7
&
7
B
~
F9
65
F3
LT
CD
ST
?
Z
INS
CTRL
DEL
BKSPC
STA
E N T E
C
16
Page 35
USE AND FUNCTIONING
3
Each section corresponds to a symbol that can be obtained using the corresponding keyboard method according to the following scheme:
A) function of the numeric key when preceded by a SHIFT key press; if
pressing an alphabetic key after the SHIFT key, it switches between lower
and upper case characters; B) function of the key when preceded by a FUNC key press; C) function of the key when directly pressed.

3.5.3 Special Key Sequences

SCROLL
FUNC
E
This sequence locks the arrow keys so that they are always active to "scroll" through display selections. Pressing this sequence again returns the arrow keys to their normal function (singularly selectable with FUNC).
ALT
The ALT key press preceding any keyboard key or key sequence takes the same effect as on a standard PC. Ex.: ALT - FUNC - 8 corresponds to ALT - F8 on a PC.
INS
CTRL
CAPSLK
SHIFT
The CTRL key press preceding any keyboard key or key sequence takes the same effect as on a standard PC. Ex: CTRL - J corresponds to CTRL - J on a PC.
On the Viper-NET™, the [SHIFT] key corresponds to the PC one. By pressing it with
alphabetic keys it allows switching between upper and lower case characters. If the SHFT key precedes another numeric key, it selects the character positioned on the left upper corner of the key. Ex: SHIFT - A corresponds to SHIFT - A on a PC. SHIFT - 3 corresponds to #.
FUNC
The FUNC key press preceding any keyboard key enables the character displayed above each key. By pressing it with numeric keys it selects the F1-F10 function. Ex: FUNC - J corresponds to ].
FUNC
CAPSLK
SHIFT
If you want to toggle the keyboard case for all the subsequent letters, use the FUNC - SHIFT sequence. The FUNC - SHIFT sequence has no effect on numeric keys.
17
Page 36
3
VIPER-NET™
3.6 STATUS INDICATORS
3.6.1 LED Status
The Viper-NET™ provides three different LEDs signaling the terminal status.

LED STATUS

Charging status
(right side)
Green pulse it goes on for a few seconds when the
external supply or the battery supply has been recognized.
Green blinking it blinks during slow charge.
Green constant it is constant once the charging process
has been completed.
Red constant it is constant while charging.
Green/Red they turn on alternatively while
discharging.
Orange blinking it blinks when a charging error has
occurred.
Battery Low
Keyboard Status
(left-side)
Good Read
(top)
* This LED is available to the application program.
18
Red blinking
Green constant*
Green flashing it flashes as soon as a code has been
it blinks when the battery is running down.
it is constant when Alpha mode is selected (numeric models only).
read. The number and duration of flashes is configurable through the barcode setup applet in the control panel.
Page 37
USE AND FUNCTIONING
3
3.6.2 Status Bar
The Status Bar provides information about the time, the battery level, and the decoding status.
ICONS DESCRIPTION
Time and Battery Icons
Decoding Status Icons
It shows the time
They are representative of five different icons indicating the battery level. The icon is green, yellow, or red colored according to the power left (green when 41%, yellow between 40% and 21%. red when ≤20%).
It shows the battery is charging
It shows the decoder is active
It shows the decoder is not active

