No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means,
without permission in writing from Motorola. This includes electronic or mechanical means, such as
photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to
change without notice.
The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on
a licensed basis. Motorola grants to the user a non-transferable and non-exclusive license to use each
software or firmware program delivered hereunder (licensed program). Except as noted below, such license
may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of
Motorola. No right to copy a licensed program in whole or in part is granted, except as permitted under
copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with
other program material, create a derivative work from a licensed program, or use a licensed program in a
network without written permission from Motorola. The user agrees to maintain Motorola’s copyright notice on
the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in
whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed
program delivered to the user or any portion thereof.
Motorola reserves the right to make changes to any software or product to improve reliability, function, or
design.
Motorola does not assume any product liability arising out of, or in connection with, the application or use of
any product, circuit, or application described herein.
No license is granted, either expressly or by implication, estoppel, or otherwise under any Motorola, Inc.,
intellectual property rights. An implied license only exists for equipment, circuits, and subsystems contained in
Motorola products.
MOTOROLA and the Stylized M Logo and Symbol and the Symbol logo are registered in the US Patent &
Trademark Office. Bluetooth is a registered trademark of Bluetooth SIG. Microsoft, Windows and ActiveSync
are either registered trademarks or trademarks of Microsoft Corporation. All other product or service names
are the property of their respective owners.
Motorola, Inc.
One Motorola Plaza
Holtsville, New York 11742-1300
http://www.motorola.com
Patents
This product is covered by one or more of the patents listed on the web site: www.symbol.com/patents
Page 5
Revision History
Changes to the original manual are listed below:
ChangeDateDescription
-01 Rev A10/2006Initial Release
-02 Rev A1/2008Added External Antenna
iii
Software Update Version 1.1
Updated Chapter 5, Wireless Applications
Added new Demo Application in Chapter 7
Replaced Chapter 8, Bluetooth Setup
Page 6
ivRD5000 RFID Integrator Guide
Page 7
Table of Contents
Patents.................................................................................................................................................. ii
Revision History.................................................................................................................................... iii
About This Guide
Introduction ........................................................................................................................................... xiii
Documentation Set ......................................................................................................................... xiii
Configurations....................................................................................................................................... xiv
Chapter Descriptions ............................................................................................................................ xv
Notational Conventions......................................................................................................................... xv
Related Documents and Software ........................................................................................................ xvi
Service Information............................................................................................................................... xvi
Support Information ........................................................................................................................ xvi
Getting Started ..................................................................................................................................... 1-4
Installing and Removing the Battery .................................................................................................... 1-5
Installing the Battery ...................................................................................................................... 1-5
Removing/Replacing the Main Battery ........................................................................................... 1-6
Charging the Battery ............................................................................................................................ 1-7
Charging the Main Battery and Memory Backup Battery ............................................................... 1-7
Charging the Battery ...................................................................................................................... 1-7
Serial Communications .................................................................................................................. 1-8
Connect a USB Cable .......................................................................................................................... 1-10
Connect an External Antenna .............................................................................................................. 1-11
Starting the Reader .............................................................................................................................. 1-13
Power Supply ....................................................................................................................................... 3-2
Profile ID ........................................................................................................................................ 5-5
Using RFIDDemo to Read Tags From a Remote Reader ............................................................. 7-3
Using RFIDDemo to Forward/Log Tags to Remote Device ........................................................... 7-4
Launching the RFIDDemo Application ................................................................................................. 7-5
File Menu Options .......................................................................................................................... 7-6
About .............................................................................................................................................. 7-6
Bluetooth Profiles ................................................................................................................................. 8-5
Serial Port Services ....................................................................................................................... 8-20
Personal Area Network Services ................................................................................................... 8-20
Page 13
Table of Contentsxi
Bluetooth Settings ................................................................................................................................ 8-21
Device Info Tab .............................................................................................................................. 8-21
API Calls .............................................................................................................................................. B-1
Possible Extensions ............................................................................................................................. B-2
This guide provides information about setting up and configuring RD5000 RFID reader and accessories.
NOTEScreens and windows pictured in this guide are samples and may differ from actual screens.
Documentation Set
The documentation set for the RD5000 RFID reader is divided into guides that provide information for specific user
needs.
•
Microsoft Application Guide - describes how to use Microsoft developed applications.
•
Symbol Application Guide - describes how to use Motorola developed applications.
•
RD5000 Quick Reference Guide (QRG) - describes how to use the RD5000 RFID reader and provides the
regulatory information.
•
RD5000 Integrator Guide - describes how to set up the RD5000 RFID reader and the accessories.
•
SMDK Help File - provides API information for writing applications.
Page 16
xivRD5000 RFID Integrator Guide
NOTEThe RD5000 User Guide information is presented in the Quick Start Guide.
Configurations
This guide covers the following configurations:
ConfigurationRadiosMemory
RD5000WLAN: 802.11a/b/g
WPAN: Bluetooth
64 MB RAM
64 MB Flash
Data
Capture
RFID
Operating
System
Windows
CE 5.0
Other
Page 17
Chapter Descriptions
Topics covered in this guide are as follows:
•
Chapter 1, Getting Started, provides information on charging the RFID reader battery and resetting.
•
Chapter 2, Installation, provides information on installing and setting up the reader.
•
Chapter 3, Accessories, describes the accessories available for the RFID reader and how to set up power
connections and battery charging capabilities, where applicable.
•
Chapter 4, ActiveSync, provides instructions on installing ActiveSync and setting up a partnership between
the RFID reader and a host computer.
•
Chapter 5, Wireless Applications, provides instructions using and configuring the reader on a wireless
network.
•
Chapter 6, Application Deployment for WinCE 5.0, describes the application deployment for WinCE 5.0.
•
Chapter 7, RFID Applications, describes RFID applications, and procedures for deploying applications.
•
Chapter 8, Bluetooth Setup, describes Bluetooth setup procedures and features.
About This Guidexv
•
Chapter 9, Maintenance & Troubleshooting, includes instructions on cleaning and storing the RFID reader,
and provides troubleshooting solutions for potential problems during RFID reader operation.
•
Chapter A, Technical Specifications, includes the technical specifications for the RFID reader
•
Chapter B, Motion Sensor Parameters, describes the Motion/Proximity sensor setting for the RFID reader.
Notational Conventions
The following conventions are used in this document:
•
“RFID Reader”, “reader” or “mobile computer” refers to the Motorola RD5000 RFID reader.
•
Italics are used to highlight the following:
• Chapters and sections in this guide
• Related documents and links
•
Bold text is used to highlight the following:
• Dialog box, window and screen names
• Drop-down list and list box names
• Check box and radio button names
• Icons on a screen
• Key names on a keypad
• Button names on a screen.
•
Bullets (•) indicate:
• Action items
• Lists of alternatives
• Lists of required steps that are not necessarily sequential.
•
Sequential lists (e.g., those that describe step-by-step procedures) appear as numbered lists.
Page 18
xviRD5000 RFID Integrator Guide
Related Documents and Software
The following documents provide more information about the RD5000 RFID reader.
•
RD5000 Quick Reference Guide, p/n 72-89955-xx
•
RD5000 Integrator Guide, p/n 72-89956-xx
•
Symbol Application Guide for Symbol Devices, p/n 72E-68901-xx
•
Microsoft Applications for Mobile and WinCE 5.0 User Guide, p/n 72E-78456-xx
•
Symbol Mobility Developer Kit (SMDK) Help File, p/n 72E-38880-03
•
Symbol Mobility Developer Kits, available at: http://support.symbol.com
•
RD5000 RFID Reader DCP Update, available at: http://support.symbol.com.
•
Device Configuration Package and Platform SDK for 9090c50 (for RD5000 with Windows CE 5.0), available
at: http://support.symbol.com.
•
ActiveSync software, available at: http://www.microsoft.com.
For the latest version of this guide and all guides, go to: http://support.symbol.com.
Service Information
If an equipment problem occurs, contact the appropriate regional Support Center for contact information. Before
calling, locate the model number and serial number.
Call the Support Center from a phone near the scanning equipment so that the service person can try to talk
through the problem. If the equipment is found to be working properly and the problem is symbol readability, the
Support Center will request samples of bar codes for analysis at our plant.
If the problem cannot be solved over the phone, the equipment may need to be returned for servicing. If that is
necessary, specific directions will be provided.
NOTEMotorola is not responsible for any damages incurred during shipment if the approved shipping container
is not used. Shipping the units improperly can possibly void the warranty.
Support Information
For service information, warranty information or technical assistance contact or call the Support Center. Contact
information is provided on the Motorola contact web site go to: http://www.support.symbol.com
If the Motorola product was purchased from a Motorola Business Partner, contact that Business Partner for
service.
.
Page 19
Chapter 1 Getting Started
Introduction
This chapter provides an overview of the RD5000 RFID reader, explains how to charge the battery and how to start
the reader.
Figure 1-1 on page 1-2 provides the reader parts location and Figure 1-2 on page 1-3 provides the locations of the
reader ports and connectors. Table 1-1 lists the reader ports and connectors.
A list of the accessories is provided in Table 1-2.
Unpacking the Reader
Carefully remove all protective material from around the reader and save the shipping container for later use.
Verify that all equipment was received:
•
RD5000 RFID reader
•
Lithium-ion battery
•
Shock Isolators and mounting hardware
•
QRG (Quick Reference Guide)
Inspect the equipment for damage. If any equipment is missing or if any equipment is damaged, contact the
Symbol Technologies Support Center immediately. See Service Information on page xvi for contact information.
Page 20
1 - 2RD5000 RFID Integrator Guide
Battery
Figure 1-1
RD5000 RFID Reader
Connections and Ports
The RD5000 RFID reader has connections for:
•
Power input (battery charging) and serial communication
•
USB communication
•
External antenna
Door
Door
Latch
Proximity
Sensor
Battery
LED
Power
Button
Error
LED
RFID
Antenna
Page 21
Getting Started1 - 3
Termination
Resistor/Cover
USB Port Cover
LAN Antenna
External Power,
Battery Charging and
Serial Communications
mini-USB Port
External Antenna
Connector
Figure 1-2
Table 1-1
Port/ConnectorsDescription
RD5000 RFID Reader Ports/Connectors and Antenna Locations
RD5000 RFID Reader Ports/Connections
Power/SerialConnection for external power, battery charging and serial communications.
USB Client USB client connection.
External AntennaSupports one external antenna.
Page 22
1 - 4RD5000 RFID Integrator Guide
Accessories
Table 1-2 lists the RD5000 accessories.
Table 1-2
Power SupplyProvides battery charging power and external power.
Spare lithium-ion batteryReplacement battery.
Four Slot Spare Battery ChargerCharges up to four spare batteries.
Universal Battery Charger
Adapter
Charging CableConnects to the power supply to provide battery charging power.
Charging Cable with Serial
Communications
USB Communications CableConnects to the USB mini connector to provide USB communications.
External AntennaProvides a remotely mounted antenna location.
SoftwareSymbol Mobility Developer Kits available at: http://support.symbol.com.
RD5000 Accessories
AccessoryDescription
Adapts the UBC for use with the reader batteries.
Connects to the power supply and the battery charging and serial
communications connector to provide battery charging power. This cable
also has a 9-pin serial connector.
