The products described in this document may include copyrighted computer programs. Laws in the United States and
other countries preserve for certain exclusive rights for copyrighted computer programs. Accordingly, any
copyrighted computer programs contained in the products described in this document may not be copied or
reproduced in any manner without the express written permission.
No part of this document may be reproduced, transmitted, stored in a retrieval system, or translated into any language
or computer language, in any form or by any means, without the prior written permission.
Furthermore, the purchase of our products shall not be deemed to grant either directly or by implication, estoppel or
otherwise, any license under the copyrights, patents or patent applications, except for the normal non-exclusive,
royalty-free license to use that arises by operation of law in the sale of a product.
Disclaimer
3
| Copyrights
Please note that certain features, facilities, and capabilities described in this document may not be applicable to or
licensed for use on a particular system, or may be dependent upon the characteristics of a particular mobile subscriber
unit or configuration of certain parameters. Please refer to your contact for further information.
5 | Revision History
Revision History
Changes to the original guide are listed below:
ChangeDateDescription
-A01 Rev A10/04/2013Initial release.
-A02 Rev A05/20/2014Add RS507 support, Bluetooth pairing utility. Update PTT Express application,
WLAN Advanced features..
-A03 Rev A02/13/2015Zebra Rebranding
-A03 Rev B04/06/2015Update Accounts section in Chapter 6 Settings.
-A04 Rev A07/15/15Add support for KitKat operating system.
Related Documents..............................................................................................................................................15
Service Information.............................................................................................................................................15
Installing the Battery............................................................................................................................... 17
Charging the Battery............................................................................................................................... 18
Powering On the MC40...........................................................................................................................19
Replacing the Battery.............................................................................................................................. 19
Resetting the Device............................................................................................................................................20
Performing a Soft Reset.......................................................................................................................... 21
Performing a Hard Reset......................................................................................................................... 21
Performing an Enterprise Reset...............................................................................................................21
Performing a Factory Reset.....................................................................................................................22
Single Slot Charge Only Cradle.......................................................................................................................... 26
Single Slot Charge Cradle Setup.............................................................................................................26
Charging Using the Single Slot Charge Only Cradle..............................................................................28
Four Slot Battery Charger................................................................................................................................... 29
Single Charger Setup...............................................................................................................................29
Two Charger Setup..................................................................................................................................30
Four Charger Setup................................................................................................................................. 31
Charging with the Four Slot Battery Charger......................................................................................... 31
Five Slot Charge Only Cradle............................................................................................................................. 33
Installing a Cup....................................................................................................................................... 33
Installing a Four Slot Battery Charger.................................................................................................... 35
Power to Five Slot Charge Only Cradle..................................................................................................35
Charing Using the Five Slot Charge Only Cradle...................................................................................37
Installing the Finger Strap................................................................................................................................... 38
Installing the Rubber Boot.................................................................................................................................. 41
Using the Camera.................................................................................................................................... 47
Using the Imager..................................................................................................................................... 48
Creating a New Profile........................................................................................................................................52
Data Capture Panel..................................................................................................................................54
Bar Code Input........................................................................................................................................ 55
IP Output................................................................................................................................................. 66
Using IP Output with IPWedge...................................................................................................67
Using IP Output without IPWedge..............................................................................................68
Generating Advanced Data Formatting Rules.....................................................................................................70
Importing a Configuration File................................................................................................................79
Exporting a Configuration File................................................................................................................79
Importing a Profile File........................................................................................................................... 79
Exporting a Profile.................................................................................................................................. 80
Connecting to a Wi-Fi Network.......................................................................................................................... 83
Manually Adding a Wi-Fi Network
Configuring for a Proxy Server...........................................................................................................................85
Configuring the Device to Use a Static IP Address............................................................................................ 86
Remove a Wi-Fi Network................................................................................................................................... 91