Status Bar

19
Page 38
3
VIPER-NET™

3.7 DATA CAPTURE CONFIGURATION

From the Taskbar, tap the "Data Capture" icon to open a drop–down menu. Data Capture can also be accessed from the Control Panel.
By selecting the Info item from this drop-down menu you can access information about the Scanner and the Software; the Configure item opens the configuration applet (Data Capture Configuration Window), while Capture accesses the data capture applet (Data Capture Window) which enables code reading. The last menu item (Wedge) enables Wedge Emulation.
3.7.1 Configure
The Configuration applet contains the barcode scanning configuration parameters in a directory tree structure. The available barcode parameters are divided into two groups: Reader Parameters and Scan Parameters.
The Reader Parameters depend on the type of scanner module installed on the terminal and allow barcode configuration (i.e. enable/disable Code 39, check digit control, etc.).
The Scan Parameters are common to all scanner modules and allow control of the scanning device (i.e. beeper control, LED control, laser timeout, etc.).
Each Data Capture screen window corresponds to a branch of the tree, and the name of the current branch is displayed at the bottom of each screen window.
20
Page 39
USE AND FUNCTIONING
3
Data Capture Configuration Window
The screen format shows two columns where the left column indicates branches or parameters. Branches have three dots in the right column (...). You can navigate through the tree structure using the stylus or keyboard arrows directly on the item field or from the menu.
Parameters have their corresponding current values in the right column. You can edit parameter values using the stylus or keyboard arrows directly on the item field or from the menu. To change a value for example, select the line of the value to be changed, choose Edit from the Parameter Menu then choose a new value from the values listed in the box (see following figures).
Selecting Data Capture Setup Parameters
21
Page 40
3
VIPER-NET™
Alternatively using the stylus, you can tap once directly on the value on the right column, continue tapping until the desired value is reached.
To activate a new configuration select the File ->Save Menu to send the new configuration to the barcode decoding software and save the new configuration. This will save the configuration to non-volatile memory preventing loss at the next system reset.
Reader Parameters
The barcode reading parameters and values are dependent upon the type of scanner module mounted in your terminal. For a detailed list of parameters and of their configuration procedures, please refer to the SDK Help file on the CD.
Scan Parameters
The Scan Parameters are common to all scanner modules and allow control of the scanning device. The Scan parameters are described as follows:
Scan Timeout: the maximum time, in milliseconds, during which the scanner remains on without decoding any barcode.
Beep Duration: the time interval, in milliseconds, during which the beeper will sound when the scanner reads a code. To disable the beeper, set this value to 0.
Beep Frequency: determines the frequency in Hertz of the beeper.
Continuous Mode: when enabled, the scanner can only be turned off by releasing
the SCAN key, or if Soft Trigger is enabled, by the application program. Continuous Mode overrides Scan Timeout.
Keyboard Emulation: if enabled all scanned data are transformed into keyboard events and can therefore be displayed and saved to a file as if input from the terminal keyboard.
Soft Trigger: when enabled, the laser can be turned on/off by the application software.
Scan Always On: enables the scanner for barcode reading independently from the application software.
22
Page 41
USE AND FUNCTIONING
3
Default Settings
The following tables contain the default values for the major barcode setup parameters, according to the type of scan engine mounted on the terminal. For a complete list of parameters and of their configuration procedures, please refer to the SDK Help file on the CD.
SCAN PARAMETERS HP XLR
Scan Timeout 5000 5000 Beep Duration 20 20 Beep Frequency 2000 2000 LED Duration 0 0 LED Pulses 0 0 Continuous Mode Disabled Disabled Keyboard Emulation Disabled Disabled Soft Trigger Enabled Enabled Scan Always On Disabled Disabled
GENERAL READER PARAMETERS HP XLR
Barcode Symbology Identifier None None Aim Mode Timed Hold Timed Hold Aim Duration 0 0
SYMBOLOGY SPECIFIC READER PARAMETERS
UPC A UPC E UPC E1 EAN 8 EAN 13 EAN Bookland Code 39 Code 39 Full ASCII Code 32 Code 39 Trioptic 2/5: Interleaved 2/5: Industrial 2/5: Matrix Code 128 EAN 128 ISBT 128
Enabled Enabled Enabled Enabled Disabled Enabled Enabled Enabled Enabled Disabled Enabled Enabled Disabled Disabled Disabled Disabled Disabled Enabled Enabled Disabled Disabled Disabled Enabled Enabled Enabled Enabled Disabled
HP XLR
23
Page 42
3
VIPER-NET™
SYMBOLOGY SPECIFIC READER PARAMETERS
HP XLR
Codabar MSI Plessey Code 93 Code 11
Enabled Disabled Enabled Disabled Disabled Disabled Disabled Disabled
3.7.2 Capture
The Data Capture applet (Capture) enables code reading.
24
Data Capture Window
Page 43
USE AND FUNCTIONING
3
Data Capture can also be enabled through the Configuration applet by selecting File
->Scanner from the main menu, or by enabling the parameter Scan Always On in the Scan Parameters branch.
Enabling the Data Capture
3.8 CONTROL PANEL
The main window of the Windows CE .NET control panel is shown below as it appears on the terminal when launched from Start ->Settings ->Control Panel; APPLET programs are displayed on the desktop as icons; one icon corresponds to each APPLET.