RD5000 RFID Reader DCP Update, available at:
http://support.symbol.com.
Device Configuration Package and Platform SDK for 9090c50 (for
RD5000 with Windows CE 5.0), available at:
http://support.symbol.com.
Getting Started
In order to start using the reader for the first time:
•
Install the main battery
•
Charge the main battery and backup battery
•
Start the reader
•
Configure the reader
The main battery can be charged before or after it is installed. Use one of the spare battery chargers to charge the
main battery (out of the reader) or the Power Supply and Charging cable to charge the main battery installed in the
reader.
Page 23
Installing and Removing the Battery
Installing the Battery
Before using the reader, install the battery into the reader. If the battery was fully charged before installation the unit
is ready to use. If the battery is not charged when it was installed then it must be charged in the unit prior to use.
1.Rotate the door latch (see Figure 1-1 on page 1-2) counterclockwise 1/4 turn to disengage the battery door
latch and open the battery door.
2.Insert the battery into the battery slot as shown in Figure 1-3 on page 1-5. Ensure the battery is fully inserted,
the battery release engages the battery when it is fully inserted.
3.Close the battery door and rotate the door latch clockwise 1/4 turn to engage the battery door latch.
4.If the battery was not fully charged before it was installed, then the battery must be charged before the unit can
be used. To charge the battery proceed to Charging the Battery on page 1-7.
When a charged battery is fully inserted in the reader and the battery door is locked, the reader can be turned on.
Getting Started1 - 5
Battery
Door
Figure 1-3
Battery
Release
Battery
Battery Door
Switch
Installing the Main Battery
Page 24
1 - 6RD5000 RFID Integrator Guide
Removing/Replacing the Main Battery
The main battery may be periodically replaced with a charged battery as an alternative to connecting the unit to the
external battery charger.
Prior to removing the main battery, press the Power button to place the reader in suspend mode (off). The Battery
LED must be off.
1.Rotate the door latch (see Figure 1-1 on page 1-2) counterclockwise 1/4 turn to disengage the battery door
latch and open the battery door.
2.The battery door switch detects the door opening and initiates a battery removal shutdown. Pause 3-4 seconds
while the reader performs battery removal shutdown.
3.Hold the battery release up and pull the battery out.
4.If a replacement battery is being used, insert the battery into the battery slot as shown in Figure 1-3 on page
1-5. Ensure the battery is fully inserted, the battery release engages the battery when it is fully inserted. If no
battery is being inserted the unit can maintain the configuration settings for approximately 1/2 hour (with a fully
charged internal backup battery).
5.Close the battery door and rotate the door latch clockwise 1/4 turn to engage the battery door latch.
Battery
Door
Battery
Battery Door
Switch
Figure 1-4
Removing the Main Battery
NOTE When main battery door is opened and closed or if the battery is replaced, RD5000 RFID reader may not
properly power itself back on. To power up the reader, manually initiate a cold boot (see Performing a
Cold Boot on page 1-16) or momentarily apply external power to initiate a cold boot.
The device recovery method is a cold boot, see Performing a Cold Boot on page 1-16. All user data that
was not stored in persistent memory (\Application and \Platform) will have to be manually restored.
Battery
Release
Page 25
Charging the Battery
Charging the Main Battery and Memory Backup Battery
Before using the reader for the first time, connect the reader to the optional power supply (see Figure 1-5 on page
1-8) and charge the battery until the amber charge indicator light remains lit (see Table 1-3 on page 1-5) for charge
status indications). After the initial charge cycle, charge time is less than four hours.
The reader is equipped with a memory backup battery which automatically charges from the fully-charged main
battery. When the reader is used for the first time, the backup battery requires approximately 15 hours to fully
charge. This is also true any time the backup battery is discharged, which occurs when the main battery is
removed for several hours. The backup battery retains data in memory for at least 30 minutes when the main
battery is removed. When the reader reaches a very low battery state, the combination of main battery and backup
battery retains data in memory for at least 72 hours.
NOTE Do not remove the main battery within the first 15 hours of use. If the main battery is removed before the
backup battery is fully charged, data may be lost.
Use the following to charge the main battery:
Getting Started1 - 7
•
Accessories: The reader charging cable provides charging capability.
- Power supply and a charging cable
•
The reader charging accessories are used to charge batteries that are removed from the reader.
- Four Slot Spare Battery Charger
- Universal Battery Charger (UBC)
Charging the Battery
After the initial charging, charge the battery in the reader using the charging cable with the appropriate power
supply. Or the battery may be removed and charged in a spare battery charger (see Charging Spare Batteries on
page 1-9). The battery fully charges in less than four hours.
1.Ensure the power supply is connected to the appropriate power source (see Chapter 3, Accessories for setup
information).
2.Connect the power supply to the reader.
3.The reader starts to charge automatically. The amber Battery LED, lights to show the charge status. See Tab le
1-3 for charging indications.
Page 26
1 - 8RD5000 RFID Integrator Guide
Serial Communications
Serial communications are connected in the same way that the battery charging is connected. Except that the
Charging Cable with Serial Communications (see Figure 3-7 on page 3-8) is used instead of the Charging Cable.
Serial communication is only used for software de-bugging and for image uploading.
Power
Supply
Figure 1-5
Charging
Cable
Battery Charging and
Serial Communications
Power Supply Connection
Table 1-3
RD5000 LED Indicators
LED IndicationDescription
BATTERY LED
GreenReader is on, battery charge is greater than 80%.
Green-Red FlashReader is on, green LED flashes red when charge is less than 80%.
Duration of the red flash increases as the battery charge drops. At 79%
very short red flash, at 41% longer red flash.
Solid RedBattery charge is less than 40%, at 20% a beeper sounds every ½
second, at 13% the unit turns off.
OffReader is off.
Slow Blinking AmberReader is charging.
Solid AmberCharging complete.
Fast Blinking AmberError in charging; check the reader.
Page 27
Getting Started1 - 9
Table 1-3
ERROR LED
GreenNormal operation.
Green-Flash RedIndicates a momentary error condition.
Red BlinkingService the reader.
RD5000 LED Indicators (Continued)
LED IndicationDescription
Charging Spare Batteries
Use the following accessories to charge spare batteries (outside of the reader):
•
Four Slot Spare Battery Charger
•
Universal Battery Charger (UBC) Adapter.
To charge a spare battery:
1.Ensure the accessory used to charge the spare battery is connected to the appropriate power source (see
Chapter 3, Accessories for setup information).
2.Insert the spare battery into the spare battery charging slot with the charging contacts facing down (over the
charging pins) and gently press down on the battery to ensure proper contact.
3.The battery starts to charge automatically. The amber charge LED on the accessory lights to show the charge
status. See Chapter 3, Accessories for charging indications for the accessory.
The battery usually fully charges in less than four hours.
Page 28
1 - 10RD5000 RFID Integrator Guide
Connect a USB Cable
The USB port is protected by the USB port cover. To access the USB port, remove the USB port cover.
CAUTION With the USB port cover removed the reader should only be operated in a clean, dry environment (for
setup and configuration only). The USB port cover must be replaced before operating the reader
outside of a lab environment. With the USB port cover removed the reader is not properly sealed.
1.Loosen the two phillips head screws and lift off the USB port cover (see Figure 1-6).
Phillips
Head
Screws (2)
USB Port
Cover
Figure 1-6
2.Connect the USB cable to the reader as shown in Figure 1-7.
Remove the USB Port Cover
USB
Cable
USB
Connector
USB
Connector
Figure 1-7
Connect the USB Cable
Page 29
Connect an External Antenna
Getting Started1 - 11
The external antenna looks very similar to the RD5000 and it p
Figure 3-13 on page 3-11)
.
rovides a remotely mounted antenna location
(see
When the reader is used without an external antenna the external antenna port is protected by the 50 ohm termination
resistor/cover. Remove the external antenna port termination resistor/cover to access the external antenna port shown
in
Figure 1-8
page 1-12
3.Unscrew and remove the external antenna port termination resistor/cover as shown in Figure 1-8.
. The external antenna cable must be routed to the external antenna connector shown in
. See
External Antenna Installation on page 2-12
CAUTION With the external antenna port termination resistor/cover removed the reader should only be operated
in a clean, dry environment (for setup and configuration only). The external antenna port termination
resistor/cover (or an external antenna connector Reverse-Polarity N) must be used.
Termination
Resistor/Cover
for external antenna installation procedures.
Figure 1-10 on
Figure 1-8
Reader
External
Antenna
Port
Remove the External Antenna Port Termination Resistor/Cover
Page 30
1 - 12RD5000 RFID Integrator Guide
4.Connect the external antenna to the external antenna port as shown in Figure 1-9.
Reader
External
Antenna
Connector
Figure 1-9
5.Connect the external antenna to the external antenna port as shown in Figure 1-10.
External Antenna
External
Antenna
Connector
Connect an External Antenna Cable to the Reader
Figure 1-10
External Antenna Connection
Page 31
Starting the Reader
Confirm that the reader has a charged battery and press the Power button to turn on the reader. If the reader does
not power on, perform a cold boot (see Performing a Cold Boot on page 1-16).
Host Computer Display Setup
The RD5000 does not have a display. To view the system menus use an application such as the Microsoft Remote
Display Control for Pocket PC. For more information and the Remote Display Control for Pocket PC download go
to http://www.microsoft.com/downloads/ and search for Remote Display Control for Pocket PC. Download the
application and follow the provided installation and setup procedures.
After the remote display application has been installed on the host computer, set up an ActiveSync connection
between the host computer and the RD5000 reader (see Setting Up an ActiveSync Connection (with no
Partnership) on the Host Computer on page 4-2).
Start the remote display application to access the RD5000 RFID reader application.
Checking Battery Status
Getting Started1 - 13
The Battery LED displays the battery status, see Table 1-3 for status indications.
Battery Management
Battery Saving Tips
•
Connect the reader to external power when not in use.
•
Turn off the reader during periods of non-use.
•
Power off the reader when charging, to charge at a faster rate.
•
Use the Motion and Proximity sensor features to control the time the RFID engine is active, see MPS
Settings on page 7-12 and Appendix B, Motion Sensor Parameters.
Page 32
1 - 14RD5000 RFID Integrator Guide
Status Icons (Windows CE 5.0)
The Taskbar at the bottom of the window displays the active programs, current time, battery status and
communication status.
Status Icons
Desktop Button
Start Button
Figure 1-11
Taskbar
Open Programs
Status icons are shown in the taskbar to indicate present status of the reader. Double tapping each status icon
displays the corresponding setup window and the settings enables to be changed or adjusted.
Table 1-4
Status
Icon
Status Icons
Description
This icon indicates that the keyboard input panel is selected.
This icon indicates that the keyboard input panel is hidden.
This icon indicates that the main battery is charging or that the reader is operating on AC power.
Double tapping on this icon opens the
Power Properties
window.
This icon indicates the battery is fully charged and the reader is running on external power.
This icon indicates that the battery is fully charged (100% charged).
The battery status icons provide the battery status in 10% increments from 10% to 100%.
This icon indicates that the reader is connected to a host computer with a serial cable.
Wireless connection status icon. Indicates WLAN signal strength.