Save Data.................................................................................................................................................97
Importing User List................................................................................................................................. 98
Importing Group List...............................................................................................................................98
Editing a User..........................................................................................................................................98
Deleting a User........................................................................................................................................98
Editing a Group....................................................................................................................................... 98
Deleting a Group..................................................................................................................................... 99
Editing a Package.................................................................................................................................... 99
Deleting a Package.................................................................................................................................. 99
Enabling Data Separation......................................................................................................................101
Disabling Data Separation.....................................................................................................................102
Delete User Data................................................................................................................................... 102
Capturing a Log File..............................................................................................................................102
Installing a Key..................................................................................................................................... 107
Deleting a Key.......................................................................................................................................108
Creating a Golden Configuration...................................................................................................................... 114
Transferring a Golden Configuration................................................................................................................117
Returning to the Default Configuration.............................................................................................................118
Language Usage................................................................................................................................................ 129
Changing the Language Setting............................................................................................................ 129
Adding Words to the Dictionary........................................................................................................... 129
Date Persistence................................................................................................................................................ 129
Configuring Ethernet Static IP Address................................................................................................ 131
About Device.....................................................................................................................................................132
PTT Express Configuration...............................................................................................................................132
Importing a PTT Express Configuration File........................................................................................132
Development Tools........................................................................................................................................... 134
ADB USB Setup................................................................................................................................................135
Uninstalling an Application...................................................................................................................137
Contents | 11
Updating the System......................................................................................................................................... 137
Upgrading the Operating System from GingerBread to Jelly Bean
Copying Applications and Configuration Files.....................................................................................141
Upgrading the Operating System from Jelly Bean to KitKat............................................................................141
Converting Non-Voice Configuration to Voice Configuration.............................................................142
Upgrading to KitKat..............................................................................................................................143
Chapter 10: Maintenance and Troubleshooting............................................... 151
Maintaining the MC40...................................................................................................................................... 151
This guide provides information on using the MC40 and accessories.
Note:
Screens and windows pictured in this guide are samples and can differ from actual screens.
This guide covers Android™ operating system Android Open Source Project (AOSP) Version 4.1.1 (Jelly
Bean) and AOSP Version 4.4.4 (KitKat™). Throughout this guide specific references are made to Jelly
Bean and KitKat to distinguish between operating system versions.
Documentation Set
The documentation set for the MC40 provides information for specific user needs, and includes:
•MC40 Quick Start Guide - describes how to get the device up and running.
•MC40 User Guide - describes how to use the device.
•MC40 Integrator Guide - describes how to set up the device and accessories.
13 | About This Guide
Configurations
This guide covers the following configurations:
ConfigurationRadiosDisplayMemory
MC40
WLAN:
802.11a/b/g/n/r
WPAN: Bluetooth v2.1 with
EDR (Jelly Bean)
Bluetooth v 4.0
Low Energy (KitKat)
Software Versions
To determine the current software versions touch or > About device.
•Serial number – Displays the serial number.
•Model number – Displays the model number.
•Android version – Displays the operating system version.
•Kernel version – Displays the kernel version number.
•Build number – Displays the software build number.
4.3” color
WVGA
1 GB RAM / 8
GB Flash
Data Capture
Options
camera and imager or camera,
imager and MSR,
optional RS507
Hands-free Imager
Operating System
Android-based,
Android OpenSource Project
4.1.1 (Jelly Bean)
or 4.4.4 (KitKat)
Jelly Bean Build Number
The build number contains the software revision number and whether the MC40 is VoIP telephony ready.
14 | About This Guide
Example Build Number: 0z-4AJ11–J-xxxx–xxxx–y0–M1–mmddyy
•z = software version number
•y = VoIP telephone ready
where:
•0 = not VoIP telephony ready
•V = VoIP telephony ready.
•F = FIPS & VoIP telephony ready.
KitKat Build Number
The build number contains the software revision number and whether the MC40 is VoIP telephony ready and FIPS
ready.
Example Build Number: 0z-xx–xx-4AJ22–K–y0–M1–mmddyy
•z = software version number
•y = VoIP telephone ready/FIPS ready
where:
•V = VoIP telephony ready.
•F = FIPS & VoIP telephony ready.
Chapter Descriptions
Topics covered in this guide are as follows:
•Getting Started on page 17
•Accessories on page 25 describes the available accessories and how to use them with the MC40.
•USB Communication on page 45 describes how to connect the MC40 to a host computer using USB.
•DataWedge Configuration on page 47 describes how to use and configure the DataWedge application.
