2004 TC IP, Ltd. All rights reserved. TRANSCORE and Amtech are registered trademarks of TC IP, Ltd.
and are used under license. All other trademarks listed are the property of their respective owners. Contents
subject to change. Printed in the U.S.A.
For further information, contact:
TransCore
19111 Dallas Parkway, Suite 300
Dallas, Texas 75287-3106 USA
Phone:(972) 733-6600
Fax:(972) 733-6699
TransCore Action Center (TrAC)
19111 Dallas Parkway, Suite 300
Dallas, Texas 75287-3106 USA
Phone:(800) 755-0378
Fax:(972) 733-6695
For comments or questions about this document, e-mail tech.pubs@transcore.com
.
WARNING TO USERS IN THE UNITED STATES
FEDERAL COMMUNICATIONS COMMISSION (FCC) RADIO FREQUENCY
INTERFERENCE STATEMENT
47 CFR §15.105(a)
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device
pursuant to Part 15 of the Federal Communications Commission (FCC) rules. These limits are designed to
provide reasonable protection against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can radiate radio frequency (RF) energy and
may cause harmful interference to radio communications if not installed and used in accordance with the
instruction manual. Operating this equipment in a residential area is likely to cause harmful interference, in
which case, depending on the laws in effect, the users may be required to correct the interference at their
own expense.
NO UNAUTHORIZED MODIFICATIONS
47 CFR §15.21
CAUTION: This equipment may not be modified, altered, or changed in any way without permission
from TransCore, Inc. Unauthorized modification may void the equipment authorization from the FCC and
will void the TransCore warranty.
USE OF SHIELDED CABLES IS REQUIRED
47 CFR §15.27(a)
Shielded cables must be used with this equipment to comply with FCC regulations.
A license issued by the FCC is required to operate this RF identification device in the United States.
Contact TransCore, Inc. for additional information concerning licensing requirements for specific devices.
This chapter describes this guide’s purpose and intended audience. It
provides a list of topics covered in each section, a list of related
documents, and the symbols and typographical conventions used.
This IT2410 Tag Programmer User Guide contains installation and operating instruc-
tions for the hardware used to perform the IT2410 Tag Programmer reading (interrogation/verification) and writing (programming) functions. Figure 1-1 illustrates the
features of the IT2410 Tag Programmer.
Figure 1-1 IT2410 Tag Programmer (Top View)
Intended Audience
The intended audience for this user guide includes all personnel who need to accomplish the following tasks:
1-3
IT2410 Tag Programmer User Guide
•Connect the tag programmer to host personal computer (PC) for the purpose of
programming tags and be able to operate a PC and install electronic equipment by
connecting components with cables and power supply cords.
•Develop host software.
•Understand basic tag programming.
Plan and Organize
Tags programmable with the IT2410 programmer use sophisticated memory organization. It is highly recommended that the user plan and organize the necessary steps for
installing the tag programmer (refer to Chapter 4, "IT2410 Tag Programmer Setup"
for instructions) and for programming the tags (refer to user-supplied software instruc
tions).
Guide Topics
-
This operations guide contains the following chapters and appendixes.
Appendix C - Frequently Requested
Tag Programming Information
Appendix D - Application
Programming Interface
Describes the purpose, intended audience, guide topics, and
document conventions.
Provides an ov erview tag programmer functions and features.
Describes the hardware components and requir ements.
Provides information on setting up the tag programmer for first
use.
Provides the programmer’s physical and environmental
specifications.
Describes the interface configur ation to a host PC. Also shows
the power supply interface.
Provides information regarding IT2200-series tag programming.
Describes application program interface (API) information on
IT2410 programming methodology, and the protocol information
that is presented provides reference information relevant to
developing host software.
1-4
Typographical Conventions
The following conventions are used in this manual (Table 1 -1).
Table 1-1 Typographical Conventions
ConventionIndication
This procedure might cause harm to the equipment and/or
the user.
Concerns about a procedure.
Getting Started
CodeCode, including keywords and variables within text and as
Dialog Box TitleTitle of a dialog box as it appears on screen.
FunctionStart with the characters G4 and add mixed case with no
Menu ItemAppears on a menu.
NoteAuxiliary information that further clarifies the current
NULZero-value ASCII character or a zero-value byte.
NULLZero-value pointers are null-terminated strings that refer to
separate paragraphs, and user-defined program elements
within text appear in courier typeface.
underscores, and include parentheses after the name, as in
G4FunctionName().
discussion. These important points require the user’s
attention. The paragraph is in italics and the word Note is
bold.
strings of printable ASCII characters with a zero-value byte
placed in memory directly after the last printable character of
the string.
1-5
IT2410 Tag Programmer User Guide
1-6
2
IT2410 Tag Programmer Overview
IT2410 Tag Programmer Overview
This chapter presents an overview of the IT2410 Tag Programmer.
Purpose of Tag Programmer
The tag programmer is a multi-function product used to program IT2200-series tags.
Programmer functions include frame programming, fixed-frame locking, and data
frame interrogation.
Communications
IT2410 Tag Programmer Overview
Chapter 2
The tag programmer connects to a PC serial port that complies with the RS–232 communications interface standard. A PC-to-programmer RS–232 serial cable is provided
with the tag programmer. An Ethernet interface connection is also provided
Programming Head
The programming head on the top of the tag programmer provides a mechanical interface to the tag. The programming head includes a drop-in tag well that is compatible
with some IT2000-series tags. By placing the tag in the tag well the tag is correctly
positioned to the programmer’s internal antenna.
Programmer head.
Figure 2-1 shows the IT2410 Tag
2-3
IT2410 Tag Programmer User Guide
Figure 2-1 Tag Programming Head
Indicator LEDs
The tag programmer uses light-emitting diodes (LEDs) to indicate the status of its
operations. These LED indicators identify operation, functionality, and errors.
2-2 illustrates the external status indicators.
Figure 2-2 IT2410 LED Status Lights
Figure
2-4
IT2410 Tag Programmer Overview
Table 2-1 lists the indicator lights and describes their meanings.
Table 2-1 Indicator Lights, Descriptions, and Actions
INDICATOR LEDDESCRIPTIONACTION
PROGRAM (GREEN) The tag is being programmed
VERIFY (GREEN)The tag programmer ha s read
ERROR (RED)The tag programmer has
POWER (GREEN)Po wer is being supp lied to the
READY (GREEN)The tag programmer is ready
a. Refer to page iii for the TrAC telephone and fax numbers.