Bluetooth Enabled
The
Bluetooth Disabled
The
The
Bluetooth Communication
icon appears in the task tray and indicates that the Bluetooth radio is on.
icon appears in the task tray and indicates that the Bluetooth radio is off.
icon appears in the task tray and indicates that the reader is
communicating with another Bluetooth device.
The
RFIDSocketbridge
application manages incoming wireless connections, supports the TCP/IP,
or Bluetooth connections, monitors battery life, controls battery LEDs, and beeps on low battery.
Page 33
Resetting the Reader
If the reader stops responding, reset it. There are two reset functions; warm boot and cold boot.
A warm boot restarts the reader by closing all running programs.
A cold boot also restarts the reader, but erases all stored records and entries in RAM. Data saved in flash memory
is not lost. In addition, it returns formats, preferences and other settings to the factory default settings.
Perform a warm boot first. This restarts the reader and saves all stored records and entries. If the reader still does
not respond, perform a cold boot.
Performing a Warm Boot
Hold down the Power button (see Figure 1-1 on page 1-2) for approximately five seconds. As soon as the reader
battery LED turns off release the Power button. As the RD5000 starts to perform a warm boot it beeps twice.
Getting Started1 - 15
Page 34
1 - 16RD5000 RFID Integrator Guide
Performing a Cold Boot
A cold boot restarts the reader and erases all user stored records and entries that are not saved in flash memory
(Application and Platform folders). Never perform a cold boot unless a warm boot does not solve the problem.
CAUTION Performing a cold boot restores formats, preferences and other settings to the factory default settings.
User data may be deleted.
NOTE Any data previously synchronized with a computer can be restored during the next ActiveSync operation.
To perform a cold boot:
1.Rotate the door latch (see Figure 1-1 on page 1-2) counterclockwise 1/4 turn to and open the battery door. The
battery door switch detects the door opening and initiates a battery removal shutdown.
NOTE There is an access hole located directly below the battery door switch (see Figure 1-12). The reset
switch is recessed within the access hole.
2.Press and hold the Power button (see Figure 1-1 on page 1-2) while simultaneously using a paper clip (or
other thin object), to press and hold the reset switch (see Figure 1-12). Hold both for five seconds.
3.Release the reset switch and the Power button. The battery LED flashes yellow to indicate that a cold boot has
initiated.
4.Close the battery door and rotate the door latch (see Figure 1-1 on page 1-2) counterclockwise 1/4 turn to lock.
The LED flashes several more times as the reader reboots and the battery LED lights green when the reader has
completed the cold boot.
Symbol Mounting
Bracket
Battery Door
Switch
Figure 1-12
Access Hole
Reset Button Location
Reset Switch
Page 35
Chapter 2 Installation
Introduction
The RD5000 RFID reader is designed for use on a mobile platform such as a forklift. The unit may be used both
indoors and outside and is resistant to outside elements such as sun, rain, snow and splashed water. The RD5000
RFID reader requires a mounting platform. The platform may be locally fabricated or the Motorola designed
mounting brackets may be used.
RD5000 Installation
The reader must be professionally installed.
Installing the RD5000 RFID reader consists of the following procedures:
•
Determine the mounting location
•
Install the Motorola mounting brackets, or prepare the mounting platform
•
Install the shock isolators
•
Mount the reader
Mounting Location
Select a mounting location that is free from obstructions that might inhibit reading and/or interfere with the
Proximity Sensor field of view and/or WAN communications. The location should also allow easy access to the
reader for changing the battery and/or connecting the charging cable. Finally, the location should not subject the
reader to possible damage during loading and unloading of products.
Page 36
2 - 2RD5000 RFID Integrator Guide
Installing The Motorola Mounting Brackets
The Motorola mounting brackets are designed to provide the proper clearances, as well as provide protection from
a flat object impacting the reader. The brackets are designed to be welded in place and a welding jig is available for
this purpose.
To install the mounting brackets:
NOTE When mounting the welding jig, do not use the lock washers to mount the shock isolators.
1.Attach the shock isolators (provided with the reader) to the mounting brackets (using the post side of the shock
isolator) and the provided nut. Center the shock isolator post in the mounting hole and finger tighten the nut.
2.Repeat the shock isolator mounting procedure for the second mounting bracket.
Shock Isolator (4)
Figure 2-1
Nut (4)
Mounting Bracket (2)
Mounting the Shock Isolators, for the Welding Jig
Page 37
Installation2 - 3
3.Attach the welding jig to the shock isolators using the four allen head screws and the four lock washers. The
mounting brackets are identical so either bracket can be used on the left or right hand sides.
Welding Jig
Allen Head Screws (4)
Lock Washers (4)
Mounting Bracket (2)
Figure 2-2
4.Position the mounting brackets/welding jig assembly in the final mounting location and secure the assembly so
Welding Jig Installation
that it will not move.
Page 38
2 - 4RD5000 RFID Integrator Guide
5.Tack weld the mounting brackets in the six locations marked (see Figure 2-3). The welds should be 1/2 inch to
3/4 inch long, with a 1/4 inch bead and 1/16 inch penetration.
Tack Welds (6 places)
Figure 2-3
6.Remove the welding jig, and remove the shock isolators.
Tack Welds, Location
Page 39
Installation2 - 5
7.Finish welding the mounting brackets (see Figure 2-4) with a 1/4 inch bead and 1/16 inch penetration.
Finish Welds
Figure 2-4
8.Clean and inspect the welds. Re-weld any areas that require touch-up.
9.Allow the brackets to cool before continuing with the installation.
10. Clean and apply touch-up paint (as required) to inhibit corrosion.
Finish Welding the Brackets
Page 40
2 - 6RD5000 RFID Integrator Guide
Installing The Shock Isolators on The Motorola Mounting Brackets
CAUTION The shock isolators are required. Do not mount the unit without the shock isolators.
When permanently mounting the shock isolators use the lock washers between the nut and the
mounting bracket, as shown in
1.Attach the shock isolators (provided with the reader) to the mounting brackets (using the post side of the shock
Figure 2-5
isolator) with the provided nut and lock washer. Center the shock isolator post in the mounting hole and tighten
the nut. Repeat the shock isolator mounting procedure for all four shock isolators.
.
Shock Isolator (4)
Lock Washer (4)
Nut (4)
Mounting Bracket (2)
Figure 2-5
2.The mounting brackets are ready to accept the RD5000 RFID reader. Proceed to Mounting The Reader on
Mounting the Shock Isolators
page 2-9.
Page 41
Installation2 - 7
Locally Fabricated Mounting Platform
NOTE The locally fabricated mounting platform is only used when the Motorola mounting brackets are not (or
cannot) be used.
The mounting platform may be locally fabricated, or the Motorola mounting brackets may be used (recommended)
as the mounting platform.
Mounting Platform Fabrication
CAUTION The supplied shock isolators are required and must be used with any user developed mounting
platform.
The mounting platform must be designed to provided the raised mounting for the reader. The mounting design
must be strong enough to support the unit taking into account the shocks and vibration the reader will experience.
Figure 2-6 on page 2-7 provides the placement and size specifications for the mounting platform.
Figure 2-6
1 inch diameter
1/4-20, min. depth 1/2 inch
Mounting Platform Specifications
7-Inches, center to center (+.015)
5-Inches, center to center (+.015)
Min. Height 1.2 Inches
Page 42
2 - 8RD5000 RFID Integrator Guide
Installing The Shock Isolators on The Locally Fabricated Mounting Platform
The locally fabricated mounting platform must provide the proper clearances (see Figure 2-6 on page 2-7).
1.Attach the shock isolators (provided with the reader) using the post side of the shock isolator as appropriate for
the mounting platform design. Center the shock isolator post in the mounting hole and secure. Repeat the
shock isolator mounting procedure for all four shock isolators.
2.Proceed to Mounting The Reader on page 2-9 and adapt the procedure to fit the locally fabricated mounting
platform requirements.
Page 43
Installation2 - 9
Mounting The Reader
The steps provided are to mount the RD5000 RFID reader to the Motorola mounting brackets. Adjust the steps
accordingly if a fabricated platform is being used.
1.Prior to starting the installation confirm that the reader has been configured for the local wireless network and
that the battery has been fully charged.
2.Press the Power switch (located between the Battery and Error LEDs) and confirm that the reader boots up
properly and that the green Battery LED lights. The reader may take a couple of minutes to fully boot up. If the
reader does not properly boot up, return it to the local IT specialist to confirm operation.
3.Once the proper boot up has been confirmed, press the Power switch again to turn the reader off before
proceeding with the installation. The Battery LED should now be off.
Mounting on The Motorola Mounting Brackets
The Motorola mounting brackets provide the proper clearances and provide protection from a flat object impacting
the reader. The brackets must be welded in place (see Installing The Motorola Mounting Brackets on page 2-2)
before proceeding with the reader mounting procedure.
CAUTION The shock isolators are required. Do not mount the unit without the shock isolators
1.Tilt and angle the reader to fit the battery door between the shock isolators (see Figure 2-7).
Figure 2-7
Insert Battery Door Between the Shock Isolators
Page 44
2 - 10RD5000 RFID Integrator Guide
2.Slide the reader under the mounting bracket far enough to clear the external antenna terminating resistor and
lower the reader onto the shock isolators.
External Antenna
Terminating Resistor
Figure 2-8
3.Slide the reader over the shock isolators to align the shock mount holes with the reader mounting holes.
4.If the holes do not align properly loosen the nuts at the bottom of the shock isolators and move the shock
Mounting the RD5000 RFID Reader
isolators to properly align the holes.
5.When the holes are properly aligned, insert the allen head screws, and finger tighten.
Page 45
Installation2 - 11
Figure 2-9
6.Once all of the allen head screws are in place, use a 3/16 inch allen wrench and a 7/16 open end wrench to
tighten the allen screws and the shock isolator nuts to a torque of 3.3 ft.-lbs.
The reader is now ready for use.
RD5000 RFID Reader Final Installation
Page 46
2 - 12RD5000 RFID Integrator Guide
External Antenna Installation
The external antenna must be professionally installed. Select an accessible mounting location that is free from
obstructions that might inhibit reading.
The external antenna uses the same mounting brackets or mounting platform that the RD5000 uses.
The location should not subject the external antenna to possible damage during loading and unloading of products.
Use the following steps to install the external antenna:
Installing the external antenna is the same as the RD5000 installation procedures:
•
Determine the mounting location.
•
Install the Motorola mounting brackets, or prepare the mounting platform. See Installing The Motorola
Mounting Brackets on page 2-2 or Locally Fabricated Mounting Platform on page 2-7 for detailed procedures.
•
Install the shock isolators, see See Installing The Shock Isolators on The Motorola Mounting Brackets on
page 2-6 or Installing The Shock Isolators on The Locally Fabricated Mounting Platform on page 2-8 for
detailed procedures.
•
Mount the external antenna the same way that the RD5000 is mounted. See Mounting The Reader on page
2-9 for detailed procedures.
•
Connect the external antenna cable as described in Connect an External Antenna on page 1-11.
Page 47
Chapter 3 Accessories
Introduction
The RD5000 RFID reader and the MC9000 Series mobile computers share some of the same accessories. These
accessories provide a wide variety of product support capabilities. Accessories include a power supplies, spare
batteries and battery charging solutions. The RD5000 accessories include:
•
Power Supply
Provides battery charging power.