•WLAN Configuration on page 83 describes the how to configure the MC40 to connect with a wireless LAN
network.
•Administrator Utilities on page 93 provides information for using the suite of administrative tools for
configuring the MC40.
•Settings on page 119 provides the settings for configuring the MC40.
•Application Deployment on page 133 provides information for developing and managing applications.
•Maintenance and Troubleshooting on page 151 includes instructions on cleaning and storing the MC40, and
provides troubleshooting solutions for potential problems during MC40 operation.
•Technical Specifications on page 159 provides the technical specifications for the MC40.
•Keypad Remap Strings on page 169 provides a list of remap strings used when remapping keys.
provides information on getting the MC40 up and running for the first time.
Notational Conventions
The following conventions are used in this document:
•Italics are used to highlight the following:
-Chapters and sections in this and related documents
Icons on a screen.
-
•Bold text is used to highlight the following:
-Dialog box, window, and screen names
-Drop-down list and list box names
-Check box and radio button names
Button names on a screen.
-
•Bullets (•) indicate:
-Action items
-Lists of alternatives
-Lists of required steps that are not necessarily sequential
•Sequential lists (for example, lists that describe step-by-step procedures) appear as numbered lists.
Icon Conventions
The documentation set is designed to give the reader more visual clues. The following graphic icons are used
throughout the documentation set. These icons and their associated meanings are described below.
Warning: The word WARNING with the associated safety icon implies information that, if disregarded,
could result in death or serious injury, or serious product damage.
Caution: The word CAUTION with the associated safety icon implies information that, if disregarded,
may result in minor or moderate injury, or serious product damage.
About This Guide | 15
Note: NOTE contains information more important than the surrounding text, such as exceptions or
preconditions. They also refer the reader elsewhere for additional information, remind the reader how to
complete an action (when it is not part of the current procedure, for instance), or tell the reader where
something is located on the screen. There is no warning level associated with a note.
For the latest version of this guide and all guides, go to: http://www.zebra.com/support
Service Information
If you have a problem with your equipment, contact Zebra Support Center for your region. Contact information is
available at: http://www.zebra.com/support.
When contacting the Zebra Support Center, please have the following information available:
•Serial number of the unit (found on manufacturing label)
•
Model number or product name (found on manufacturing label)
•Software type and version number
16 | About This Guide
Figure 1: Manufacturing Label Location
Zebra responds to calls by email or telephone within the time limits set forth in support agreements.
If your problem cannot be solved by the Zebra Support Center, you may need to return your equipment for servicing
and will be given specific directions. Zebra is not responsible for any damages incurred during shipment if the
approved shipping container is not used. Shipping the units improperly can possibly void the warranty.
If you purchased your product from a Zebra business partner, contact that business partner for support.
Chapter
1
Getting Started
This chapter provides the features of the MC40 and explains how to set it up for the first time.
Unpacking
Carefully remove all protective material from the MC40 and save the shipping container for later storage and
shipping.
Verify the following items are in the box:
17 | Getting Started
•MC40
Lithium-ion battery
•
•Quick Start Guide
•Regulatory Guide.
Inspect the equipment for damage. If any equipment is missing or damaged, contact the Zebra Support Center
immediately. See Service Information on page 15 for contact information.
Setup
To start using the MC40 for the first time:
•Install the battery
Charge the MC40
•
•Power on the MC40.
Installing the Battery
To install the battery:
Procedure:
1 Align the battery with the slots in the battery compartment.
18 | Getting Started
Figure 2: Inserting the Battery
2 Lower the battery and press down until it snaps into place.
3 Press down on the battery latch.
4 Press the Power button to turn on the MC40.
Charging the Battery
Caution: Ensure that you follow the guidelines for battery safety described in Battery Safety Guidelines
page 151.
Before using the MC40 for the first time, charge the main battery until the Right light emitting diode (LED) turns
solid green (see Table 1: Battery Charge LED Status on page 18
MC40, use a cable or a cradle with the appropriate power supply. For information about the accessories available for
the MC40, see Accessories on page 25.
The MC40 is equipped with a memory backup battery that automatically charges from the fully-charged main battery.