Standard Formats
The IT2410 Tag Programmer can code tag data using formats specified by wireless
communications standards such as the California Title 21 Regulation for AVI Com
patibility, the International Standards Organization (ISO), the Association of American Railroads (AAR), the American National Standards Institute (ANSI), and the
American Trucking Association (ATA).
with user-specified data.
valid data from the specified
tag frame.
detected an error in the
programming or verifying
process or during other
operations.
tag programmer.
to accept commands from the
PC.
Status only — no action
required by user
Status only — no action
required by user
Check system configuration,
cabling, and power supply to
system. Retry programming
sequence after system check.
If system still not working,
contact TransCore for
support.
Status only — no action
required by user
Status only — no action
required by user
a
-
Anti-Static Wrist Strap
The IT2410 Tag Programmer includes a wrist strap for the user to wear when programming tags. The wrist strap prevents damage to tag circuits from electrostatic discharge (ESD). The wrist strap has a banana plug (see Figure 2-3) that inserts into the
front of the tag programmer (Figure 2-4).
2-5
IT2410 Tag Programmer User Guide
Figure 2-3 Banana Plug on ESD Wrist Strap
Power
Figure 2-4 ESD Wrist Band Socket Location
The IT2410 Tag Programmer is powered from a standard 120 VAC outlet. A ULapproved 12 VDC power supply is included with the standard tag programmer. Refer
to Appendix B to this guide for a pin-out diagram of the power connector.
2-6
3
IT2410 Tag Programmer Hardware
IT2410 Tag Programmer Hardware
This chapter describes the tag programmer’s hardware components and
requirements.
Components
The IT2410 Tag Programmer components include the programmer, power supply,
interconnecting cables, and anti-static wrist strap. The hardware is designed to operate
with a PC. This section describes the hardware requirements for proper operation of
the IT2410 programmer. This section also includes requirements for ESD protection.
Hardware Requirements
IT2410 Tag Programmer Hardware
Chapter 3
The customer-supplied PC requires the following minimum specifications:
•PC with Intel Pentium (or equivalent microprocessor) 90 MHz, or higher
•Microsoft Windows 2000, 98/95, or NT 4.0 with Service Pack 3 or higher
•32 MB RAM
•CD-ROM drive
•Available serial port
•VGA or high-resolution monitor
•One 3.5 in. floppy drive, one CD-ROM drive, and a hard drive
•Mouse or other Windows pointing device
ESD Protection Requirements
If the user does not take proper precautions, ESD damage can occur to the programmer and tags during programming. The IT2410 programmer has an external banana
plug socket that provides a point of attachment for the ESD wrist strap included with
the tag programmer.
Static discharge may cause significant damage that can adversely affect a tag’s operating performance. The following are typical symptoms of static discharge:
•Inability to program the tag
•Greatly reduced operating range
3-3
IT2410 Tag Programmer User Guide
•Tag operating failure
Static is generated by friction and can often build to damaging levels. The following
are some of the causes of static:
•Shoes moving across a carpeted or plastic floor
•Hot air blowing into a room from a hot-air duct
•Rubbing tags together
•Sliding tags across a table top
•Friction created while wearing certain types of clothing
ESD Workstation Design
Well-designed workstations use a system of multiple protection elements. At a minimum, this protection should include anti-static bench mats and wrist straps to discharge static safely away from the equipment.
As an additional measure to prevent static damage, keep tags in their original packaging, on an anti-static mat, or within an ESD-inhibiting container until you are ready to
program the tags.
Using the ESD Wrist Strap
Always attach the ESD strap before beginning programming operations. Perform the
following steps:
1.Place the strap on the wrist and snap the ESD strap to the elastic wristband.
2.Connect the banana plug (see Figure 2-3 on page 2-6) on the ESD wrist strap to
the ESD banana socket on the front of the tag programmer (see Figure 2-3 on
page 2-6).
3-4
4
IT2410 Tag Programmer Setup
This chapter explains how to set up the tag programmer for first use.
Equipment List
User must wear the wrist strap when programming tags. Failure to do so can result
in ESD damage to the tag.
The IT2410 Tag Programmer includes the following components:
•Tag programmer unit
IT2410 Tag Programmer Setup
Chapter 4
IT2410 Tag Programmer Setup
•External 12 VDC power module
•ESD static suppression wrist strap
•PC-to-programmer RS–232 serial cable with DB-9 connectors on both ends
Figure 4-1 shows the tag programmer and peripheral components.
4-3
IT2410 Tag Programmer User Guide
Figure 4-1 IT2410 Tag Programmer System
Note: To maintain FCC Part 15 Class B compliance, operate the tag programmer in
a horizontal position.
Connecting the IT2410 Tag Programmer to a PC
Use the following procedure to connect the equipment:
1.Place the tag programmer on a flat, stable surface.
2.Connect the power supply to the power socket on the tag programmer’s back
panel.
3.Connect the power supply plug to a properly grounded — three-prong — AC
outlet.
4.Connect the PC-to-programmer RS–232 serial cable to the COM1 port on the
PC. Connect the other cable end to the RS–232 connector on the tag
programmer’s back panel.
4-4
IT2410 Tag Programmer Setup
5.Connect the Ethernet cable to the Ethernet connector on the PC. Connect the
other cable end to the Ethernet connector on the tag programmer’s back panel.
6.Connect the ESD wrist band banana plug to the socket on the tag programmer’s
front panel.
Figure 4-2 shows the location of the power and serial interface connectors on the tag
programmer’s back panel.
Powering Up
Figure 4-2 Power an d Serial Interface Connections
When all the equipment is connected as described in the preceding section, apply
power to the system components as follows:
1.Switch on the PC and verify its proper operation.
Note: Do not place a tag in the programmer head at this time. The indicator lights
operate differently when a tag is already in place.
2.Switch on the tag programmer’s power switch located on the programmer’s rear
panel. The green POWER LED illuminates.
Note: The operating system will initiate a self-test upon power up or after power
interruption.
When the tag programmer’s internal power-on self-test is successfully completed, the
user is notified as follows:
•The green READYindicator light illuminates.
•After approximately 10 seconds, the tag programmer sounds three short tones in
rapid succession.
If the tag programmer fails to power up, the READY LED goes out, and the ERROR
LED illuminates and the alarm beeps once for one second.
The IT2410 unit is now ready to start programming tags.
4-5
IT2410 Tag Programmer User Guide
Programming Cycle
When the programming cycle is initiated by the remote host system, the PROGRAM
LED illuminates and the alarm beeps for an approximate duration of 0.25 seconds,
once a second, for a 10-s period, or until the programming operation has completed.
The operator has an approximate 10-s time-out period in which to place an operating
IT2200-series tag on the programming head fixture. Once the tag is in the fixture and
the programmer detects the valid RF data, the programmer executes the specific write
command from the host.