Control Panel

25
Page 44
3
VIPER-NET™
3.8.1 Registry
The REGISTRY ADMIN applet provides management of Windows CE .NET registry.
Select the REGISTRY ADMIN applet by double tapping the Registry Admin icon.
The Registry Administration Main window appears. Two functions are available:
- Save Registry allows permanently saving the Windows configuration (example: custom configuration of screen desktop background color, or network adapter configuration) to non-volatile memory (SAVE button)
- Restore Default Registry allows restoring the initial factory default configuration (Restore Default button). After restoring the factory default configuration, you must perform a software reset (see par. 3.4.1 or 3.5.1)
Saving the registry to non-volatile memory guarantees the persistence of the Windows configuration in case of battery replacement.
26
Registry Administration Window
Page 45
USE AND FUNCTIONING
3
3.8.2 Files Admin
The FILES ADMIN applet enables control of the permanence of files in the System Folder. Two functions are available on the Files Admin Main window by means of two buttons:
Files Admin Main Window
Save Session: with this button all files will be permanently saved in the \Windows
directory in non-volatile memory. This function guarantees the steady maintenance of every file produced during the current working session - even of sub-directories and relevant files - with the exception of the files belonging to the FLASH image. These current working session files will be backed-up in the \Backup\Windows directory. At the next hardware reset, the files previously saved in the \Backup\Windows directory will be restored to the Windows directory (see BACKUP DIRECTORY FILE MANAGEMENT 3.10).
Safe Setup: with this button, the installation of software programs will be saved to non-volatile memory (Backup directory). Before doing this, it will be checked that the Backup directory has enough space to save the files. If the directory space is not enough, an error message will be shown and the program will exit the Safe Setup function.
Two activating procedures are available:
- Select an installation file (for example, a .CAB cabinet file) from the Safe Setup
mask.
27
Page 46
3
VIPER-NET™
Safe Setup First Mask
Then select \Windows or a relevant sub-directory in the path box. Then, Safe Setup will recognize the new files and directories present in the \Windows directory, and will copy them to the \Backup\Windows directory. At the next hardware reset, these files will be restored (see BACKUP DIRECTORY FILE MANAGEMENT 3.10).
- Simply skip the first mask. When it closes, a new mask will pop up: it will enable any
type of installation (even remote ones like ActiveSync
®
installations). Make sure the installation directory is \Windows or one of its sub-directories. After installation, tap OK: Safe Setup will save the new files in the \Backup\Windows directory.
28
Safe Setup Second Mask
Page 47
USE AND FUNCTIONING
3
3.8.3 Wireless Communications
The WIRELESS COMMUNICATIONS applet provides management of the Bluetooth module and of the Wi-Fi Card.
®
Select the WIRELESS COMMUNICATIONS applet by double tapping the Wireless Communications icon. The following window will appear:
Wireless Communications Window
29
Page 48
3
VIPER-NET™