When using the MC40 for the first time, the backup battery requires approximately 36 hours to fully charge. This is
also true any time the backup battery is discharged, which occurs when the main battery is removed for several hours.
The backup battery retains random access memory (RAM) data in memory for at least 10 minutes (at room
temperature) when the MC40’s main battery is removed, when Battery Swap feature is used. When the MC40 reaches
a very low battery state, the combination of main battery and backup battery retains RAM data in memory for at least
48 hours.
For cable and cradle setup and charging procedures refer to the MC40 Integrator Guide.
•Micro USB Cable
•Single Slot Charging Cradle
•Five Slot Charge Only Cradle.
Table 1: Battery Charge LED Status
StatusIndications
for charge status indications). To charge the
on
Off
MC40 is not charging.
MC40 is not inserted correctly in the cradle.
MC40 is not connected to a power source.
Charger or cradle is not powered.
Table continued…
StatusIndications
Getting Started | 19
Slow Blinking Amber (3 blinks every 2 seconds)
Solid GreenCharging complete.
Fast Blinking Amber (3 blinks/
second)
Flashes Amber once (when Power
button pressed)
Fast Blinking Amber (when Power
button pressed)
MC40 is charging.
Charging error, e.g.:
•Temperature is too low or too high.
Charging has gone on too long without completion (typically eight hours).
•
Critical battery state. Battery too low to boot device.
Battery over-temperature condition. Device shuts down. Battery will not
charge until temperature returns to normal operating value.
Charging Temperature
Charge batteries in ambient temperatures from 0 °C to 40 °C (32 °F to 104 °F) or up to 45 °C (113 °F) as reported by
the battery. To view the battery temperature, touch
Note that charging is intelligently controlled by the MC40. To accomplish this, for small periods of time, the MC40
or accessory alternately enables and disables battery charging to keep the battery at acceptable temperatures. The
MC40 or accessory indicates when charging is disabled due to abnormal temperatures via its LED.
or > About device > Battery Information.
Charging Spare Batteries
See Accessories on page 25 for information on using accessories to charge spare batteries.
Powering On the MC40
If the MC40 did not turn on when the battery was installed, press the Power button until the Right and Left LEDs
flash once. The splash screen displays for about a minute as the MC40 initializes its flash file system. Note that these
windows also appear upon reset.
Replacing the Battery
Note: Ensure that the Battery Swap mode procedures are followed, otherwise the backup battery will
deplete quickly.
Procedure:
1 Press the Power button until the menu displays.
2 Touch Battery swap. The Right and Left LEDs light red.
3 Wait until the LEDs turns off.
4 Lift the battery latch.
20 | Getting Started
Figure 3: Lift Battery Latch
5 Remove the battery out of the battery compartment.
Figure 4: Remove Battery
6 Align the replacement battery in the battery compartment.
7 Lower the battery and press down until it snaps into place.
8 Press down on the battery latch.
9 Press the Power button to turn on the MC40.
Resetting the Device
There are four reset functions:
•Soft Reset
•Hard Reset
•Enterprise Reset
•Factory Reset.
Getting Started | 21
Performing a Soft Reset
Perform a soft reset if applications stop responding.
Procedure:
1 Press and hold the Power button until the menu appears.
2 Touch
3 The device shuts down and then reboots.
Reset.
Performing a Hard Reset
Perform a Hard Reset if the device stops responding. To perform a Hard Reset:
Procedure:
1 Simultaneously press the Power, Left Scan/Action and Up Volume buttons.
2 The device shuts down and then reboots.
Performing an Enterprise Reset
An Enterprise Reset erases all data in the /cache and /data partitions and clears all device settings, except those in the /
enterprise partition.
Before performing an Enterprise Reset, copy all applications and the key remap configuration file that you want to
persist after the reset into the /enterprise/usr/persist folder.
Procedure:
1 Download the Enterprise Reset file from Zebra Support Central web site.
2 Copy the 40N0JxxERxxxxxxx.zip (Jelly Bean) or 40N0KxxERxxxxxxx.zip (KitKat) file to the root
directory of the On-device Storage. See USB Communication on page 45
3 Press and hold the Power button until the Device options menu appears.
4 Touch Reset.
5 Touch OK. The device resets.
6 Press and hold the Left Scan/Action button.
7 When the Recovery Mode screen appears release the button.
.