If the programming is successful then the PROGRAM LED goes out and the alarm
sounds three times for approximately 0.25 seconds each.
If the programming cycle is unsuccessful or a tag is not detected within the 10-s
period, the ERROR LED illuminates and the alarm sounds once for approximately 1
second.
Verifying Cycle
When the verify cycle is initiated by the remote host system, the VERIFY LED illuminates and the alarm beeps each second for an approximate 10-s period or until the verify operation is complete.
The operator has a 10-s time-out period in which to place an operating IT2200-series
tag on the programming head. Once the tag is placed in the fixture and the program
mer can detect the valid RF data, the programmer executes the specific read command
from the host.
If the verifying is successful the VERIFY LED goes out and the alarm sounds three
short beeps.
If the verifying cycle is unsuccessful or if a tag is not detected within the 10-s period,
the ERROR LED illuminates and the alarm beeps for 1 second.
The tag programmer incorporates an audible indicator that is controlled by software.
The indicator’s sound is pleasing to the ear (2200 Hz) and can be easily heard while
operating near the unit under normal conditions. The alarm audibly indicates the status
of programmer operations. Table 4-1 lists the various programmer operations and the
corresponding alarms that sound as an audible operation verification.
Table 4-1 Programmer Opera tions and Corresponding Alarms
Programming Cycle1 beep per second for 10 s0.25 s each25
Successful Programming Cycle3 beeps0.25 s each50
Unsuccessful Programming Cycle1 beep3.0 s100
VERIFY Cycle1 beep per second for 10 s0.25 s each25
Successful VERIFY Cycle3 beeps0.25 s each50
Unsuccessful VERIFY Cycle1 beep3.0 s100
4-7
IT2410 Tag Programmer User Guide
4-8
A
Tag Programmer Specifications
Tag Programmer Specifications
Appendix A
Tag Programmer Specifications
This appendix lists the tag programmer physical and environmental
specifications.
Table A-1 lists the IT2410 Tag Programmer parameters and specifications.
Table A-1 IT2410 Tag Programmer Physical and Environmental Specifications
ParameterSpecification
Size (W x H x D)14.3 x 3.2 x 11.5 in
(36.3 x 8.1 x 29.2 cm)
Weight6.8 lbs (3.1 kg)
Input Voltage120 VAC
Power Consumption36 W
Operating Temperature32°F to +131°F
(0°C to +55°C)
Storage Temperature-4°F to +185°F
(-20°C to +85°C)
Humidity95% noncondensing (within 77°F to
131°F (25°C to 55°C))
EnclosureDustproof
Operational Vibration1.04 G
density-uniform 0.0022 G
per axis
Shock4 G
duration in all 3 axes
PC-to-Programmer CableRS–232 (DTE)
RF PowerPr ogrammin g he ad : 1. 0 mW
FCC ClassificationPart 15, site license not required
, 5-500 Hz, power spectral
rms
zero-to-peak
by 11 ms half-sine
2
/Hz, 1 hour
Environmental
The programmer is designed to operate in typical office environment conditions. The
programmer performs to the specifications listed in
with a warm-up time of not more than three minutes.
Table A-1 and is ready to program
A-3
IT2410 Tag Programmer User Guide
Mean Time Between Failure (MTBF)
The programmer has a minimum MTBF of 20,000 hours.
Maintainability
The interval for periodic maintenance is least one year. The mean time to repair
(MTTR) is less than 30 minutes.
A-4
B
PC Interface Definitions
PC Interface Definitions
Appendix B
PC Interface Definitions
The tag programmer’s PC interface complies with the RS–232 standard for data communications equipment and uses the protocol settings listed in Tabl e B-1. Figure B-1
shows the pin-out locations for the power plug.
Table B-1 PC Interface Protocol Settings
ProtocolSetting
Data Rate38,400 bps (factory default)
Data Bits8
ParityNone
Stop Bits1
Software Flow ControlNone
Hardware Flow ControlNone
Figure B-1 Pin-out Diagram for Power Plug
B-3
IT2410 Tag Programmer User Guide
B-4
C
Frequently Requested Tag
Programming Infor mation
Frequently Requested Tag Programming Information
Appendix C
Frequently Requested Tag Programming
Information
This appendix explains frequently requested information regarding
IT2200-series tag programming information.
Identification, Serial Number, and the Global Password
TransCore documentation and/or host software references a tag identification number
(ID) that corresponds to the Title 21 ID. The Title 21 ID is a unique identifier used by
radio frequency identification systems in California. This is found in the first 8 hexa
decimal characters (32 bits) of the tag’s general Page 1. In all IT2200-series tags, this
ID is either the same as the serial number from Page 0, or other application specifica
tions.
-
-
The tag serial number (S/N) is the first 8 hexadecimal characters (32 bits) in general
Page 0. The global password is 64 bits long and the default is generated by repeating
the serial number twice. Once this global password is known, it can be used to change
read and write passwords on any of the general pages of data in the tag, change which
frames are designated nonvolatile, and lock pages of data so that they cannot be
changed unless the page is unlocked first using the global password.
These two identifying numbers are in addition to any customer-specific ID numbers.
Most of the customers that use the IT2200-series tags employ one of the other general
pages of data available in the tag to store their own unique ID number, which usually
corresponds to a patron account number.
The global password in the IT2200-series tag acts like a master key, which can be
used to perform crucial tag operations and is meant to be controlled by the owner
agency. It has a default setting that is created from the tag’s unique serial number, but
can be changed by the owner agency, if desired.
As with personal identification numbers, or PINs, which are used with automatic teller
machines, the first time that a tag’s global password is changed, it is from the default
setting. You must know the tag’s current global password before you can change it. To
change it, you must execute a write request to owner Page 4. The host program that is
being used to communicate with the reader should prompt you for the current global
password as well as the new password. Once you change the global password, safe
guard it to prevent unauthorized access to the tag.
Reading and Setting Nonvolatile Status for General
Pages
Note: It is important to make any critical information in the tag nonvolatile, or the
information is lost when the tag batteries run down, or are changed.
To find out which general pages of data have been set to nonvolatile status, read owner
Page 3 by using the global password.
-
C-6
Frequently Requested Tag Programming Information
Perform a read request of owner Page 3 and enter the global password when you are
prompted for it. The read response should return 4 hex characters (16 bits) of data,
each bit corresponding to a general page of data. If the data bit is a logic 1 for the gen
eral frame in question, then that frame is nonvolatile, and a copy is saved in
EEPROM. For example:
Returned data: D400
Hexadecimal to binary conversion:1101 0100 0000 0000
MSB LSB
The most significant bit (MSB) corresponds to general Page 0, and the least significant bit (LSB) corresponds to general Page 15, so for this example Pages 0,1,3, and 5
are nonvolatile.