3.8.4 Bluetooth® Manager Device Setup

In order to enable a Bluetooth terminal you must perform the discovery procedure and enable the device as follows:
1. Place the Bluetooth
®
meters).
®
device for communication with the Viper-NET™
device within the range of the Viper-NET™ terminal (10
2. From the Viper-NET™ Control Panel, select and run the Bluetooth
®
Device
Properties applet.
3. Run the Discovery procedure: "Scan Device". The following window will appear:
30
Page 49
USE AND FUNCTIONING
4. Select the discovered device and check "Trusted" in the menu.
3
5. Activate the trusted device by checking "Active".
®
6. Close the Bluetooth
Manager by selecting OK.
31
Page 50
3
VIPER-NET™
3.9 WINDOWS CONNECTIONS
From the Desktop, double tap on the "Connection" folder to open the following window:

Windows Connections

3.9.1 Microsoft® ActiveSync®
Microsoft your Viper-NET™ Terminal and synchronize the information on them. Synchronization compares the data on the Viper-NET™ Terminal with that on the desktop computer and updates both computers with the most recent information.
With ActiveSync
- Back up and restore Viper-NET™ Terminal data.
- Copy files between Viper-NET™ Terminal and desktop computer.
- Synchronize files by selecting a synchronization mode.
It is possible to constantly synchronize while connected to a desktop computer or, alternatively, synchronization can be performed only when the synchronize command is chosen. You can select which information types are synchronized and control how much data is synchronized.
®
ActiveSync® gives you the possibility to connect your desktop computer to
®
, it is possible to:
NOTE
32
By default, ActiveSync® does not automatically synchronize all types of information. Use ActiveSync and off for specific information types.
®
options to turn synchronization on
Page 51
USE AND FUNCTIONING
3
For example: Synchronize Microsoft Word and Microsoft Excel files between the Viper-NET™ Terminal and the desktop computer. The files will automatically be converted to the correct format.
You can establish a connection by Serial cable, by USB cable or by network. Moreover, if you have a Viper-NET™ Cradle you can connect your Viper-NET™ Terminal putting it into the cradle and connecting via Infrared using Serial cradle cable or USB cradle cable.
Visit the following Microsoft Web site for the latest in updates, technical information, and samples:
NOTE
http://www.microsoft.com/windowsmobile/resources/downloads
ActiveSync® Remote
After a Partnership between terminal and desktop computer is established, it is also possible to establish a remote connection via Wireless LAN: disconnect the actual connection via ActiveSync the taskbar and press Disconnect, then go to the \Windows\Desktop\Connection folder and double tap the ActiveSync
®
by double tapping the ActiveSync® connection icon on
®
remote icon. In the dialog box that will appear it will be possible to choose a method to connect to the desktop computer. Choose Network Connection and press the Connect button:
To set up your network connection you have to correctly set up your wireless connection. These settings depend on the wireless card that you have installed on your Viper-NET™ Terminal and on your
NOTE
wireless network settings. For more information about these settings contact your network administrator.

3.9.2 Remote Desktop Connection

The establishment of a terminal connection with a Windows Server can be obtained by double tapping the Terminal Client in the \Window\Desktop\Remote Desktop Connection folder. This type of connection makes it possible to see one's own desktop computer on the terminal screen, as well as to work as if one were at a desktop computer screen.
33
Page 52
3
VIPER-NET™
3.10 BACKUP DIRECTORY FILE MANAGEMENT
All of the Windows CE .NET system files reside in RAM (volatile memory) except for the Backup directory, which resides in FLASH (non-volatile memory). Therefore the contents of the Backup directory are persistent even if the terminal is re-booted or the battery is changed.
You can save your more important files that you don't want to lose due to terminal re­boot, in the Backup directory or create a sub-directory within Backup.
Even though the Windows Directory resides in RAM, it often contains files or sub­directories created by the user or by installation programs that you don't want to lose at re-boot. To keep these files persistent it is necessary to copy them to the directory \Backup\Windows. This directory doesn't exist originally (only Backup exists), and therefore it must be created. At the next hardware reset, before activating the shell, Windows CE .NET will copy the contents including all sub-directories of \Backup\Windows to \Windows.
Likewise, to maintain files that must be run at Windows CE .NET startup, (i.e. .exe, .lnk, .vb, .htm, etc.), it is necessary to copy them to the directory \Backup\Startup. This directory does not exist originally (only Backup exists), and therefore it must be created. The application programs will be run after any type of re-boot (both software and hardware reset).
As an alternative to the Safe Setup function, it is possible to copy the .cab files to the directory \Backup\Cabfiles (the Cabfiles sub-directory doesn't exists originally and must therefore be created) and perform a terminal cold boot to have the application installed. Once these files are copied to the directory \Backup\Cabfiles, the application will be run after each re-boot.
From the second cold boot on, a message may be displayed such as "<application name> is already installed. Re-install?". This message blocks the boot process. Press the [Enter] key to continue the system initialization.
34
Page 53