•
Spare lithium-ion battery
Spare/replacement battery.
•
Four Slot Spare Battery Charger
Charges up to four spare batteries.
•
Universal Battery Charger Adapter
Adapts the UBC for use with the mobile reader batteries.
•
Charging Cable
Connects to the power supply and the Battery Charging to provide battery charging power.
•
Charging Cable with Serial Communications
Connects to the power supply and the Battery Charging and Serial Communications connector to provide
battery charging power. In addition the cable has a “Y” connector with a 9-pin serial connector.
•
External Antenna
Provides an externally mounted antenna location
•
USB Communications Cable
Connects to the USB mini connector to provide USB communications.
.
Page 48
3 - 2RD5000 RFID Integrator Guide
Power Supply
The Motorola approved power supply output rated at12 Vdc and a minimum of 3.33 A is required to maintain
warranty coverage and regulatory approvals. The power supply is certified to EN60950-1 with SELV outputs. Use
of an alternative power supply will invalidate any approval given to this device and may be dangerous.
The power supply is self regulating and can accept inputs within the range of 100-250 VAC and 50-60 Hz. Power
cords are available to fit most local power delivery systems.
Battery
The Motorola approved
watt hours.
The Motorola rechargeable battery packs are designed and constructed to the highest standards within the
industry. However, there are limitations to how long a battery can operate or be stored before needing replacement.
Many factors affect the actual life cycle of a battery pack, such as heat, cold, harsh environmental conditions and
severe drops.
When batteries are stored over six (6) months, some irreversible deterioration in overall battery quality may occur.
Store batteries discharged in a dry, cool place, removed from the equipment to prevent loss of capacity, rusting of
metallic parts and electrolyte leakage. When storing batteries for one year or longer, they should be charged and
discharged at least once a year. If an electrolyte leakage is observed, avoid any contact with affected area and
properly dispose of the battery. Batteries must be charged within the 32° to 104° F (0° to +40° C) ambient
temperature range. Replace the battery when a significant loss of run time is detected.
Standard warranty period for all Motorola batteries is 30 days, regardless if the battery was purchased separately
or included as part of the RFID reader. For more information on Motorola batteries, please visit:
battery is a removable, rechargeable 7.2 V Lithium Ion battery pack, rated at 2200 mAh, 15.8
Page 49
Four Slot Spare Battery Charger
This section describes how to set up and use the Four Slot Spare Battery Charger to charge up to four spare
batteries.
Spare
Battery
Spare Battery
Charging Well
Spare Battery
Charging
LEDs (4)
Accessories3 - 3
Setup
Figure 3-1
AC Cord
Four Slot Spare Battery Charger
CAUTION Use only a Motorola approved power supply output rated 15 VDC and minimum 5 A. Use of an
alternative power supply will void the product warranty and may cause product damage.
Power Port
DC Cable
Figure 3-2
Power Supply
Four Slot Spare Battery Charger Power Connection
Page 50
3 - 4RD5000 RFID Integrator Guide
Spare Battery Charging with the Four Slot Spare Battery Charger
1.Connect the charger to a power source as shown in Figure 3-2.
2.Insert the battery into a spare battery charging slot and gently press down on the battery to ensure proper
contact.
Battery Charging Indicators
An amber LED is provided on each battery charging well (see Figure 3-1 on page 3-3). See Table 3-1 for charging
status indications.
The battery usually charges in less than four hours.
Table 3-1
OffCharger is not attached to the power supply correctly, power supply is not powered or a
Fast Blinking AmberCharging error; check placement of spare battery.
Slow Blinking AmberSpare battery is charging.
Solid AmberCharging complete.
Spare Battery LED Charging Indicators
LEDIndication
battery is not inserted in the slot.
Page 51
Universal Battery Charger (UBC) Adapter
This section describes how to use the UBC adapter to charge a spare battery.
The UBC can be used with a power supply as a standalone spare battery charger or it can be used with the four
station UBC2000 to provide charging to simultaneously charge up to four spare batteries. For additional
information about the UBC2000, see the UBC 2000 Universal Battery Charger Product Guide (p/n 70-33188-xx)
.
Battery Release
Battery Well
Accessories3 - 5
Battery
UBC Adapter
POWER
READY or STANDBY or FA ULT
(Green) (Flashing Yellow) (Solid Yellow)
CHARGING
(Solid Yellow)
Figure 3-3
UBC Adapter
Inserting and Removing a Battery
Insert the battery into the battery well with the charging contacts facing down (over charging pins) and gently press
down on the battery to ensure proper contact.
To remove the battery, press the battery release and lift battery out of the well.
Page 52
3 - 6RD5000 RFID Integrator Guide
Setup
CAUTION Use only a Motorola approved power supply output rated 15 VDC and minimum 1.5 A. Use of an
alternative power supply will void the product warranty and may cause product damage.
DC Cable
AC Line Cord
Power Supply
Figure 3-4
UBC Adapter Power Connection
Battery Charging Indicators
To charge a spare battery using the UBC adapter, connect the power supply to the UBC (see Figure 3-4 on page
3-6), then insert the spare battery. The spare battery begins charging automatically. The charge LEDs (see Figure
3-5)) show the battery charging. Table 3-2 shows battery charging status indications. The battery usually charges
in three hours.
POWER
READY or STANDBY or F A ULT
(Green)(Flashing Yello w)(Solid Yellow)
CHARGING
(Solid Yellow)
Figure 3-5
UBC Adapter LEDs
Page 53
Accessories3 - 7
Table 3-2
POWERGreenPower is connected to the UBC Adapter.
READY orGreenCharging complete.
STANDBY orFlashing-YellowThe battery was deeply discharged and is being trickle charged to bring the
FAULTYellowCharging error, check placement of RFID reader/spare battery.
CHARGINGYellowNormal charge.
UBC Adapter Charge LED Status Indications
LEDIndicationDescription
Charging Cable
The Charging Cable is used to connect the power supply to the RD5000. The pin-outs for the Power/Serial
Connector are provided in Table 3-3.
voltage up to the operating level. After operating level voltage is achieved the
battery charges normally.
Power Supply Connector
Figure 3-6
Table 3-3
Pin*Function
1Gnd
2+V
3RS232 Tx
4RS232 RX
The Pin numbers are on the connector
Charging Cable
Power/Serial Connector Pin-Outs
Power/Serial Connector
Page 54
3 - 8RD5000 RFID Integrator Guide
Charging Cable With Serial Communications
The Charging Cable With Serial Communications is used to connect the power supply to the RD5000 and provide
serial communications between the RD5000 and a local computer. The pin-outs for the Power/Serial Connector are
provided in Table 3-3 on page 3-7 and the pin-outs for the Serial RS232 Connector are provided in Table 3-4.
Power Supply Connector
Power/Serial Connector
Figure 3-7
Table 3-4
Pin*Function
2RS232 Tx
3RS232 RX
5Gnd
The Pin numbers are on the connector
Charging Cable With Serial Communications
Serial RS232 Connector Pin-Outs
Serial RS232 Connector
Page 55
USB Communications Cable
The USB Communications Cable is a standard USB to USB mini cable and may be purchased locally.
USB Connection Setup (Windows CE 5.0)
1.Ensure that ActiveSync was installed on the host computer and a partnership was created (see Chapter 4,
ActiveSync).
2.Start ActiveSync if it is not running on the host computer. To start, select Start - Programs - Microsoft
ActiveSync.
Accessories3 - 9
Figure 3-8
3.In the ActiveSync window, select File > Connection Settings. The Connection Settings window displays.
Figure 3-9
4.For USB connection, select Allow USB connection with this desktop computer.
5.Click OK to save any changes made.
ActiveSync - Not Connected
Serial Connection Settings
NOTE Every RFID reader should have a unique device name. Never try to synchronize more than one RFID
reader to the same name.
6.Connect the device to the host computer.
Page 56
3 - 10RD5000 RFID Integrator Guide
NOTE The cradle requires a dedicated port. It cannot share a port with an internal modem or other device. Refer
to the computer user manual supplied to locate the serial port(s).
The RD5000 USB setup is controlled through the CTLPanel. The default setting is USB, to confirm or change the
setting perform the following.
From the RD5000 main window (see Figure 3-10) click Start - Programs - Windows Explorer to access the Explorer
application.
Figure 3-10
Main Windows
From main Explorer window (see Figure 3-10) click Application - CTLPANEL to access the CTLPANEL utility. The
CtlPanel window appears (see Figure 3-11). Double-click on Comm Settings to access the USB settings window.
Figure 3-11
Explorer Windows
With Port highlighted, confirm that the Com port default value is set to USB Default. To change the value use the
left and right arrow buttons to select USB Default.
Page 57
Accessories3 - 11
Figure 3-12
Click OK to exit the Comm Settings window and click Exit to exit the Control Panel window.
External Antenna
The external antenna p
operate independently from each other and can even have different power settings. Both antennas can be active at the
same time.
USB Settings Window
rovides a remotely mounted antenna location. The internal and the external antenna can
Figure 3-13
See External Antenna Installation on page 2-12 for external antenna installation procedures.
See Connect an External Antenna on page 1-11 for external antenna connection procedures.
External Antenna
Page 58
3 - 12RD5000 RFID Integrator Guide
Page 59
Chapter 4 ActiveSync
Introduction
To communicate with various host devices, install Microsoft ActiveSync (version 4.1 or higher) on the host
computer. Use ActiveSync to synchronize information on the reader with information on the host computer.
Changes made on the reader or host computer appear in both places after synchronization.
NOTE When a reader with Windows Mobile 5.0 is connected to a host computer and an ActiveSync connection is
made, the WLAN and WWAN radios (if applicable) are disabled. This is a Microsoft security feature to prevent
connection to two networks at the same time.
ActiveSync software:
•
Allows working with reader-compatible host applications on the host computer. ActiveSync replicates data
from the reader so the host application can view, enter, and modify data on the reader.
•
Synchronizes files between the reader and host computer, converting the files to the correct format.
•
Backs up the data stored on the reader. Synchronization is a one-step procedure that ensures the data is
always safe and up-to-date.
•
Copies (rather than synchronizes) files between the reader and host computer.
•
Controls when synchronization occurs by selecting a synchronization mode, e.g., set to synchronize
continually while the reader is connected to the host computer, or set to only synchronize on command.
•
Selects the types of information to synchronize and control how much data is synchronized.
Installing ActiveSync
To install ActiveSync on the host computer, download version 4.1 or higher from the Microsoft web site at
http://www.microsoft.com. Refer to the installation included with the ActiveSync software.
Page 60
4 - 2RD5000 RFID Integrator Guide
Connect the RD5000 USB Communications Cable
Connect the RD5000 Communications cable to the RD5000 and the host computer, see Serial Communications on
page 1-8 and Connect a USB Cable on page 1-10.
Setting Up an ActiveSync Connection (with no Partnership) on the Host Computer
After ActiveSync installation is complete, the ActiveSync Setup Wizard sets up communications between the RFID
reader and host computer. Before setting up communications between the RFID reader and host computer, refer to
the Chapter 3, Accessories for a list of the accessories that can be used.
1.Connect the RFID reader to the host computer using the USB connection.
2.If the Get Connected window does not appear on the host computer, select Start > Programs > Microsoft
ActiveSync > File > Get Connected.