To change the status of the nonvolatile bits, perform a write request to owner area
Page 3 using the global password. Depending on the host program used, the write data
is entered in hexadecimal form. For example, to make only frames 3, 4, and 12 non
volatile, the write data is entered as 1808 hex. This translates to the following binary
data: 0001 1000 0000 1000.
-
Note: To preserve factory configuration data and built-in-self-test diagnostic information, general Pages 0 and 1 are saved in nonvolatile memory despite the bit settings in owner Page 3.
Locking Frames (Page Locks)
The page lock feature is used to designate general pages as read only. Once a page is
locked, the global password must be used to unlock it before a successful write request
can be processed to change the data in that frame. The page lock bits are stored in
owner area Page 0.
To read the page lock bits, execute a read request of owner Page 0 and enter the global
password when the host program prompts you for it. The read response should return
4 hex characters (16 bits) of data, in which each bit corresponds to a general page of
data. If the data bit is a logic 1 for the general frame in question, then that frame is
locked and is read only. For example:
Returned data: c160
Hexadecimal to binary conversion:1100 0001 0110 0000
MSB LSB
The MSB corresponds to general Page 0, and the LSB corresponds to general Page 15.
In this example Pages 0,1,7,9, and 10 are locked.
C-7
IT2410 Tag Programmer User Guide
To change the status of the nonvolatile bits, use the global password to perform a write
request to owner area Page 0. Depending on the host program used, the write data is
entered in hexadecimal form. So for example, to lock frames 4 and 7, the write data is
entered as 0900 hex. This translates to binary data as follows: 0000 1001 0000 0000.
Auto Beep on Acknowledge and Read Sequences
The IT2235 Tag features an Auto Beep function. This lets the tag emit various beep
sequences after receiving either a Title 21 acknowledge (ACK) command or a Title 21
Read Request. A byte, called the mode bits, programmed into general Page 0 controls
this function. The mode bits are detailed in
Table C-2 Mode Bits
Table C -2.
Field Name
EEPROM Config Mode — Factory use only112
Auto Beep A/V Code Bit 4113
Auto Beep A/V Code Bit 3114
Auto Beep A/V Code Bit 2115
Auto Beep A/V Code Bit 1116
Auto Beep A/V Code Bit 0117
Auto Beep On ACK118
Auto Beep On Read119
Bit No.
The EEPROM configuration mode bit is for factory use only. When setting the Auto
Beep function, always make this bit a logic 0.
The other bits in this byte all apply to the Auto Beep function. The Auto Beep A/V
bits 4 through 0 can be set to emit the desired A/V sequence based on the information
presented in
Table C-3 A/V Options Bits Decoding
Tabl e C -3.
C-8
Bit 4Bit 3Bit 2Bit 1Bit 0Audio Sequence
00000None
00001HI-HI-HI-HI
00010LO-LO-LO-LO
00011LO-HI
00111Long LO
Frequently Requested Tag Programming Information
Table C-3 A/V Options Bits Decoding (continued)
01011HI-LO-HI-LO
01111LO-LO-LO
10011HI-HI-HI
10111HI-HI
11011Long HI
11101LO
11110HI
11111HI
The Auto Beep on ACK bit, when set to 1, enables the automatic initiation of the
encoded A/V sequence determined in Auto Beep A/V code bits 0 to 4 after a Title 21
ACK is processed.
The Auto Beep on read bit, when set to 1, enables the automatic initiation of the
encoded A/V sequence determined in Auto Beep A/V code bits 0 to 4 after a Title 21
read request has been processed, and the tag enters an idle state.
For example, if you want the tag to beep three times with a HI tone whenever it
receives a Title 21 read, program the byte to a value of 01001101, or a hex 4D. Pro
gram general Page 0 with this byte, and the following sequence must occur:
1.Read the page lock bits (owner Page 0), note their values for later restoration.
2.Write to owner Page 0 to change the lock bit for general Page 0 to a value of 0.
3.Write to general Page 0, changing only the mode bits field to the value desired
(hex 4D in the example on page C-7).
4.Write to owner Page 0 to change the lock bit for general Page 0 to a value of 1.
Using the Custom Message Feature
The IT2235 Tag can store a custom message of up to 16 ASCII characters, and display
the message on the LCD when the tag pushbutton is pressed. To use this capability,
program the custom message into one of the general data pages (Pages 2 to 15), and
then send a GEN ACK command with a pointer indicating where the custom message
is stored in tag memory.
-
The GEN ACK command has a field called the LCD message page pointer that consists of 1 byte (8 bits). If the custom message, for example, is stored in general Page 5,
this page pointer in the GEN ACK command is set to a value of 00000101 binary, or
05 hex.
The LCD controller always interprets the data as ASCII data. Therefore, if a GEN
ACK command is sent that points to a custom message page and the page has normal
C-9
IT2410 Tag Programmer User Guide
hex data, it still will be interpreted as ASCII and the tag will display an unintelligible
message on its LCD.
To discontinue using the custom message, send the tag another GEN ACK command
with 0’s in the LCD message page pointer field.
C-10
D
Application Program Interface
This appendix describes the application program interface (API) for the
IT2410 Tag Programmer.
Interface Definitions
Communication between the tag programmer and host occurs via a serial RS–232
interface or an Ethernet (TCP/IP) interface.
describes the TCP/IP interface. “Communications Protocols” on page D-4 describes
the serial protocol. This platform performs data transfer, commands, and responses in
a binary-coded format similar to the ISA data structure, but with error correcting pro
tocol (ECP) additions to maintain error-free communications.
Application Program Interface
Appendix D
Application Program Interface
“Ethernet Communications Conduit”
-
Ethernet Communications Conduit
All Ethernet parameters are factory set initially and will need to be reset to the correct
customer configuration in the field to function properly. All parameters except the
media access control (MAC) address can be changed in the field. These parameters
are factory defaults:
•MAC address
•Programmer IP address
•Host IP address
•Gateway IP address
•Network mask
TransCore recommends that you first configure the Ethernet settings using the standard RS–232 communications conduit. Subsequent changes can be made using either
the RS–232 or Ethernet conduits. Changes to Ethernet settings will not take effect
until after the unit has been reset either by command or by switching the power off
and on.
The IT2410 Tag Programmer operates as a TCP/IP client. The programmer attempts
to connect to a listening socket server (also known as host). The Ethernet communica
tions occur using port 8000.