MAINTENANCE

4
4 MAINTENANCE
Rechargeable battery packs are not initially charged. Therefore the first operation to perform is to charge them. See par. 4.1.
NOTE

4.1 CHARGING THE BATTERIES

The battery autonomy varies according to factors, such as the frequency of barcode scanning, RF usage, etc.
When the batteries are low, the red LED positioned beneath the left lower corner of the display blinks and a warning acoustic signal is emitted.
It is possible to recharge the batteries by using the FPS18 external power supply directly connected to either CAB-405 (for RS232 connection) or CAB-406 (for USB connection), see par. 2.1.1. Alternatively, it is also possible to recharge the batteries by using the CC9600 cradle.
The charging process is signaled by a bi-colored charging status LED positioned beneath the right lower corner of the display (see par. 3.6.1).
If the battery pack is removed from the terminal, it can be recharged by inserting it into the MBC9600 multi-slot battery charger.
If the batteries are new or have not been recharged for a long time, it is necessary to perform two or three charging and discharging cycles (complete use) before they can reach their maximum charge capability.
CAUTION
The maximum time required to recharge a completely run-down battery pack is about 5 hours for Li-Ion batteries.
35
Page 54
4

4.2 REPLACING THE BATTERIES

To correctly replace the batteries, proceed as follows.
1- Turn off the Viper-NET™ terminal.
2- Press the lock button as indicated in the figure below:
VIPER-NET™
3- Remove the battery pack by pulling down the lower part of the handle:
36
Page 55
MAINTENANCE
4
4- Replace the battery pack, insert and press it back into the handle until the lock
button is automatically closed:
Risk of explosion if the battery is replaced by an incorrect type. Dispose of the old batteries as required by the relevant
CAUTION
laws in force.
In order to guarantee an adequate operating autonomy, when replacing the battery pack the terminal checks the battery energy level. If the battery is not sufficiently charged, Viper-NET™ does not turn on (when pressing the ON button).
NOTE
In this case, either substitute the battery pack with a charged one (sufficiently charged) or insert Viper-NET™ into a powered cradle or plug it into the direct power supply.