3.Click Next to continue.
Figure 4-1
Get Connected Window
Page 61
ActiveSync4 - 3
4.Select the No radio button in the Set up a Partnership window.
5.Click Next. If the ActiveSync Not Connected window (see Figure 4-3) displays, proceed to step 6. If the
ActiveSync Connected window (see Figure 4-7) displays, proceed to step 11.
Figure 4-2
6.In the ActiveSync Not Connected window, select File > Connection Settings. The ActiveSync Connection
Get Connected Window
Settings window appears.
Figure 4-3
ActiveSync Not Connected Window
Page 62
4 - 4RD5000 RFID Integrator Guide
7.Select the Allow USB connections, check box.
Figure 4-4
8.Click on OK. The ActiveSync Add/Remove Programs Window displays.
9.Select any required programs to be added and click OK. The ActiveSync Connecting Window displays.
Figure 4-5
ActiveSync Connection Settings Window
ActiveSync Add/Remove Programs Window
Page 63
10. The ActiveSync Connecting Window displays until ActiveSync connects.
ActiveSync4 - 5
Figure 4-6
11. When Active Sync has connected, the ActiveSync Connected window displays.
Figure 4-7
12. The ActiveSync Connected window indicated that ActiveSync has successfully connected.
ActiveSync Connecting Window
ActiveSync Connected Window
Page 64
4 - 6RD5000 RFID Integrator Guide
Setting up a Partnership
After ActiveSync installation is complete, the ActiveSync Setup Wizard sets up a partnership to synchronize
information between the RFID reader and host computer and customize synchronization settings.
Before setting up a partnership between the RFID reader and host computer, refer to the Chapter 3, Accessories
for a list of the accessories that can be used.
To set up a partnership:
1.Connect the RFID reader to the host computer using the USB connection.
2.If the Get Connected window does not appear on the host computer, select Start > Programs > Microsoft
ActiveSync > File > Get Connected.
3.Click Next to continue.
Figure 4-8
4.Select the Yes radio button to proceed with the partnership setup.
5.Select Next and the Add/Remove Programs window appears.
Figure 4-9
Get Connected Window
Set Up Partnership Window
Page 65
ActiveSync4 - 7
6.Select any required programs to be added and click on OK. The Select Number of Partnerships Window
displays.
Figure 4-10
7.Select the appropriate radio button for the number of computers to be included in the partnership. Click Next,
Add/Remove Programs Window
the Select Synchronization Settings window displays.
Figure 4-11
Select Number of Partnerships Window
Page 66
4 - 8RD5000 RFID Integrator Guide
8.To synchronize a particular type of information, select its check box. To stop synchronization of that
information, clear its check box. Select any required synchronization items and click Next. The Connecting
window displays (may be very brief).
Figure 4-12
9.The host computer and the RFID reader attempt to synchronize. When the synchronization is complete the
Select Synchronization Settings Window
Setup Complete window (see Figure 4-16) appears.
Figure 4-13
10. If the ActiveSync Not Connected window (see Figure 4-14) displays, proceed to step 11. If the Setup Complete
Connecting Window
window (see Figure 4-16) displays, proceed to step 12.
Page 67
ActiveSync4 - 9
Figure 4-14
11. In the ActiveSync Connection Settings window, select the Allow USB Connections check box and click
ActiveSync Not Connected Window
Connect. The ActiveSync Connecting window (see Figure 4-13) displays (may be very brief).
Figure 4-15
12. When the synchronization is complete the Setup Complete window (see Figure 4-16) appears.
ActiveSync Connection Settings Window
Figure 4-16
Setup Complete Window
Page 68
4 - 10RD5000 RFID Integrator Guide
13. Select Finish the ActiveSync Connected and Synchronized window displays.
Figure 4-17
ActiveSync Connected and Synchronized Window
The ActiveSync Connection and Synchronization are complete.
During the first synchronization, information stored on the host computer is copied to the RFID reader. When the
copy is complete and all data is synchronized, the RFID reader can be disconnect from the host computer.
NOTE The first ActiveSync operation must be performed with a local, direct connection. To retain partnerships
after a cold boot, capture partnership registry information in a .reg file and save it in the Flash File
System, detailed information is provided in the SMDK Windows CE Help File for Motorola RFID readers,
see Deployment on page 6-7 for the SMDK information.
For more information about using ActiveSync, start ActiveSync on the host computer, then see ActiveSync Help.
Page 69
RFID Reader Setup
The RFID reader can be set up to communicate with a USB connection. Chapter 3, Accessories provides the
accessory setup and cable connection information for use with the RFID reader. The RFID reader
communication settings must be set to match the communication settings used with ActiveSync.
USB Connection Setup (Windows CE 5.0)
The RD5000 USB setup is controlled through the CTLPanel. The default setting is USB, to confirm or change the
setting perform the following.
From the RD5000 main window (see Figure 4-18) click Start - Programs - Windows Explorer to access the Explorer
application.
ActiveSync4 - 11
Figure 4-18
From main Explorer window (see Figure 4-18) click Application - CTLPANEL to access the CTLPANEL utility. The
CtlPanel window appears (see Figure 4-19). Double-click on Comm Settings to access the USB settings window.
Figure 4-19
Main Windows
Explorer Windows
Page 70
4 - 12RD5000 RFID Integrator Guide
1.On the RFID reader double-click the Ctl Panel icon and double-click Comm Settings to display the Comm
Settings
window.
Figure 4-20
2.With Port highlighted, use the left and right arrow buttons to select the value. The default value is USB.
3.Click OK to exit the Comm Settings window.
4.Proceed with installing ActiveSync on the host computer and setting up a partnership.
Comm Settings Window
Page 71
Chapter 5 Wireless Applications
Introduction
Wireless Local Area Networks (WLANs) allow readers to communicate wirelessly and send captured data to a host
device in real time. The RD5000 RFID reader supports the IEEE 802.11a, 802.11b and 802.11g standards. Before
using the reader on a WLAN, the facility must be set up with the required hardware to run the wireless LAN and the
reader must be configured. Refer to the documentation provided with the access points (APs) for instructions on
setting up the hardware.
NOTE The screens and windows are provided for illustration purposes only and may differ from actual screens.
The applications described may not be available on (or applicable to) all devices. Procedures are not
device specific and are intended to provide a functional overview.
To configure the reader, a set of wireless applications provide the tools to configure and test the wireless radio in
the reader. The
•
Wireless Status
•
Wireless Diagnostics
Wireless Application menu on the task tray provides the following wireless applications:
•
Find WLANs
•
Manage Profiles
•
Options
•
Enable/Disable Radio (not available on Windows CE 5.0 devices with Fusion 2.3 and lower)
•
Log On/Off.
Click the
Signal Strength icon to display the Wireless Applications menu.
Page 72
5 - 2RD5000 RFID Integrator Guide
Windows CE 5.0
Figure 5-1
Wireless Applications Menu
Signal Strength Icon
The Signal Strength icon in the task tray indicates the wireless signal strength as follows:
Table 5-1
IconStatusAction
Wireless Applications Icons, Signal Strength Descriptions
Excellent signal strengthWireless LAN network is ready to use.
Very good signal strengthWireless LAN network is ready to use.
Good signal strengthWireless LAN network is ready to use.
Fair signal strengthWireless LAN network is ready to use. Notify the network
Poor signal strengthWireless LAN network is ready to use. Performance may not be
administrator that the signal strength is only “Fair”.
optimum. Notify the network administrator that the signal strength is
“Poor”.
Out-of-network range (not
associated)
No wireless LAN network card
detected
No wireless LAN network connection. Notify the network
administrator.
No wireless LAN network card detected or radio disabled. Notify the
network administrator.
Page 73
Turning the WLAN Radio On and Off
Windows CE 5.0 with Fusion 2.4 and Higher
To turn the WLAN radio off click the Signal Strength icon and select Disable Radio.
Wireless Applications5 - 3
Disable Radio
Figure 5-2
To turn the WLAN radio on click the
Disable and Enable Radio
Enable Radio
Signal Strength icon and select Enable Radio.
Page 74
5 - 4RD5000 RFID Integrator Guide
Find WLANs Application
Use the Find WLANs application to discover available networks in the vicinity of the user and reader. To open the
Find WLANs application, click the Signal Strength icon > Find WLANs. The Find WLANs window displays.
Figure 5-3
The Find WLANs list displays:
•
•
•
•
Table 5-2
IconDescription
Find WLANs Window
NOTE The Find WLANs display is limited to 32 items (ESSIDs or MAC addresses). A combination of up to 32
ESSIDs/APs may be displayed.
Manually enter valid ESSIDs not displayed in the Find WLANs window. See Figure 5-3 on page 5-4.
WLAN Networks - Available wireless networks with icons that indicate signal strength and encryption type.
The signal strength and encryption icons are described in Table 5-2 and Table 5-3.
Network Type - Type of network.
Channel - Channel on which the AP is transmitting.
Signal Strength - The signal strength of the signal from the AP.
Signal Strength Icon
Excellent signal
Very good signal
Good signal
Fair signal
Poor signal
Out of range or no signal
Page 75
Wireless Applications5 - 5
Table 5-3
IconDescription
Click-and-hold on a WLAN network to open a pop-up menu which provides two options: Connect and Refresh.
Select
the
RFID reader automatically connects to this new profile.
Encryption Icon
WLAN is an infrastructure network, with no encryption.
WLAN is an Ad-Hoc network, with no encryption.
WLAN access is encrypted and requires a password.
WLAN is an Ad-Hoc network, with encrypted access and
requires a password.
Refresh to refresh the WLAN list. Select Connect to create a wireless profile from that network. This starts
Profile Editor Wizard which allows the values for the selected network to be set. After editing the profile, the
Profile Editor Wizard
Use the Profile Editor Wizard to create a new profile or edit an existing profile. If editing a profile, the fields reflect
the current settings for that profile. If creating a new profile, the known information for that WLAN network appears
in the fields.
Navigate through the wizard using the Next and Back buttons. click X to quit. On the confirmation dialog box, click
No to return to the wizard or click Yes to quit and return to the Manage Profiles window. See Manage Profiles
Application on page 5-22 for instructions on navigating the
Profile Editor Wizard.
Profile ID
In the Profile ID dialog box in the Profile Editor Wizard, enter the profile name and the ESSID.
Figure 5-4
Profile ID Dialog Box
Page 76
5 - 6RD5000 RFID Integrator Guide
Table 5-4
NameThe name and (WLAN) identifier of the network connection. Enter a user friendly name for the
ESSIDThe name and (WLAN) identifier of the network connection. Alternatively, enter the name and
Click Next. The Operating Mode dialog box displays.
Profile ID Fields
FieldDescription
reader profile used to connect to either an AP or another networked computer. Example: The
Public LAN.
(WLAN) identifier of a WLAN network connection not listed on the
The ESSID is the 802.11 extended service set identifier. The ESSID is 32-character
(maximum) string identifying the WLAN, and must match the AP ESSID for the RFID reader
to communicate with the AP.
NOTE Two profiles with the same user friendly name are acceptable but not recommended.
Find WLANs window.
Operating Mode
Use the Operating Mode dialog box to select the operating mode (Infrastructure or Ad-Hoc) and the country
location.