22 | Getting Started
Figure 5: Recovery Mode Screen
8
Touch
Figure 6: System Recovery Screen
9 Press the Up and Down Volume buttons to navigate to the Apply update from /sdcard option.
10 Press the PTT button.
11 Press the Up and Down Volume buttons to navigate to the 40N0JxxERxxxxxxx.zip (Jelly Bean) or
40N0KxxERxxxxxxx.zip (KitKat) file.
12 Press the PTT button. The Enterprise Reset occurs and then the device resets.
. The System Recovery screen appears.
Performing a Factory Reset
A Factory Reset erases all data in the /cache, /data and /enterprise partitions in internal storage and clears all device
settings. A Factory Reset returns the device to the last installed operating system image. To revert to a previous
Getting Started | 23
operating system version, re-install that operating system image. See Updating the System on page 137
information.
Procedure:
1 Download the Enterprise Reset file from Zebra Support Central web site.
2 Copy the 40N0JxxFRxxxxxxx.zip (Jelly Bean) or 40N0KxxFRxxxxxxx.zip (KitKat) file to the root
directory of the On-device Storage. See USB Communication on page 45.
3 Press and hold the Power button until the Device options menu appears.
4 Touch Reset.
5 Touch OK. The device resets.
6 Press and hold the Left Scan/Action button.
7 When the Recovery Mode screen appears release the Left Scan/Action button.
Figure 7: Recovery Mode Screen
for more
8
Touch
.
24 | Getting Started
Figure 8: System Recovery Screen
9 Press the Up and Down volume buttons to navigate to the Apply update from /sdcard option.
10 Press the PTT button.
11 Press the Up and Down volume buttons to navigate to the 40N0JxxFRxxxxxxx.zip (Jelly Bean) or
40N0KxxFRxxxxxxx.zip (KitKat) file.
12 Press the PTT button. The Factory Reset occurs and then the device resets.
Chapter
2
Accessories
This chapter provides information for using the accessories for the device.
MC40 Accessories
Table 2: MC40 Accessories on page 25 lists the accessories available for the MC40.
Table 2: MC40 Accessories
25 | Accessories
AccessoryPart NumberDescription
Cradles
Single Slot
Charge Only Cradle
Five Slot Charge
Only Cradle Base
Five Slot Charge
Only Cradle
Chargers
Four Slot Battery
Charger
Power SupplyPWRS-124306-01RProvides power to the MC40 and Single Slot Charge Cradle.
Power Supply
(12 VDC, 4.16
A)
Cables
Micro USB Cable
CRDMC40XX-1000RCharges the MC40.
CRDUNIV-XX-5000RProvides charging for up to five MC40 devices or four MC40 de-
vices and one Four Slot Battery Charger using optional Charging
Cups. Requires additional power supplies.
CRDUNIV-40-5000RProvides charging for up to five MC40 devices.
SACMC40XX-4000RCharges up to four MC40 batteries.
PWRS-14000-148CProvides power to the Five Slot Charge Only Cradle and the
Four Slot Battery Charger.
25-MCXUSB-01RProvides power to the MC40 and USB communication with a
host computer.
US AC Line
Cord (3-wire)
2-way DC Cable25-122026-02RConnects one power supply (PWRS-14000-148C) to two Four
4-way DC Cable25-85992-01RConnects one power supply (PWRS-14000-241R) to four Four
23844-00-00RProvides power to the power supplies.
Slot Battery Chargers.
Slot Battery Chargers.
Table continued…
26 | Accessories
AccessoryPart NumberDescription
Miscellaneous
Spare 2680 mAh
lithium-ion battery
Charging CupCUPMC40XX-1000RMounts onto the Five Slot Charge Only Cradle Base and pro-
Battery Charger
Cup
Universal Blank
Slot Cover
Protective Rubber Boot
Soft Hip HolsterSG-MC40HLSTR-02RMounts on belt and provides storage for the MC40.