4.3 CLEANING THE TERMINAL

Periodically clean the Viper-NET™ terminal with a slightly dampened cloth. Do not use alcohol, corrosive products or solvents.
37
Page 56
5
VIPER-NET™
5 TECHNICAL FEATURES
5.1 TECHNICAL DATA
Optical Features
Maximum resolution 0.13 mm / 5 mils 0.19 mm / 7.5 mils Skew angle ± 55 ° ± 60° Pitch angle ± 65° ± 65° Scan rate 35 ± 5 scan/sec 33.8 – 45.4 scan/sec Depth of field See reading diagrams on the next page Light source laser scanner VLD, wavelength 630~680 nm Safety class Class II EN 60825-1/CDHR
Electrical Features
Power DC supply 14 V ± 5% Battery pack 2 cell Li-Ion 2000 mAh@ 7.2 V (nominal) Internal backup battery Rechargeable Li-Ion 30mAh Hardware Features FLASH 32 MB RAM 64 MB Microprocessor Intel XScale PXA 255 400 MHz Buzzer 2 piezoelectric buzzers
LED
Display 64K Color TFT LCD with 320 x 240 pixel resolution,
Keyboard
Mechanical Features Dimensions (LxWxH) 23.5 x 10.5 x 18 cm / 9.25 x 4.13 x 7.08 in Weight 808 g / 28.5 oz (with Li-Ion)
Viper-NET™ XXX-1XX
HP
Keyboard Status/Battery low (two-color LED) Charging Status (two-color LED) User Programmable (green LED)
with LED backlight and touch screen 32 silicone-covered rubber keys 48 silicone-covered rubber keys
835 g / 29.5 oz (with Li-Ion and PC card)
Viper-NET™ XXX-6XX
XLR
38
Page 57
TECHNICAL FEATURES
5
Environmental Features
Working temperature -10° to + 50 °C / 14° to 122 °F Storage temperature -20° to +70 °C / -4° to 158 °F Humidity 90% non condensing <= 40 °C Protection IP64 ESD protection 4 KV contact discharge, 8 KV air discharge Drop resistance 1.8 m / 5.9 ft
Programming Features
Operating system Windows CE .NET 4.2 Decoded barcodes EAN/UPC; Code 39; 2/5 Codes; Plessey;
Codabar; Code 128; MSI; Code 93; Code 11,
Communication Features Windows CE .NET COM Port
Optical interface IrDA 1.0 COM4 Serial interface RS232
USB 1.1
COM1 COM6
Wireless Features
WLAN IEEE 802.11b DSSS Wi-Fi WPAN IEEE 802.15 Bluetooth® (Class 2) Version 1.1
5.2 READING DIAGRAMS
Viper-NET™ XXX-1XX HP
300
200
100
0.13 mm (
5 mils
Reading Zones (10° skew angle)
0.50 mm (
)
20 mils
0.38 mm (
)
0.25 mm (
10 mils
0.19 mm
(
)
7.5 mils
)
15 mils
)
1.00 mm (
40 mils
)
0
100
200
300 mm
100 200 400
EAN
0.33 mm
(
)
13 mils
300 500
600
700 800 mm
39
Page 58
5
VIPER-NET™
Viper-NET™ XXX-6XX
120
120
60
40
20
20
40
60
cm
Reading Zones (10° skew angle)
0.50 mm (20 mils)
0
1 mm
(40 mils)
20
60
100
140 180
220
260
300 340
380 cm
40
Page 59

TEST CODES

ÌtestwÎ
6 TEST CODES
0.25 mm (10 mils)
Code 39
High Density Codes
6
17162
2/5 Interleaved
Code 128
EAN 13
0123456784
test
80%
x(0B2DE5*KKKKLM(
80%
EAN 8
(6450*TRMN(
41
Page 60
6
ÌtestwÎ
DATALOGIC JET™
0.38 mm (15 mils)
Code 39
Interleaved 2/5
Code 128
17162
0123456784
test
100%
Medium Density Codes
EAN 13
EAN 8
42
x(0B2DE5*KKKKLM(
100%
(6450*TRMN(
Page 61
TEST CODES
ÌtestwÎ
6
0.50 mm (20 mils)
Code 39
Interleaved 2/5
Code 128
17162
0123456784
test
120%
Low Density Codes
EAN 13
EAN 8
x(0B2DE5*KKKKLM(
120%
(6450*TRMN(
43
Page 62