Figure 5-5
Operating Mode Dialog Box
Page 77
Wireless Applications5 - 7
Table 5-5
Operating Mode Fields
FieldDescription
Operating ModeSelect Infrastructure to enable the reader to transmit and receive data with an AP. Infrastructure
is the default mode.
Select
Ad Hoc to enable the reader to form its own local network where readers communicate
peer-to-peer without APs using a shared ESSID.
Country
Country determines if the profile is valid for the country of operation. The profile country must
match the country in the options page or it must match the acquired country if 802.11d is
enabled.
Single Country Use:
When the device is only used in a single country, set every profile country to
In the
Options > Regulatory dialog box (see Figure 4-46 on page 4-37), select the specific
country the device is used in, and deselect the
Enable 802.11d option. This is the most common
Allow Any Country.
and efficient configuration, eliminating the initialization overhead associated with acquiring a
country via 802.11d.
Multiple Country Use:
When the device is used in more than one country, select the
Options > Regulatory dialog box (see Figure 4-46 on page 4-37). This eliminates the need for
reprogramming the country (in
Options > Regulatory) each time a new country is entered.
Enable 802.11d option in the
However, this only works if the infrastructure (i.e., APs) supports 802.11d (some infrastructures
do not support 802.11d, including some Cisco APs). When the Enable 802.11d option is
selected, the
Options > Regulatory > Country setting is not used. For a single profile that can
be used in multiple countries, with infrastructure that supports 802.11d (including Motorola
infrastructure), set the Profile Country to
Enable 802.11d. The Options > Regulatory > Country setting is not used.
Allow Any Country. Under Options > Regulatory, select
For a single profile that can be used in multiple countries, but with infrastructure that does not
support 802.11d, set the profile country to
802.11d. In this case, the Options > Regulatory > Country setting must always be set to the
Allow Any Country, and de-select (uncheck) Enable
country the device is currently in. This configuration option is the most efficient and may be
chosen for use with any infrastructure. However, the
Options > Regulatory > Country setting
must be manually changed when a new country is entered.
Note that using a single profile in multiple countries implies that there is a common ESSID to
connect to in each country. This is less likely than having unique ESSIDs in each country, this
requires unique profiles for each country.
For additional efficiency when using multiple profiles that can be used in multiple countries, the
country setting for each profile can be set to a specific country. If the current country (found via
802.11d or set by
Options > Regulatory > Country when 802.11d is disabled) does not match
the country set in a given profile, then that profile is disabled. This can make profile roaming
occur faster. For example, if two profiles are created and configured for Japan, and two more
profiles are created and configured for USA, then when in Japan only the first two profiles are
active, and when in USA only the last two are active. If they had all been configured for
Any Country
, then all four would always be active, making profile roaming less efficient.
Allow
Click Next. If Ad-Hoc mode was selected the Ad-Hoc dialog box displays. If Infrastructure mode was selected the
Authentication dialog box displays. See Authentication on page 5-9 for instruction on setting up authentication.
Page 78
5 - 8RD5000 RFID Integrator Guide
Ad-Hoc
Use the Ad-Hoc dialog box to select the required information to control Ad-Hoc mode. This dialog box does not
appear if
1.Select a channel number from the Channel drop-down list.
Infrastructure mode is selected. To select Ad-Hoc mode:
Table 5-6
2.4 GHz12412 MHz
5 GHz365180 MHz
Ad-Hoc Channels
BandChannelFrequency
22417 MHz
32422 MHz
42427 MHz
52432 MHz
62437 MHz
72442 MHz
82447 MHz
92452 MHz
102457 MHz
112462 MHz
405200 MHz
445220 MHz
485240 MHz
Figure 5-6
2.Click Next. The Encryption dialog box displays. See Encryption on page 5-16 for encryption options.
Ad-Hoc Settings Dialog Box
Page 79
Wireless Applications5 - 9
Authentication
Use the Authentication dialog box to configure authentication. If Ad-Hoc mode is selected, this dialog box is not
available and authentication is set to
None by default.
Select an authentication type from the drop-down list and click
dialog box. Selecting None, TLS, or LEAP displays the Encryption dialog box. See Encryption on page 5-16 for
encryption options. Table 5-7 lists the available authentication options.
Figure 5-7
Table 5-7
AuthenticationDescription
NoneDefault setting when authentication is not required on the network.
EAP-TLSSelect this option to enable EAP-TLS authentication. EAP-TLS is an authentication scheme
Authentication Dialog Box
Authentication Options
through IEEE 802.1x. It authenticates users and ensures only valid users can connect to the
network. It also restricts unauthorized users from accessing transmitted information by using
secure authentication certificates.
Next. Selecting PEAP or TTLS displays the Tunneled
PEAPSelect this option to enable PEAP authentication. This method uses a digital certificate to
verify and authenticate a user's identity.
LEAPSelect this option to enable LEAP authentication, which is based on mutual authentication.
The AP and the connecting reader require authentication before gaining access to the
network.
TTLSSelect this option to enable TTLS authentication.
Tunneled Authentication
Use the Tunneled Authentication dialog box to select the tunneled authentication options. There are different
selections available for PEAP or TTLS authentication.
Figure 5-8
To select a tunneled authentication type:
Tunneled Authentication Dialog Box
Page 80
5 - 10RD5000 RFID Integrator Guide
1.Select a tunneled authentication type from the drop-down list. See Table 5-8 and Table 5-9.
2.Select the User Certificate check box if a certificate is required. If the TLS tunnel type selected requires a user
certificate, the check box is already selected.
3.Click Next. The Installed User Certificates dialog box appears.
Table 5-8 lists the PEAP tunneled authentication options.
Table 5-8
PEAP Tunneled
Authentication
PEAP Tunneled Authentication Options
Description
MS CHAP v2Microsoft Challenge Handshake Authentication Protocol version 2 (MS CHAP v2) is a
password-based, challenge-response, mutual authentication protocol that uses the
industry-standard Message Digest 4 (MD4) and Data Encryption Standard (DES) algorithms
to encrypt responses. The authenticating server challenges the access client and the access
client challenges the authenticating server. If either challenge is not correctly answered, the
connection is rejected. MS CHAP v2 was originally designed by Microsoft as a PPP
authentication protocol to provide better protection for dial-up and virtual private network
(VPN) connections. With Windows XP SP1, Windows XP SP2, Windows Server 2003, and
Windows 2000 SP4, MS CHAP v2 is also an EAP type.
TLSEAP TLS is used during phase 2 of the authentication process. This method uses a user
certificate to authenticate.
Table 5-9 lists the TTLS tunneled authentication options.
Table 5-9
TTLS Tunneled Authentication Options
TTLS Tunneled
Authentication
Description
CHAPChallenge Handshake Authentication Protocol (CHAP) is one of the two main
authentication protocols used to verify the user name and password for PPP Internet
connections. CHAP is more secure than PAP because it performs a three way handshake
during the initial link establishment between the home and remote machines. It can also
repeat the authentication anytime after the link is established.
MS CHAPMicrosoft Challenge Handshake Authentication Protocol (MS CHAP) is an
implementation of the CHAP protocol that Microsoft created to authenticate remote
Windows workstations. MS CHAP is identical to CHAP, except that MS CHAP is based
on the encryption and hashing algorithms used by Windows networks, and the MS CHAP
response to a challenge is in a format optimized for compatibility with Windows operating
systems.
Page 81
Wireless Applications5 - 11
Table 5-9
MS CHAP v2MS CHAP v2 is a password based, challenge response, mutual authentication protocol
PAPPassword Authentication Protocol (PAP) has two variations: PAP and CHAP PAP. It
MD5Message Digest-5 (MD5) is an authentication algorithm developed by RSA. MD5
TTLS Tunneled Authentication Options (Continued)
TTLS Tunneled
Authentication
that uses the industry standard Message Digest 4 (MD4) and Data Encryption Standard
(DES) algorithms to encrypt responses. The authenticating server challenges the access
client and the access client challenges the authenticating server. If either challenge is not
correctly answered, the connection is rejected. MS CHAP v2 was originally designed by
Microsoft as a PPP authentication protocol to provide better protection for dial-up and
virtual private network (VPN) connections. With Windows XP SP1, Windows XP SP2,
Windows Server 2003, and Windows 2000 SP4, MS CHAP v2 is also an EAP type.
verifies a user name and password for PPP Internet connections, but it is not as secure
as CHAP, since it works only to establish the initial link. PAP is also more vulnerable to
attack because it sends authentication packets throughout the network. Nevertheless,
PAP is more commonly used than CHAP to log in to a remote host like an Internet service
provider.
generates a 128-bit message digest using a 128-bit key, IPSec truncates the message
digest to 96 bits.
Description
User Certificate Selection
If the User Certificate check box on the Tunneled Authentication dialog box was checked or if TLS is the selected
authentication type, the
currently installed certificates before proceeding. The selected certificate name appears in the drop-down list. If the
required certificate is not in the list, install it.
Figure 5-9
Installed User Certificates Dialog Box
Installed User Certificates dialog box displays. Select a certificate from the drop-down list of
User Certificate Installation
To install a user certificate (EAP TLS only) and a server certificate for EAP TLS and PEAP authentication:
1.Click Install Certificate. The Credentials dialog box appears.
Page 82
5 - 12RD5000 RFID Integrator Guide
*********
Figure 5-10
2.Enter the User:, Pwd: (password), and Server: information in their respective text boxes.
3.Click Retrieve. A Progress dialog indicates the status of the certificate retrieval.
4.Click ok to exit.
After the installation completes, the
Credentials Dialog Box
Installed User Certs dialog box displays and the certificate is available in the
drop-sown for selection.
NOTE To successfully install a user certificate, the reader must already be connected to a network from which the
server is accessible.
Server Certificate Selection
If the Validate Server Certificate check box is selected, a server certificate is required. Select a certificate on the
Installed Server Certificates dialog box. An hour glass may appear as the wizard populates the existing certificate
list. If the required certificate is not listed, install it:
1.Click the Install Certificate button.
Figure 5-11
Installed Server Certificates Dialog Box
A dialog box appears that lists the currently loaded certificate files found in the default directory (Application
directory for Windows CE and all folders for Windows Mobile) with the default extension.
Page 83
Wireless Applications5 - 13
Figure 5-12
2.Locate a certificate:
a.For Windows Mobile, select a different folder, if applicable, using the Folder drop-down list. Click the
Browse Server Certificates
certificate filename. The certificate installs automatically.
b. For Windows CE, navigate to the folder where the certificate is stored. Click the certificate filename and
then click ok.
3.A confirmation dialog verifies the installation. If the information in this dialog is correct, click the Yes button, If
the information in this dialog is not correct click the
No button. The wizard returns to the Installed Server Certs
dialog box.
Figure 5-13
Confirmation Dialog Box
Credential Cache Options
If any of the password-based authentication types were selected, select the different credential caching options.
These options specify when the network credential prompts appear: at connection, on each resume, or at a
specified time.
Entering the credentials directly into the profile permanently caches the credentials. In this case, the reader does
not require user login. If a profile does not contain credentials entered through the configuration editor, log in to the
reader before connecting.
Caching options only apply on credentials entered through the login dialog box.