Finger Strap
Rack/Wall
Mount Bracket
Wired HeadsetHDST-25MM-PTVP-012.5 mm wired headset for PTT and VoIP telephony communica-
BTRY-MC40EAB0E
BTRY-MC40EAB0E-10R
CUPUNIBTRY-1000RMounts on the Five Slot Charge Only Cradle Base and provides
CUPUNICVR-5000RMounts on the Five Slot Charge Only Cradle and covers a slot
SG-MC40-RBOOT-01R
SG-MC40-RBOOT-10R
SG-MC40STRAP-01R
SG-MC40STRAP-10R
KT-UNIVLBRKT-01RProvides for mounting the Five Slot Charge Only Cradle onto a
Replacement 2680 mAh battery.
Replacement 2680 mAh battery (10-pack)
vides MC40 charging slot (Single pack).
mounting for the Four Slot Battery Charger.
when a cup is not required (5-pack).
Provides additional protection for the MC40.
Provides additional protection for the MC40 (10–pack).
Mounts on the back of the MC40 and provides secure option for
holding the device (Single pack or 10-pack).
standard rack or wall.
tions.
Single Slot Charge Only Cradle
The Single Slot Charge Only Cradle provides power for operating and charging the MC40.
Note: Do not connect the micro USB cable from the Single Slot Charge cradle to a host computer USB
port. The cradle cannot charge the MC40 if connected to a host computer.
Single Slot Charge Cradle Setup
Procedure:
1 Plug the micro USB connector into the microUSB port on the cradle.
2 Route the micro USB end of the Micro USB Cable through the Cable Channel and exit either to the front or back
of the cradle.
Figure 9: Micro USB Cable Installation
USB PortUSB PortUSB Cable
USB CableCable ChannelCable Channel
Micro USB Cable
Power Supply
3 Plug the other end of the Micro USB Cable into the USB port on the power supply.
4 Plug the power supply into a wall outlet.
Accessories | 27
Figure 10: Single Slot Charge Only Cradle Setup
Procedure:
1 With finger nail, grasp insert notch.
Removing Cradle Insert
28 | Accessories
Figure 11: Grasp Insert Notch
2 Pull insert out of cradle.
Figure 12: Remove Insert
Charging Using the Single Slot Charge Only Cradle
To charge the MC40 battery, place the MC40 into the cradle.
Figure 13: MC40 Battery Charging
Accessories | 29
The Right LED indicates the status of the battery charging. See Table 1: Battery Charge LED Status on page 18
charging status indications. The 2680 mAh battery charges in approximately four hours.
Charge batteries in ambient temperatures from 0 °C to 40 °C (32 °F to 104 °F) or up to 45 °C (113 °F) as reported by
the battery. To view the battery temperature, touch
is intelligently controlled by the MC40. To accomplish this, for small periods of time, the charger alternately enables
and disables battery charging to keep the battery at acceptable temperatures. The charger indicates when charging is
disabled due to abnormal temperatures via its LED.
or > About device > Battery Information. Charging
Four Slot Battery Charger
The Four Slot Battery Charger charges up to four MC40 spare batteries.
Single Charger Setup
Procedure:
1 Plug the power supply plug into the power port on the back of the charger.
2 Plug the AC line cord into the power supply.
3 Plug the AC line cord into an AC outlet.
for
30 | Accessories
Figure 14: Four Slot Battery Charger
Two Charger Setup
Procedure:
1 Plug the 2-way DC Cable plugs into the power port on the back of the each charger.
2 Plug the power supply plug into the jack of the 2-way DC Cable.
3 Plug the AC line cord into the power supply.
4 Plug the AC line cord into an AC outlet.
Figure 15: Setup with 2–way DC Cable
Four Charger Setup
Procedure:
1 Plug the 4-way DC Cable plugs into the power port on the back of the each charger.
2 Plug the 4-way DC Cable connector into the power output of the power supply.
3 Plug the AC line cord into the power supply.
4 Plug the AC line cord into an AC outlet.
Figure 16: Setup with 4–way DC Cable
Accessories | 31
Charging with the Four Slot Battery Charger
To charge the spare batteries insert the spare battery into a spare battery charging well.
A Charge LED is provided for each battery charging well. See Table 3: Spare Battery Charge LED Status on page
32 for charging status indications. The 2680 mAh battery charges in approximately four hours.