-
Responses to all command requests are categorized as either synchronous or asynchronous. Some requests have a synchronous response associated with them. Some
requests also have an asynchronous response associated with them. Some asynchro
nous responses occur independent of any request by the application. Some of these
responses contain data, the content and format of which is included with the definition
of each command.
-
D-3
IT2410 Tag Programmer User Guide
RS–232 Communications Conduit
The RS–232 conduit is configured with the defined communications parameters listed
in
Table D-1.
Table D-1 Communications Parameters
ParameterValue
Baud19,200 or 38,400 (factory default)
Data bits8
ParityNone
Stop bits1
Software flow controlNone
Hardware flow controlNone
Communications Protocols
TransCore reader systems use a programmer-to-host software protocol. The protocol
information that is presented in this section provides reference information relevant to
developing host software.
Each message is framed with the start-of-message (som) and end-of-message (eom)
characters so that the host computer can detect the beginning and end of each mes
sage.
General Software Information
All tag programmer commands are preceded by a start-of-message (<som>) ampersand character (&) followed by an end-of-message (<eom>) percent character (%). All
data after the <eom> character is ignored until the next <som> is detected.
Any & character that occurs in the message between the <som> and <eom> is converted to the backslash and at character (\@) sequence. Any % character is converted
to the \? character sequence. All \ characters are converted to the \\ sequence. All
<som> and <eom> character conversions are performed after the cyclic redundancy
check (CRC) has been performed on the transmit data and before the CRC is per
formed on the receive data.
The programmer and host interface use the following communications protocol for
command responses and asynchronous responses.
Application Program Interface
Binary-coded integer messages are contained in a protocol defined by:
<som> <seq #> <len> <resp> [<data>] <crc> <eom>
where
<som> - start of message is used to find the start of the next message following a mes-
sage time-out or following the end of the previous message. All data is ignored until
the
<som> is detected. The start of message is defined as the ASCII character &.
<seq #> - a combination of <seq #> and <len> makes 16 bits or 2 bytes of data.
The sequence number is 6 bits and the length is 10 bits. The sequence number is used
for the error detection scheme. The value for sequence number may represent any
number between 0 and 63 with the following restrictions:
•The sequence number for command responses matches the sequence number of
the last received command.
•The sequence numbers for asynchronous messages are 0,2,4,6,...,62 and is incre-
mented after each new asynchronous message.
<len> - length is a group of 10 binary bits that specifies the number of bytes in the
response and data fields.
<resp> - response is 2 bytes long to indicate the status of the command received by
the programmer from the host. Responses are described in
Table D-2.
D-5
IT2410 Tag Programmer User Guide
Table D-2 Command Responses and Definitions
ResponseMeaning
0000HCommand complete
0001HCommand in progress
0002HCommand data invalid
0003HCommand invalid
0004HCommand aborted
3XXXHTag data
3000HNo-Tag Data Status Code
3001HIT2200 Tag Data Status Code
3002HReserved
8XXXHDiagnostic data
8000HPower-Up Diagnostic Report Status Code
8001HBackground Diagnostic Report Status Code
8002HDownload Active
AXXXHDiagnostics Statistical Data
[<data>] - the data field may be of length from 0 to 1021 bytes and is associated
with each specific response. See
“Command List” on page D-10, for a complete list-
ing of tag commands.
<crc> - cyclic redundancy check, or CRC, is 2 bytes or 16 binary bits long, denoting
a CRC-XMODEM result generated on each message byte exclusive of the
<eom>. The polynomial for the CRC calculation is X
16+X12+X5
+1 with a feedback of
<som> and
1021H for a XMODEM type CRC.
<eom> - end of message aids in finding the end of the message. All data after the
<eom> is ignored until the next <som> is detected. The end of message is defined as
the ASCII character
%.
Serial Data Acknowledge
The programmer and host interface use the data acknowledge protocol as noted below.
Binary-coded integer messages contained in a protocol are defined by:
D-6
<som> <seq #> <len> <resp> <crc> <eom>
where
<som> - start of message finds the start of the next message following a message time-
out or following the end of the previous message. All data is ignored until the <som>
is detected. The start of message is defined as the ASCII character &.
Application Program Interface
<seq #> - a combination of <seq #> and <len>, makes 16 bits or 2 bytes of data.
The sequence number is 6 bits and the length is 10 bits. The sequence number is used
for the error detection scheme. The value for sequence number may represent any
number between 0 and 63. The sequence number for the acknowledge (ACK)/not
acknowledge (NACK) message matches the sequence number of the last received
message.
<len> - length is a group of 10 binary bits that specifies the number of bytes in the
response. The value of length is 1 for ACK/NACK responses.
<resp> - response is 1 byte long to indicate the status of the data response received
by the programmer from the host.
Table D-3 Message Responses and Definitions
ResponseMeaning
DDHData acknowledge (ACK)
EEHData invalid (NACK)
Table D-3 lists the responses.
<crc> - cyclic redundancy check, or CRC, is 2 bytes, or 16 binary bits long, denoting
a CRC-XMODEM result generated on each message byte exclusive of the
<eom>. The polynomial for the CRC calculation is X
16+X12+X5
+1 with a feedback of
<som> and
1021H for a XMODEM type CRC.
<eom> - end of message aids in finding the end of the message. All data after the
<eom> is ignored until the next <som> is detected. The end of message is defined as
the ASCII character
%.
Ethernet Asynchronous Command and Response
Protocol
Tag data or diagnostics data generate asynchronous or command responses. Asynchronous responses have no associated commands. An interrupt occurs notifying the
lane controller or host computer of a response to read data from the first-in-first-out
(FIFO) data I/O address if interrupt mode is enabled. Otherwise, polling the FIFO
buffer status register notifies the lane controller or host computer to asynchronous
responses. The reader and host interface use the communications protocol for com
mand responses and asynchronous responses shown here. Binary-coded integer messages contained in a protocol are defined by:
<len> <resp> [<data>]
where
-
<len> - length specifies the number of bytes in the response and data fields. The
range for this field is 2 to 1022.
<resp> - response is one-word long to indicate the status of the command received by
the host from the reader. The responses are shown in
Table D-4.
D-7
IT2410 Tag Programmer User Guide
Table D-4 Asynchronous Responses and Definitions
ResponseMeaning
0000HCommand complete
0001HCommand in progress
0002HCommand data invalid
0003HCommand invalid
0004HCommand aborted
3XXXHValid read tag data
3000HNo-tag data status code
3001HIT2200 Read/write tag data stat us code
3002HReserved
8XXXHDiagnostic data
8000HPower-up diagnostic report status code
8001HBackground diagnostic report status code
8002HDownload active
AXXXHDiagnostics statistical data
[<data>] - data field may be of length from 0 to 1020 bytes and is associated with
each specific response. See the
“Command List” on page D-10 for more information.