Page 84
5 - 14RD5000 RFID Integrator Guide
Figure 5-14
If the reader does not have the credentials, it prompts the user to enter a username and password. If the reader
has the credentials (previous entered via a login dialog box), it uses these credentials unless the caching options
require the reader to prompt for new credentials. If the credentials were entered via the profile, the reader does not
prompt for new credentials. Table 5-10 lists the caching options.
Table 5-10
At ConnectSelect this option to prompt for credentials whenever the WCS tries to connect to a new profile.
On ResumeSelecting this reauthenticates an authenticated user when a suspend/resume occurs. Once
At TimeSelect this option to perform a local verification on an authenticated user at a specified time.
Entering credentials applies these credentials to a particular profile. Logging out clears all cached credentials.
Editing a profile clears all cached credentials for that profile.
Prompt for Login at Dialog Box
Cache Options
Description
Deselect this to use the cached credentials to authenticate. If the credentials are not cached,
a prompt appears to enter credentials. This option only applies when logged in.
reauthenticated, the user is prompted for credentials. If the user does not enter the same
credentials that were entered prior to the suspend/resume within three attempts, the user is
disconnected from the network. This option only applies when logged in.
The time can be an absolute time or a relative time from the authentication, and should be in
at least 5 minute intervals. Once the time has passed, the user is prompted for credentials. If
the user does not enter the correct credentials within three attempts, the user is disconnected
from the network. This option only applies when logged in.
The following authentication types have credential caching:
•
EAP TLS
•
PEAP
•
LEAP
•
TTLS.
Selecting the
Figure 5-15
At Time check box displays the TIme Cache Options dialog box.
Time Cache Options Dialog Box
Page 85
1.Click the Interval radio button to check credentials at a set time interval.
2.Enter the value in minutes in the Min box.
3.Click the At (hh:mm) radio button to check credentials at a set time.
4.Click Next. The At Time dialog box appears.
Wireless Applications5 - 15
Figure 5-16
5.Enter the time using the 24 hour clock format in the (hh:mm) box.
6.Click > to move the time to the right. Repeat for additional time periods.
7.Click Next. The User Name dialog box displays.
At Time Dialog Box
User Name
The user name and password can be entered (but is not required) when the profile is created. When a profile
authenticates with credentials that were entered in the profile, caching rules do not apply. Caching rules only apply
on credentials that are entered through the login dialog box.
Figure 5-17
Username Dialog Box
Password
Use the Password dialog box to enter a password. If EAP/TLS is the selected authentication type, the password is
not required and the field is disabled.
Figure 5-18
1.Enter a password in the Password field.
2.Select the Advanced ID check box, if advanced identification is required.
Password Dialog Box
Page 86
5 - 16RD5000 RFID Integrator Guide
3.Click Next. The Encryption dialog box displays. See Encryption on page 4-17.
Advanced Identity
Use the Advanced ID dialog box to enter the 802.1X identity to supply to the authenticator. This value can be 63
characters long and is case sensitive. In TTLS and PEAP, it is recommended entering the identity anonymous
(rather than a true identity) plus any desired realm (e.g., anonymous@myrealm). A user ID is required before
proceeding.
NOTE When authenticating with a Microsoft IAS server, do not use advanced identity.
Figure 5-19
Click Next. The
Advanced Identity Dialog Box
Encryption dialog box displays.
Encryption
Use the Encryption dialog box to select an encryption type. The drop-down list includes encryption types available
for the selected authentication type. See Table 5-12 for these encryption types.
Figure 5-20
Encryption Dialog Box
Page 87
Wireless Applications5 - 17
Table 5-11
EncryptionDescription
OpenSelect Open (the default) when no data packet encryption is needed over the network.
40-Bit WEPSelect 40-Bit WEP to use 40-bit key length WEP encryption. WEP keys are manually entered
128-Bit WEPSelect 128-Bit WEP to use 128-bit key length WEP encryption. WEP keys are manually
Encryption Options
Selecting this option provides no security for data transmitting over the network.
in the edit boxes. Only the required number of edit boxes for a key length is displayed (10 Hex
digit value for 40-bit keys). Use the Key Index drop-down list to configure the four WEP keys.
The adapter uses the selected key. Note: The default Hex digit keys are visible any time they
are used. As a security precaution after setting the key values for the network, the digits are
replaced with asterisks * in the encryption key fields.
If the associated AP uses an optional passkey, the active adapter WLAN profile must use one
as well. The passkey is a plain text representation of the WEP keys displayed in the encryption
dialog box. The passkey provides an easy way to enter WEP key data without having to
remember the entire 40-bit (10 character) Hex digit string.
entered in the edit boxes. Only the required number of edit boxes for a key length is displayed
(26 Hex digit value for 128-bit keys). Use the Key Index drop-down list to configure the four
WEP keys. The adapter uses the selected key. Note: The default Hex digit keys are visible any
time they are used. As a security precaution after setting the key values for the network, the
digits are replaced with asterisks * in the encryption key fields.
If the associated AP uses an optional passkey, the active adapter WLAN profile must use one
as well. The passkey is a plain text representation of the WEP keys displayed in the encryption
dialog box. The passkey provides an easy way to enter WEP key data without having to
remember the entire 128-bit (26 character) Hex digit string.
TKIPSelect this option to use Wireless Protected Access (WPA) via TKIP. Manually enter the
shared keys in the passkey field. Click Next to display the passkey dialog box. Enter an 8 to
63 character string.
AES
(Fusion 2.5 only)
Table 5-12
NoneYesYesYesYes
EAP TLSNoYesYesYes
PEAPNoYesYesYes
LEA PNoYesYesYe s
TTLSNoYesYesYes
Encryption / Authentication Matrix
AuthenticationOpenWEPTKIP
Select this option to use Advanced Encryption Standard (AES). Manually enter the shared
keys in the passkey field. Click Next to display the passkey dialog box. Enter an 8 to 63
character string.
Encryption
AES
(Fusion 2.5 only)
Page 88
5 - 18RD5000 RFID Integrator Guide
Key Entry Page
If either 40-Bit WEP or 128-Bit WEP is selected the wizard proceeds to the key entry dialog box unless the Use
Passkey
box will be shown only if the authentication is set to
1.Enter the 40-bit or 128-bit keys into the fields.
2.Click Next.
check box was selected in the Encryption dialog box (see Figure 5-20 on page 5-16). The Key Entry dialog
None. To enter the key information:
40-Bit WEP Keys Dialog Box
Figure 5-21
40-Bit and 128-Bit WEP Keys Dialog Boxes
128-Bit WEP Keys Dialog Box
Passkey Dialog
When None is selected as an authentication and WEP as an encryption, choose to enter a passkey by checking the
Use PassKey check box. The user is prompted to enter the passkey. For WEP, the Use PassKey checkbox is only
available if the authentication is
When
None is selected as an authentication and TKIP as an encryption, passkey entry is required. The user cannot
enter a passkey if the encryption is
When
None is selected as an authentication and AES as an encryption, passkey entry is required. The user cannot
enter a passkey if the encryption is
Figure 5-22
Click
Passkey Dialog Box
Next. The IP Address Entry dialog box displays.
None.
TKIP and the authentication is anything other than None.
AES and the authentication is anything other than None.
Page 89
Wireless Applications5 - 19
IP Address Entry
Use the IP Address Entry dialog box to configure network address parameters: IP address, subnet, gateway, DNS,
and WINS.
Figure 5-23
Table 5-13
IP Address Entry Dialog Box
IP Address Entry
EncryptionDescription
DHCPSelect Dynamic Host Configuration Protocol (DHCP) from the IP Address Entry drop-down list
to obtain a leased IP address and network configuration information from a remote server.
DHCP is the default setting for the reader profile. When DHCP is selected, the IP address
fields are read-only.
StaticSelect
Static to manually assign the IP, subnet mask, default gateway, DNS, and WINS
addresses the reader profile uses.
Select either
DHCP or Static from the drop-down list and click Next. Selecting Static IP displays the IP Address Entry
dialog box. Selecting DHCP displays the Transmit Power dialog box.
Use the
IP Address Entry dialog box to enter the IP address and subnet information.
Figure 5-24
Table 5-14
Static IP Address Entry Dialog Box
Static IP Address Entry Fields
FieldDescription
IP AddressThe Internet is a collection of networks with users that communicate with each other. Each
communication carries the address of the source and destination networks and the particular
machine within the network associated with the user or host computer at each end. This
address is called the IP address (Internet Protocol address). Each node on the IP network
must be assigned a unique IP address that is made up of a network identifier and a host
identifier. Enter the IP address as a dotted-decimal notation with the decimal value of each
octet separated by a period, for example, 192.168.7.27.
Subnet MaskMost TCP/IP networks use subnets to manage routed IP addresses. Dividing an organization's
network into subnets allows it to connect to the Internet with a single shared network address,
for example, 255.255.255.0.
Page 90
5 - 20RD5000 RFID Integrator Guide
Select the Advanced check box, then click NEXT to display the Advanced Address Entry dialog box. Enter the
Gateway, DNS, and WINS address. Click
Power
dialog box.
NEXT without selecting the Advanced check box to display the Transmit
Figure 5-25
The IP information entered in the profile is only used if the
System Options dialog box (System Options on page 5-36). If this select was not selected, the IP information in the
Advanced Address Entry Dialog Box
Enable IP Mgmt check box is selected in the Options >
profile is ignored and the IP information entered in the Microsoft interface applies.
Table 5-15
IP Config Advanced Address Entry Fields
FieldDescription
G/WThe default gateway forwards IP packets to and from a remote destination.
DNSThe Domain Name System (DNS) is a distributed Internet directory service. DNS translates
domain names and IP addresses, and controls Internet email delivery. Most Internet services
require DNS to operate properly. If DNS is not configured, Web sites cannot be located and/or
email delivery fails.
WINSWINS is a Microsoft
®
Net BIOS name server. WINS eliminates the broadcasts needed to
resolve computer names to IP addresses by providing a cache or database of translations.
Click
Next. The Transmit Power dialog box displays.
Page 91
Wireless Applications5 - 21
Transmit Power
The Transmit Power drop-down list contains different options for Ad-Hoc and Infrastructure mode. Automatic (i.e.,
use the current AP settings) and Power Plus (use higher than the current AP settings) are available for
Infrastructure mode.
Adjusting the radio transmission power level enables the user to expand or confine the transmission area with
respect to other wireless devices that could be operating nearby. Reducing coverage in high traffic areas improves
transmission quality by reducing the amount of interference in that coverage area.
Figure 5-26
Table 5-16
Transmit Power Dialog Box (Infrastructure Mode)
Transmit Power Dialog Box (Infrastructure Mode)
FieldDescription
AutomaticSelect Automatic (the default) to use the AP power level.
Power PlusSelect
Power Plus to set the reader transmission power one level higher than the level set
for the AP.
Figure 5-27
Table 5-17
Transmit Power Dialog Box (Ad-Hoc Mode)
Power Transmit Options (Ad-Hoc Mode)
FieldDescription
FullSelect Full power for the highest transmission power level. Select Full power when operating in
highly reflective environments and areas where other devices could be operating nearby, or
when attempting to communicate with devices at the outer edge of a coverage area.
30 mWSelect
15 mWSelect
5 mWSelect
1 mWSelect
30 mW to set the transmit power level to 30 mW.