32 | Accessories
Figure 17: Charging Batteries
Charge batteries in temperatures from 0 °C to 40 °C (32 °F to 104 °F). Charging is intelligently controlled by the
charger in order to ensure safe operation and optimize long-term battery life. To accomplish this, for small periods of
time, the charger alternately enables and disables battery charging to keep the battery at acceptable temperatures. The
charger indicates when charging is disabled due to abnormal temperatures via the Charge LED.
Table 3: Spare Battery Charge LED Status
StatusIndications
Off
Slow Blinking AmberBattery is charging.
Solid GreenCharging complete.
Fast Blinking AmberCharging error, e.g.:
No battery a slot.
Battery is not charging.
Battery is not inserted correctly in the charger.
Charger is not powered.
•Temperature is too low or too high.
Charging has gone on too long without completion.
•
Five Slot Charge Only Cradle
The Five Slot Charge Only cradle:
•Provides power for operating and charging the MC40.
Simultaneously charges up to five MC40s.
•
Figure 18: Five Slot Charge Only Cradle
Accessories | 33
Installing a Cup
The Five Slot Charge Only Cradle ships without any cradle cups installed. To base accepts the MC40 Charging Cup,
Battery Charger Cup and Blank Slot Cover. To install the cradle cups:
Procedure:
1 Remove power from the cradle base before installing cups.
2 Align the lip of the cup with the slot on the front of the cradle. Ensure that the cup is positioned within the Slot
Alignment Tabs.
34 | Accessories
Figure 19: Five Slot Charge Only Cradle Cup Installation
3 Slide the lip into the slot and rotate the cup until it is flat on the cradle base.
4 Using a Phillips screwdriver, secure the cup to the charger base using the two screws provided with the cup.
Figure 20: Securing Cup to Base
5 Each slot on the Cradle Base must have a cup installed.
6 Repeat for each additional cup.
Installing a Four Slot Battery Charger
To install a Four Slot Battery Charger:
Procedure:
Accessories | 35
1 Install a Battery Charger Cup. See Installing a Cup on page 33
2 Align the mounting slots on the bottom of the Four Slot Battery Charger with the screws on the cup.
3 Slide the Four Slot Battery Charger down until it snaps into place.
Figure 21: Multi Slot Charge Only Cradle Four Slot Battery Charger Installation
.
Power to Five Slot Charge Only Cradle
Use one power supply to provide power to the Charging Base to power the Charging Cups. A separate power supply
is required for each Four Slot Battery Charger installed. The power supply is connected directly to the For Slot
Battery Charger.
36 | Accessories
Figure 22: Five Slot Charge Only Cradle Power Connections
Removing Cradle Insert
Procedure:
1 With finger nail, grasp insert notch.
Figure 23: Grasp Insert Notch
2 Pull insert out of cradle.
Figure 24: Remove Insert
Accessories | 37
Charing Using the Five Slot Charge Only Cradle
Insert the MC40 into a slot to begin charging.
The Right LED indicates the status of the battery charging in the MC40. See Table 1: Battery Charge LED Status on
page 18
Charge batteries in ambient temperatures from 0 °C to 40 °C (32 °F to 104 °F) or up to 45 °C (113 °F) as reported by
the battery. To view the battery temperature, touch
is intelligently controlled by the MC40. To accomplish this, for small periods of time, the charger alternately enables
and disables battery charging to keep the battery at acceptable temperatures. The charger indicates when charging is
disabled due to abnormal temperatures via its LED.
for charging status indications. The 2680 mAh battery charges in approximately four hours.
or > About device > Battery Information. Charging
38 | Accessories
Figure 25: Charging MC40 and Spare Battery
Installing the Finger Strap
Use the optional finger strap to securely hold the MC40 while working.
Procedure:
1 Press the Power button until the Device options menu appears.
2 Touch Power off.
3 Remove the battery.
Figure 26: Remove Battery
4 Using a Phillips screwdriver, remove the two screws securing the plug to the MC40.
Accessories | 39
Figure 27: Remove Plug
5 Align the screws in the bracket of the finger strap with the mounting holes on the MC40.
40 | Accessories
Figure 28: Align Finger Strap
6 Secure the finger strap to the MC40 using a Phillips screwdriver.
Figure 29: Secure Finger Strap to MC40
7 Replace the battery.
Figure 30: Install Battery
Accessories | 41
Installing the Rubber Boot
Use to rubber boot to add additional protection to the MC40.