Serial Error Detection and Recovery for the Programmer
Rather than implementing a complex ECP, the IT2410 Tag Programmer uses a method
of error detection and recovery, which consists of a combination of CRC, sequence
numbers, a simple structured protocol with message delimiters, a message length, and
message time-outs. By using this combination of error detection and structured com
munications protocol, a high-level of confidence is obtained without the overhead
associated with standard ECP.
These methods are described in the following sections.
-
D-8
Serial Message Failures
Serial data transmission failures can occur in one the three forms:
•Modified byte
•Extra byte
•Lost byte
Application Program Interface
Modified bytes are detected by the CRC check. Extra bytes are detected by the CRC
and are compensated for by the
be implemented to prevent lockups caused by anticipation of additional bytes being
received as specified by the
lows:
<som> and <eom>. Lost bytes require that time-outs
<len>. The time-outs implemented are described as fol-
•Any received <som> ... <eom> should take less than 500 ms. This assumes 1500
characters at 19.2 k baud and long commands are followed by short responses.
•The asynchronous data <som> ... ACK ... <eom> should take less than 1.0 s.
•A command <som> ... response ... <eom> may take considerably longer because
of command processing time.
If a message CRC or time-out error occurs during the command/response message
sequence, the error reporting will occur as follows.
•For a CRC failure that occurs during the command message, the programmer
reports the error to the host using the NACK message.
•For a CRC failure or time-out failure that occurs during the response message, the
host reports the error to the programmer by retransmitting the command message.
If a message CRC or time-out error occurs during an asynchronous response/ACK
message sequence, the error reporting will occur as follows:
•For a CRC failure that occurs during the asynchronous response message, the host
should report the error to the programmer using the NACK message.
•For a CRC failure or time-out failure that occurs during the ACK message, the
programmer reports the error to the host by retransmitting the asynchronous
response message.
D-9
IT2410 Tag Programmer User Guide
Serial Sequence Numbers
The host maintains control of the sequence numbers for commands and their associated responses.
•A command is not complete until a response with a proper sequence number is
received from the programmer.
•A response is not complete until the host changes the command sequence number
from the previous command.
If the command sequence number does not change, the response is retransmitted by
the programmer.
Sequence numbers for asynchronous response communications sequences are maintained by the programmer.
•An asynchronous response transmission sequence is not complete until an ACK is
received from the host with a proper sequence number.
•An ACK is not complete until the programmer changes the data sequence number.
If the data sequence number does not change, the ACK is retransmitted by the host.
To prevent asynchronous messages from being interpreted as command responses
when host and programmer sequence numbers pass each other, the host sequence
numbers should be odd (1,3,5,7,...,63) and programmer sequence numbers should be
even (0,2,4,6,...,62).
Serial Asynchronous Responses
Tag data or diagnostics data will generate asynchronous responses, that is, responses
that have no associated commands. If the host begins sending a command during this
time, the host ignores the asynchronous response. The programmer automatically
retransmits the asynchronous response following the command execution.
Command List
The command list (Tabl e D-5) describes the command requests that are used between
the programmer and the host computer and/or lane controller. Within the list, the commands are further divided according to their functionality, for example, communications and real-time clock.
D-10
Table D-5 Tag Programmer Commands
Command TypeCommand
Configuring the Programmer
Identify
Restore Programmer Configuration
Reset Programmer
Save Programmer Configuration
Get Programmer Security Characters
Set Programmer Security Characters
Get Programmer Serial Number
Set Programmer Serial Number
Get Programmer Control
Set Programmer Control
Set Programmer Password
Note: Command 3000H (host tag command) has an extended command set that parallels the tag-reader command set for the interface between the reader and tag on the
RF interface.
Identify
The Identify command requests the identification (ID) and version numbers of the
programmer application firmware, the RF module firmware, and the programmer
hardware version.
Data associated with Identify command for the programmer is shown in Table D-6.
Table D-6 Identify Command Code
Byte Bit 7
0-7Vendor
8-9Hardware version
10-29Boot S/W ID
30-49Application S/W ID
50-69S/N on programmer
70-89Reserved field on programmer
Ve nd or — The first group of eight ASCII characters provides the host with a vendor
name, AMTECH, followed by two spaces. The symbol ^ indicates a space or an ASCII
character 20H in this document.
Hardware version — The next two bytes provide a version of the hardware. The general format of the vendor and hardware version is illustrated below:
D-12
Application Program Interface
DescriptionASCII Characters
VendorAMTECH^^
Hardware version XX
Boot software IDs — The remaining four groups provide 20-character version IDs of
the boot and application software for the reader, and alternately serve as a method to
read the programmer serial number. In the reader, each software ID is composed of a
9-character Amtech internal part number and an 11-character software version. The
general format for each of the four software IDs is illustrated below:
DescriptionASCII Characters
Software ID
Part numberXXXXX-XX^
VersionVER^XX.XX^^^
Programmer S/N — For the programmer, the first four bytes (50-53) of the software
field return the programmer serial number.
Restore Programmer Configuration
The Restore Programmer Configuration command is used to return the programmer to
its original factory default settings. The Restore Programmer Configuration command
requests the programmer to reconfigure its current internal settings (RF frequency, RF
attenuation, etc.) to what is saved in nonvolatile memory or to default factory settings.
The data associated with the Restore Programmer Configuration is shown in Table D-
7. This data defines the source (factory defaults or NVM) of the configuration parameters of the programmer. The NVRAM parameters are the last saved using the Set Programmer Configuration command. Upon command, the programmer changes the
programmer configuration to the values from the selected source immediately follow
ing the transmission of the command response (Table D -8).
Table D-7 Programmer Configuration Data
Bits 7 - 1Bit 0
SpareProgrammer configuration
control
-
D-13
IT2410 Tag Programmer User Guide
Table D-8 Values for Programmer Configuration Bit
ValueDefinition
0Factory defaults
1Nonvolatile memory (NVRAM)
All the factory defaults for the programmer and the configuration parameters restored
from NVRAM or from factory defaults are shown in
Check tag configurationN/A
Tag response append dataN/A
Tag command modeN/A
Custom auto tag command tableN/A
Custom auto user sequence tableN/A
Programmer controlTag command time-out 10 seconds, buzzer
enabled
a. The programmer is designed so that the RF attenuation is fixed in the firm-
ware to a setting of 0 dB, however, there is a fixed attenuation in the RF
module to allow limited functional range of approximately 0.5 ft (0.15 m)
for the built-in antenna.