GLOSSARY

Access Point
A device that provides transparent access between Ethernet wired networks and IEEE 802.11 interoperable radio-equipped mobile units. Hand-held terminals, or other devices equipped with radio cards, communicate with wired networks using Access Points (AP). The mobile unit (terminal), may roam among the APs in the same subnet while maintaining a continuous, seamless connection to the wired network.
Barcode
A pattern of variable-width bars and spaces which represents numeric or alphanumeric data in binary form. The general format of a barcode symbol consists of a leading margin, start character, data or message character, check character (if any), stop character, and trailing margin. Within this framework, each recognizable symbology uses its own unique format.
Baud Rate
A measure for data transmission speed.
Bit
Binary digit. One bit is the basic unit of binary information. Generally, eight consecutive bits compose one byte of data. The pattern of 0 and 1 values within the byte determines its meaning.
Bits per Second (bps)
Number of bits transmitted or received per second.
Bluetooth®
A standard radio technology using a proprietary protocol.
Byte
On an addressable boundary, eight adjacent binary digits (0 and 1) combined in a pattern to represent a specific character or numeric value. Bits are numbered from the right, 0 through 7, with bit 0 the low-order bit. One byte in memory can be used to store one ASCII character.
Decode
To recognize a bar code symbology (e.g., Codabar, Code 128, Code 3 of 9, UPC/EAN, etc.) and analyze the content of the bar code scanned.
44
Page 63
EEPROM
Electrically Erasable Programmable Read-Only Memory. An on-board non-volatile memory chip.
Flash Disk
Non-volatile memory for storing application and configuration files.
Host
A computer that serves other terminals in a network, providing services such as network control, database access, special programs, supervisory programs, or programming languages.
Liquid Crystal Display (LCD)
A display that uses liquid crystal sealed between two glass plates. The crystals are excited by precise electrical charges, causing them to reflect light outside according to their bias. They use little electricity and react relatively quickly. They require external light to reflect their information to the user.
Light Emitting Diode (LED)
A low power electronic light source commonly used as an indicator light. It uses less power than an incandescent light bulb but more than a Liquid Crystal Display (LCD).
RAM
Random Access Memory. Data in RAM can be accessed in random order, and quickly written and read.
RF
Radio Frequency.
RTC Real Time Clock.
Terminal
A Datalogic portable computer product.
45
Page 64