15 mW to set the transmit power level to 15 mW.
5 mW to set the transmit power level to 5 mW.
1 mW for the lowest transmission power level. Use this level when communicating with
other devices in very close proximity, or in instances where little or no radio interference is
expected from other devices.
Click
Next to display the Battery Usage dialog box.
Page 92
5 - 22RD5000 RFID Integrator Guide
Battery Usage
Use the Battery Usage dialog box to select power consumption of the wireless LAN. There are three settings
available: CAM, Fast Power Save, and MAX Power Save. Battery usage cannot be configured in Ad-Hoc profiles.
Figure 5-28
Table 5-18
CAMContinuous Aware Mode (CAM) provides the best network performance, but yields
Fast Power Save
MAX Power Save
Battery Usage Dialog Box
NOTE Power consumption is also related to the transmit power settings.
Battery Usage Options
FieldDescription
the shortest battery life.
Fast Power Save (the default) performs in the middle of CAM and MAX Power Save
with respect to network performance and battery life.
Max Power Save yields the longest battery life while potentially reducing network
performance. In networks with minimal latency, Max Power Save performs as well
as Fast Power Save, but with increased battery conservation.
Manage Profiles Application
The Manage Profiles window provides a list of user-configured wireless profiles. Define up to 32 profiles at any one
time. To open the
Manage Profiles window, click the Signal Strength icon > Manage Profiles.
Figure 5-29
Icons next to each profile identify the profile’s current state.
Manage Profiles Window
Page 93
Wireless Applications5 - 23
Table 5-19
IconDescription
No IconProfile is not selected, but enabled.
The profiles are listed in priority order for use by the automatic roaming feature. Change the order by moving
profiles up or down. To edit existing profiles, click and hold one in the list and select an option from the menu to
connect, edit, disable (enable), or delete the profile. (Note that the Disable menu item changes to Enable if the
profile is already disabled.)
Profile Icons
Profile is disabled.
Profile is cancelled. A cancelled profile is disabled until a connect or login function is performed through
the configuration editor.
Profile is in use and describes an infrastructure profile not using encryption.
Profile is in use and describes an infrastructure profile using encryption.
Profile is in use and describes an ad-hoc profile not using encryption.
Profile is in use and describes an ad-hoc profile using encryption.
Profile is not valid in the device current operating regulatory domain.
Figure 5-30
Manage Profiles Context Menu
Changing Profiles
A completed profile is a set of configuration settings that can be used in different locations to connect to a wireless
network. Create different profiles to have pre-defined operating parameters available for use in various network
environments. When the
WLAN Profiles window displays, existing profiles appear in the list.
Page 94
5 - 24RD5000 RFID Integrator Guide
Figure 5-31
Click and hold a profile and select
the reader uses the authentication, encryption, ESSID, IP Config, and power consumption settings configured for
that profile.
Manage Profiles
Connect from the pop-up menu to set this as the active profile. Once selected,
Editing a Profile
Click and hold a profile and select Edit from the pop-up menu to display the Profile Wizard where the ESSID and
operating mode for the profile can be set. Use the
parameters. See Profile Editor Wizard on page 5-5.
Profile Wizard to edit the profile power consumption and security
Creating a New Profile
To create new profiles from the Manage Profiles window, click-and-hold anywhere in this window.
Figure 5-32
Select
address information, and power consumption level for the new profile.
Manage Profiles - Add
Add to display the Profile Wizard wherein the profile name and ESSID can be set. Set security, network
Deleting a Profile
To delete a profile from the list, click and hold and select Delete from the pop-up menu. A confirmation dialog box
appears.
Page 95
Wireless Applications5 - 25
Ordering Profiles
Click and hold a profile from the list and select Move Up or Move Down to order the profile. If the current profile
association is lost, the reader attempts to associate with the first profile in the list, then the next, until it achieves a
new association.
NOTE Profile Roaming must be enabled.
Export a Profile
To export a profile to a registry file, click and hold a profile from the list and select Export from the pop-up menu.
The
Save As dialog box displays with the Application folder and a default name of WCS_PROFILE{profile
GUID}.reg (Globally Unique Identifier).
Figure 5-33
If required, change the name in the
completes.
Save As Dialog Box
Wireless Status Application
To open the Wireless Status window, click the Signal Strength icon > Wireless Status. The Wireless Status window
displays information about the wireless connection.
Name field and click Save. A confirmation dialog box appears after the export
Figure 5-34
Wireless Status Window
Page 96
5 - 26RD5000 RFID Integrator Guide
The Wireless Status window contains the following options. Click the option to display the option window.
•
Signal Strength - provides information about the connection status of the current wireless profile.
•
Current Profile - displays basic information about the current profile and connection settings.
•
IPv4 Status - displays the current IP address, subnet, and other IP related information assigned to the reader.
•
Wireless Log - displays a log of important recent activity, such as authentication, association, and DHCP
renewal completion, in time order.
•
Versions - displays software, firmware, and hardware version numbers.
•
Quit - exits the Wireless Status window.
Option windows contain a back button to return to the main
Wireless Status window.
Signal Strength Window
The Signal Strength window provides information about the connection status of the current wireless profile
including signal quality, missed beacons, and transmit retry statistics. The BSSID address (shown as AP MAC Address) displays the AP currently associated with the connection. In Ad-Hoc mode, the AP MAC Address shows
the BSSID of the Ad-Hoc network. Information in this window updates every 2 seconds.
To open the
Figure 5-35
Signal Status window, click Signal Strength in the Wireless Status window.
Signal Strength Window
After viewing the
Signal Strength window, click the back button to return to the Wireless Status window.
Page 97
Wireless Applications5 - 27
Table 5-20
Signal Displays the Relative Signal Strength Indicator (RSSI) of the signal transmitted between
StatusIndicates if the reader is associated with the AP.
Signal QualityDisplays a text format of the Signal icon.
Tx RetriesDisplays a percentage of the number of data packets the reader retransmits. The fewer
Signal Strength Status
FieldDescription
the AP and reader. As long as the Signal Quality icon is green the AP association is not
jeopardized. If the icon is red (poor signal), an association with a different AP could be
warranted to improve the signal. The signal strength icon changes depending on the
signal strength.
Excellent Signal
Very Good Signal
Good Signal
Fair Signal
Poor Signal
Out of Range (no signal)
The radio card is off or there is a problem communicating with the radio card.
transmit retries, the more efficient the wireless network is.
Missed BeaconsDisplays a percentage of the amount of beacons the reader missed. The fewer transmit
retries, the more efficient the wireless network is. Beacons are uniform system packets
broadcast by the AP to keep the network synchronized.
Signal LevelThe AP signal level in decibels per milliwatt (dBm).
Noise LevelThe background interference (noise) level in decibels per milliwatt (dBm).
SNRThe access point/reader Signal to Noise Ratio (SNR) of signal strength to noise
(interference) in decibels per milliwatt (dBm).
Association CountDisplays the number of APs the reader connects to while roaming.
AP MAC AddressDisplays the MAC address of the AP to which the reader is connected.
Transmit RateDisplays the current rate of the data transmission.
Current Profile Window
The Current Profile window displays basic information about the current profile and connection settings. This
window updates every two seconds.
To open the
Current Profile window, click Current Profile in the Wireless Status window.
Page 98
5 - 28RD5000 RFID Integrator Guide
Figure 5-36
Table 5-21
Profile NameDisplays the current profile name the reader uses to communicate with the AP.
ESSIDDisplays the current profile ESSID name.
ModeDisplays the current profile mode, either Infrastructure or Ad-Hoc.
AuthenticationDisplays the current profile’s authentication type.
EncryptionDisplays the current profile’s encryption type.
ChannelDisplays the current profile’s channel setting.
CountryDisplays the current profile’s country setting.
Transmit PowerDisplays the radio transmission power level.
Current Profile Window
Current Profile Window
FieldDescription
IPv4 Status Window
The IPv4 Status window displays the current IP address, subnet, and other IP related information assigned to the
reader. It also allows renewing the address if the profile is using DHCP to obtain the IP information. Click
initiate a full DHCP discover. The
IPv4 Status window updates automatically when the IP address changes.
Renew to
To open the
IPv4 Status window, click IPv4 Status in the Wireless Status window.
Page 99
Wireless Applications5 - 29
Figure 5-37
Table 5-22
IPv4 Status Window
IPv4 Status Fields
FieldDescription
IP TypeDisplays the IP type for the current profile: DHCP or Static. If the IP type is DHCP, leased IP
address and network address data appear for the reader. If the IP type is Static, the values
displayed were input manually in the
IP Config tab on page 4-19.
IP AddressDisplays the reader’s IP address. The Internet is a collection of networks with users that
communicate with each other. Each communication carries the address of the source and
destination networks and the particular machine within the network associated with the user
or host computer at each end. This address is called the IP address. Each node on the IP
network must be assigned a unique IP address that is made up of a network identifier and a
host identifier. The IP address as a dotted-decimal notation with the decimal value of each
octet separated by a period, for example, 192.168.7.27.
SubnetDisplays the subnet address. Most TCP/IP networks use subnets to manage routed IP
addresses. Dividing an organization's network into subnets allows it to connect to the Internet
with a single shared network address, for example, 255.255.255.0.
GatewayDisplays the gateway address. A gateway forwards IP packets to and from a remote
destination.
DCHP ServerThe Domain Name System (DNS) is a distributed Internet directory service. DNS translates
domain names and IP addresses, and controls Internet e-mail delivery. Most Internet services
require DNS to operate properly. If DNS is not configured, Web sites cannot be located or
e-mail delivery fails.
Lease ObtainedDisplays the date that the IP address was obtained.
Lease ExpiresDisplays the date that the IP address expires and a new IP address is requested.
DNSDisplays the IP address of the DNS server.
WINSWINS is a Microsoft Net BIOS name server. WINS eliminates the broadcasts needed to
resolve computer names to IP addresses by providing a cache or database of translations.
MACAn IEEE 48-bit address is assigned to the reader at the factory to uniquely identify the adapter
at the physical layer.
Host NameDisplays the name of the reader.
Page 100
5 - 30RD5000 RFID Integrator Guide
Wireless Log Window
The Wireless Log window displays a log of recent activity, such as authentication, association, and DHCP renewal
completion, in time order. Save the log to a file or clear the log (within this instance of the application only). Click
the auto-scroll feature to automatically scroll down when a new items is added to the log.
To open the
displays.
Figure 5-38
Wireless Log window, click Wireless Log in the Wireless Status window. The Wireless Log window
Wireless Log Window
Saving a Log
To save a Wireless Log:
1.Click the Save button. The Save As dialog box displays.
2.Navigate to the desired folder.
3.In the Name filed, enter a file name and then click OK. A text file is saved in the selected folder.
Clearing the Log
To clear the log, click Clear.
Versions Window
The Versions window displays software, firmware, and hardware version numbers. This window only updates when
it is displayed. There is no need to update constantly. The content of the window is determined at runtime, along
with the actual hardware and software to display in the list. Executable paths of the software components on the list
are defined in registry, so that the application can retrieve version information from the executable. “File not found”
appears if the executable cannot be found at the specified path.
To open the
Ver sion s window, click Version s in the Wireless Status window.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.