Reset Programmer
The Reset Programmer command causes all the programmer parameters to initialize
to a power-up state (based on the NVM settings) and forces the internal logic card
power-on diagnostics to be initiated (
Table D-10 Reset Data
Table D-10).
D-14
ByteBit 7
0Reset control (most significant byte)
1Reset control (least significant byte)
Application Program Interface
A command complete response is associated with this command, followed by a
8000H asynchronous response type data code with the results of the power-on diag
nostics test. All buffered tag responses will be deleted after execution of this command. Execution time is approximately 10 s.
Reset Control — This field contains a unique value to prevent a bit error from inadvertently causing a soft reset of the programmer. This field must contain the hexadecimal value A5A5 to invoke a reset of the programmer.
-
Save Programmer Configuration
The Save Programmer Configuration command causes the current configuration of
the programmer to be saved to NVM. There is no data associated with the Save Pro
grammer Configuration command. See the “Restore Programmer Configuration” on
page D-13 for a listing of the parameters that are saved and the factory default values
for each.
-
Get/Set Programmer Security Characters
Unique security characters are programmed into each customer tag programmer at the
time of manufacture and are assigned and tracked by TransCore. Each security charac
ter set is linked to a programmer serial number, also assigned and managed by
TransCore. The security codes are programmed at the factory prior to shipment.
The Get Programmer Security Character command requests the programmer’s
assigned security characters. Security characters are bit patterns in predetermined
positions in the American Trucking Association page. The Set Programmer Security
Character command sets the programmer security characters.
Invalid security characters are reported using command data invalid response code as
specified in the
D-7.
The data associated with the Get/Set Programmer Security Characters command is
shown in
Table D-11 Security Characters Data
ByteBits 7 - 0
0Security character 0
1Security character 1
“Ethernet Asynchronous Command and Response Protocol” on page
Table D-11.
-
Security character — This field contains a two-byte quantity indicating that the
security characters are assigned to the programmer. These security characters may be
used to aid in controlling fraudulent use of any reader system. The hardware program
ming key is required to perform the set programmer security characters command successfully.
D-15
-
IT2410 Tag Programmer User Guide
Valid security characters and their associated ASCII (hex) representations are shown
in
The location of these security bits within the 128-bit page, based on automatic vehicle
identification standards, including AAR and ISO, consist of two distinct 6-bit groups
comprising the 106 through 111 and 112 through 117 bit positions. These correspond
to the 18th and 19th character locations based on the 6-bit AVI standards.
Security characters stored in the programmer's NVM can be set to one of two combinations. At least one of the security character positions must be programmed to customer-specific security characters from the security character set for customer
programmers (see
Table D-13 Programmer Security Characters and Values
Normal characterSecurity characterValid customer combination
Normal characterNormal characterInvalid combination
SpaceSpaceReserved
Application Program Interface
Get/Set Programmer Serial Number
The Get Programmer Serial Number command requests the factory-programmed
serial number. The Set Programmer Serial Number command sets the programmer
serial number.
Programmer serial numbers are individually programmed into each programmer at the
time of manufacture. Serial numbers are related to a set of security characters that
have been assigned to the programmer. Serial numbers are identified in the unique
released document for each customer programmer.
The data associated with the get/set programmer serial number commands is shown in
Table D-14.
Table D-14 Serial Number Data
ByteBit 7
0Serial number (MSB)
1Serial number
2Serial number
3Serial number (LSB)
Serial numbers are programmed by the Host command, which can only be accomplished, as with security characters, using the master key.
Serial number byte — This field contains a four-byte quantity. It indicates the serial
number that is to be assigned to the programmer at the factory. The hardware pro
gramming key is required to perform the set programmer serial number command successfully.
-
Get/Set Programmer Control
The Get Programmer Control command requests the tag command time-out and programmer audio buzzer settings. The Set Programmer Control command enables or
disables the programmer control of the tag time-out and audio buzzer.
The tag command time-out instructs the programmer to continue sending a tag command (read, write) over the RF link for a specified period of time. These values are
stored in the programmer’s NVM. The data associated with the Get/Set Programmer
Control commands is shown in
Table D-15.
D-17
IT2410 Tag Programmer User Guide
Table D-15 Programmer Status Data
ByteBits 7 - 1Bit 0
0Tag command time-out
1SpareBuzzer disable
Tag command time-out — This byte indicates the time-out period for tag commands
in increments of 100 ms. This field is a binary-coded integer with values in the range
of 0 to 255. A value of 0 represents a time-out of 100 ms. A value of 255 represents a
time-out of 25.6 s. This tag command time-out determines the length of time that the
programmer continues to send tag commands over the RF link after having received
the tag command request from the host. The factory default value for the tag command
time-out is 10 s.
Buzzer disable — This bit is used to control the status of the audible indicator for the
programmer. When set to 1, the buzzer functions for the programmer are disabled. The
factory default for the buzzer disable is 0, or buzzer enabled.
Set Programmer Password
The Set Programmer Password command sets and verifies the user password. The user
password can only be changed by resending the set programmer password command
within two seconds of password verification.
Note: Any host software should prompt the user to reenter, or verify, the new password prior to sending a change to the programmer.
These commands are applicable to the programmer only. This command is not linked
with a get command. This maintains the integrity of the password.
The programmer maintains the current user password in NVM that is supplied by the
host. The programmer only responds to a limited command set until the password sup
plied by the host matches the one stored in NVM. The user password is used to initiate
a programming session. The data associated to the set programmer password com
mand is provided in Table D-16.
Password byte — This subfield contains a six-byte quantity. It provides the password
that is to be assigned to the programmer. All programmer passwords are set to a fac
tory default of PROGMR at the time of manufacture. This nonvolatile parameter is
capable of being changed by the user of the host software. Once changed, the new
password is activated.
A backdoor password is available from the factory for customers who lose or forget
their password. The backdoor password is only valid for a limited period of time. Per
form an update of the programmer password after use of this backdoor password so
that the current password is known.
Table D-17 lists the backdoor password status
data.
Table D-17 Password Status Data
Bits 7 - 0
Password status
A new programmer password may be set when you issue a Set Programmer Password
command immediately following (within two seconds) the initial Set Programmer
Password command request. The initial command request may contain either the valid
programmer password or the backdoor password.
The response associated with the Set Password Command is shown in Table D-18.
Only limited programmer commands are available until the user password is verified.
Once the backdoor password has been verified, only limited programmer commands
are available until the user password is changed.
This section describes the interaction of commands and functions.
During manufacturing of the programmer, the security characters, Ethernet parameters, and serial number are set. The security characters, MAC address, and serial number are written to the programmer and can only be changed at the factory.