INDEX

A
Accessories; 3
B
Backup Directory File Management;
34 Barcode Scanning; 10 Bluetooth®; 1
C
Connection Cables
RS232 Direct Connection; 7
USB Direct Connection; 7 Connections; 4
Connection Cables; 7
RS232/USB Direct Connection; 4
WLAN Connection; 5 Control Panel; 25
Files Admin; 27
Registry; 26
D
Data Capture Configuration; 20 Default Settings; 23
E
End User License Agreement; v
G
General View; xvi Glossary; 44
K
Key Selection (32-key Models); 12 Key Selection (48-key Models; 16
L
LED Status; 18
M
Maintenance; 35
Charging the Batteries; 35 Cleaning the Terminal; 37 Replacing the Batteries; 36
Microsoft® ActiveSync®
Remote; 33
P
Package Contents; 2
R
Reader Parameters; 22 Reading Diagrams; 39 References; vii
Conventions; vii Reference Documentation; vii SErvices and Support; vii
RemoteDesktopConnection; 33
S
Safe Setup; 27 Safety Regulations; viii
Laser Safety; ix
Radio Compliance; xiii Save Session; 27 Scan Parameters; 22 Special Key Sequences (32-key
Models); 13 Special Key Sequences (48-key
Models); 17 Status Bar; 19 System Control and Power Keys (32-
key Models); 11 System Control and Power Keys (48-
key Models); 15
46
Page 65
T
Technical Features; 38 Terminal Startup; 8 Test Codes; 41
U
Using the Stylus; 9
V
Viper-NET™ 32-Key Model; 11 Viper-NET™ 48-Key Model; 15 Viper-NET™ Terminal Description; 1
47
Page 66
DATALOGIC S.p.A., DATALOGIC S.p.A.,
Via Candini, 2 Via Candini, 2
40012 - Lippo di Calderara 40012 - Lippo di Calderara
Bologna - Italy Bologna - Italy
dichiara che dichiara che declares that the declares that the déclare que le déclare que le bescheinigt, daß das Gerät bescheinigt, daß das Gerät declare que el declare que el
Viper-NET™ XXX-XXX Pistol Grip Terminal e tutti i suoi modelli Viper-NET™ XXX-XXX Pistol Grip Terminal e tutti i suoi modelli and all its models and all its models et tous ses modèles et tous ses modèles und seine modelle und seine modelle y todos sus modelos y todos sus modelos
sono conformi alla Direttiva del Consiglio Europeo sottoelencata: sono conformi alla Direttiva del Consiglio Europeo sottoelencata: are in conformity with the requirements of the European Council Directive listed below: are in conformity with the requirements of the European Council Directive listed below: sont conformes aux spécifications de la Directive de l'Union Européenne ci-dessous: sont conformes aux spécifications de la Directive de l'Union Européenne ci-dessous: der nachstehenden angeführten Direktive des Europäischen Rats entsprechen: der nachstehenden angeführten Direktive des Europäischen Rats entsprechen: cumple con los requisitos de la Directiva del Consejo Europeo, según la lista siguiente: cumple con los requisitos de la Directiva del Consejo Europeo, según la lista siguiente:
Questa dichiarazione è basata sulla conformità dei prodotti alle norme seguenti: Questa dichiarazione è basata sulla conformità dei prodotti alle norme seguenti: This declaration is based upon compliance of the products to the following standards: This declaration is based upon compliance of the products to the following standards: Cette déclaration repose sur la conformité des produits aux normes suivantes: Cette déclaration repose sur la conformité des produits aux normes suivantes: Diese Erklärung basiert darauf, daß das Produkt den folgenden Normen entspricht: Diese Erklärung basiert darauf, daß das Produkt den folgenden Normen entspricht: Esta declaración se basa en el cumplimiento de los productos con las siguientes normas: Esta declaración se basa en el cumplimiento de los productos con las siguientes normas:
ETSI EN 301 489-17, August 2002: E
ETSI EN 301 489-17, August 2002: E
EN 60950-1, December 2001: In
EN 60950-1, December 2001: In
EN 300 328-2, December 2001: E
EN 300 328-2, December 2001: E
Lippo di Calderara, 08/02/2005 Lippo di Calderara, 08/02/2005 Ruggero Cacioppo Quality Assurance Laboratory Manager
LECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM);
LECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); LECTROMAGNETIC COMPATIBILTY (EMC) STANDARD FOR RADIO EQUIPMENT
LECTROMAGNETIC COMPATIBILTY (EMC) STANDARD FOR RADIO EQUIPMENT
E
E
AND SERVICES
AND SERVICES TRANSMISSION SYSTEM AND
TRANSMISSION SYSTEM AND
FORMATION TECHNOLOGY EQUIPMENT – SAFETY – PART 1: GENERAL
FORMATION TECHNOLOGY EQUIPMENT – SAFETY – PART 1: GENERAL
REQUIREMENTS
REQUIREMENTS
LECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM);
LECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM);
W
W
OPERATING IN THE
OPERATING IN THE MODULATION TECHNIQUES
MODULATION TECHNIQUES REQUIREMENTS UNDER
REQUIREMENTS UNDER
1999/5/EEC R&TTE 1999/5/EEC R&TTE
; PART 17: SPECIFIC CONDITIONS FOR 2.4 GHZ WIDEBAND
; PART 17: SPECIFIC CONDITIONS FOR 2.4 GHZ WIDEBAND
IDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT
IDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT
5 GHZ HIGH PERFORMANCE RLAN EQUIPEMENT
5 GHZ HIGH PERFORMANCE RLAN EQUIPEMENT
2.4 GHZ ISM BAND AND USING SPREAD SPECTRUM
2.4 GHZ ISM BAND AND USING SPREAD SPECTRUM ; PART 2: HARMONIZED EN COVERING ESSENTIAL
; PART 2: HARMONIZED EN COVERING ESSENTIAL
ARTICLE 3.2 OF THE R & TTE DIRECTIVE
ARTICLE 3.2 OF THE R & TTE DIRECTIVE
05
Loading...