Each time the programmer is powered on it performs a self-test and awaits an
acknowledgement from the host. Only the select commands are valid until the Set
Time/Date command is issued. Further restrictions apply until the programmer pass
-
word is verified using the Set Programmer Password command.
The Identify, Reset Programmer, and Get/Set Time/Date commands are always available regardless of password status. The Set Programmer Password command is only
available after the time and date have been set and validated. The Set Serial Number
and Set Security Characters commands are available only to the factory. Limited tag
commands are available until the programmer password has been verified. Virtually
all commands are available once the programmer password has been verified.
Figure D-1 illustrates the precedence of these functions. The Time/Date is set in permanent programmer memory. Once set and saved using Save Programmer Configuration, the Time/Date no longer need to be set.
D-20
Application Program Interface
Figure D-1 Programmer Command Hierarchy
D-21
IT2410 Tag Programmer User Guide
Get/Set Communications Baud Rate
The Get Communications Baud Rate command requests programmer’s communications baud rate. The Set Communications Baud Rate command sets the programmer
RS–232 communications baud rate.
Upon command, the programmer changes its baud rate to the selected value immediately following the transmission of the command response. It is recommended that the
baud rate only be changed on the host after the programmer has received the acknowl
edge so that communications are maintained.
Note: You might want to have a command in the host to let the user change the baud
rate when the programmer has been saved to a different baud rate than that of the host
default.
The data associated with the Get/Set Communications Baud Rate is shown in
Table D-19.
Table D-19 Communications Baud Rate Data
-
Bits 7 - 0
Communications baud rate
ValueDefinition
0CH19,200 bps
0DH38,400 bps (factory default)
Get/Set Ethernet Parameters
The Get Ethernet Parameters command requests programmer’s Ethernet parameters.
The Set Ethernet Parameters command sets the programmer’s Ethernet parameters.
The data associated with the Get/Set Ethernet Parameters is shown in
Table D-20 Ethernet Parameters Data
SubcommandParameter
01HMAC address
02HProgrammer IP address
03HHost IP address
Table D-20.
D-22
04HGateway IP address
05HNetwork mask
IP addresses — Must be specified in valid dot format, such as 10.3.10.10.
Application Program Interface
Network mask — Must be specified in valid dot format, such as 10.3.10.10.
MAC address — Must be specified in valid dash format, such as 00-01-02-03-04-05.
MAC address can only be set during factory setup.
All parameters must be passed in C-string format, including 0 (NULL) terminating
byte (
Table D-21). N represents the C-string length, not including terminating byte.
Table D-21 C-String Format for Parameters
Command BytesData
0Subcommand
1-(N+1)Data string, such as 10.3.10.10 or
00-01-02-03-04-05.
(N+1)+100H
Get/Set Programmer RF
The Get Programmer RF requests the frequency setting from the host. The Set Programmer RF sets the frequency. Data associated with the tag programmer RF is listed
in
Table D-22.
Table D-22 Programmer RF Data
ByteBits 7 - 0
0Reserved
1Transceiver RF
Transceiver RF Frequency — This byte represents the transceiver RF. Ta b le D-23
lists the valid frequencies.
Data associated with the tag programmer RF is listed in Table D-24.
Table D-24 Programmer RF
Bits 7 - 0
RF control
RF control — This subfield contains a representation of the frequency control as a
binary-coded integer. Valid values are in the range of 0BH to 11H determining the
emission frequency in 1-MHz steps from 912.75 MHz to 918.75 MHz.
Get/Set Time/Date
The Get Time/Date command requests the current time and date that is set on the programmer’s clock. The Set Time/Date command sets the programmer’s real-time clock
to the time and date specified in the request data.
The data associated with the Get/Set Time/Date defines the format of the time and
Table D-25). You can modify and read this data at any time. This field is used
date (
with the tag read parameters to append time and date to any response to the host.
Table D-25 Time/Date Data
ByteBit 7
0Hours
1Minutes
2Seconds
3Hundredths of seconds
4Month
5Day
6Year
The range specifications for the individual time/date fields are shown in Tabl e D-26
Note: The fields listed in Table D -26 are binary integers, not binary-coded data.
Note: Only the two least significant digits of the year are contained in the date. It is
the responsibility of the application to use the year such that the year 2000 is pro
-
cessed correctly. The year 2000 is represented by a year value of zero.
D-25
IT2410 Tag Programmer User Guide
Asynchronous Responses
Asynchronous responses to tag commands, programmer modes, errors, and failure
conditions are sent from the programmer to the host.
Power on/Boot/Diagnostics Status Reports
The programmer status is reported asynchronously once at powerup and whenever
any change has occurred during background self-test processing.
If a fault message occurs, a bit representing the fault is set in the diagnostic report
data. The status codes associated with the diagnostic reports are as follows:
•The command code at powerup or after the issue of a reset command for the diag-
nostic report status code is 8000H.
•The command code for background diagnostic report status code is 8001H.
The data associated with the power-on and background status reports for the programmer is specified in Table D - 27.
Table D-27 Programmer Status Report Data
ByteBits 7 - 0
0Programmer status
Programmer status — This field contains the subfields associated with the programmer as shown in Tab l e D-28.
Table D-28 Subfields of Programmer Status
ByteBit 7Bit 6Bit 5Bit 4Bit 3Bit 2Bit 1Bit 0
0Boot
flash test
Application
flash test
Boot flash test — This bit indicates a failure of the IT2410 boot sector of the flash
memory logic module when set to 1. Tests are automatically and continually run inter
nally by the programmer.
Application flash test — This bit indicates a failure of the IT2410 logic module
application sector flash memory when set to 1. Tests are automatically and continually
run internally by the programmer.
ReservedRFI RAM
test
Processor
RAM test
Check
tag test
SpareSpare
-
D-26
Reserved — Reserved for future use.
RFI RAM test — This bit indicates a failure of the IT2410 RFI RAM logic module
when set to 1. Tests are automatically and continually run internally by the program
-
Application Program Interface
mer.
Processor RAM test — This bit indicates a failure of the IT2410 processor RAM
logic module when set to 1. Tests are automatically and continually run internally by
the programmer.
Check tag test — This bit indicates a check tag failure when set to 1.
Valid Response Tag Data
Valid response tag data is reported asynchronously when a tag is detected. The status
codes associated with the tag data reports are shown in
Table D-29 Tag Data Report Status Codes
CodeDescription
3000HNo-tag data status
3001HIT2200 R/W tag data status
Table D-29.
3002HReserved
When a tag is detected, tag data is sent to the host computer or lane controller. If it
passes the CRC check, the tag data is assumed to not be corrupted.
D-27
IT2410 Tag Programmer User Guide
D-28
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.