Figure 31: Rubber Boot
Procedure:
1 Insert the bottom of the MC40 into the bottom of the rubber boot.
42 | Accessories
Figure 32: Insert MC40 into Boot
2 Pull the top of the rubber boot over the top of the MC40.
Figure 33: Pull Boot Over MC40
3 Ensure that the rubber boot is sitting flat against the MC40.
Third-Party Ethernet Dongles
The MC40 provides support for third-party Ethernet dongles.
Configuring Ethernet Proxy Settings
The MC40 includes Ethernet cradle drivers. The MC40 can connect to an Ethernet network using a third-party
Ethernet dongle.
Procedure:
After connecting the MC40, configure the Ethernet connection:
Accessories | 43
1
Touch
2
Touch
3 Touch Ethernet.
4 Slide the switch to the ON position.
5 Connect the MC40 and Ethernet dongle.
6 Touch and hold Eth0 until the menu appears.
7 Touch Modify Proxy.
Figure 34: Ethernet Proxy Settings
.
or .
8 Touch the Proxy settings drop-down list and select Manual.
9 In the Proxy hostname field, enter the proxy server address.
10 In the Proxy port field, enter the proxy server port number.
11Note: When entering proxy addresses in the Bypass proxy for field, do not use spaces or carriage
returns between addresses.
In the Bypass proxy for text box, enter addresses for web sites that do not require to go through the proxy server.
Use the separator “|” between addresses.
12 Touch Modify.
13
Touch
.
Configuring Ethernet Static IP Address
The MC40 includes Ethernet cradle drivers. The MC40 can connect to an Ethernet network using a third-party
Ethernet dongle.
Procedure:
1
Touch
2
Touch or .
3 Touch Ethernet.
4 Slide the switch to the ON position.
5 Connect the MC40 and Ethernet dongle.
After connecting the MC40, configure the Ethernet connection:
.
44 | Accessories
6 Touch and hold Eth0 until the menu appears.
7 Touch Disconnect.
Figure 35: Ethernet Proxy Settings
8 Touch and hold Eth0 until the menu appears.
9 Touch the IP setting drop-down list and select Static.
10 In the IP adress field, enter the proxy server address.
11 If required, in the Gateway text box, enter a gateway address for the device.
12 If required, in the Network prefix length text box, enter a the prefix length.
13 If required, in the DNS 1 text box, enter a Domain Name System (DNS) address.
14 If required, in the DNS 2 text box, enter a DNS address.
15 Touch Connect.
16
Touch
.
45 | USB Communication
Chapter
3
USB Communication
This chapter provides information for transferring files between the device and a host computer.
Connecting to a Host Computer via USB
Connect the device to a host computer using the micro USB cable to transfer files between the MC40 and the host
computer.
Caution:
When connecting the MC40 to a host computer, follow the host computer’s instructions for connecting and
disconnecting USB devices, to avoid damaging or corrupting files.
Procedure:
1 Connect the micro USB connector to the USB port on the device. See Accessories on page 25 for setup
information.
2 Connect the USB A connector to the host computer USB port.
Connected as a media device or Connected as camera appears on the Status bar.
3 If Connected as a camera appears, pull down the Notification shade and touch Connected as a camera and then
touch Media device (MTP).
4Caution: Ensure that all applications are not running. Loss of data may occur.
On the host computer, open a file explorer application.
5
Locate the device as a portable device and open to view contents.
6 Copy or delete files as required.
Note: While USB storage is in use, access to the On-Device Storage is disabled.
Disconnect from the Host Computer
Caution:
Carefully follow the host computer’s instructions to unmount the microSD card and disconnect USB
devices correctly to avoid losing information.
Procedure:
1 On the host computer, unmount the device.
2 Remove the micro USB cable from the device.
Chapter
4
DataWedge Configuration
DataWedge is an application that reads data, processes the data and sends the data to an application.
Basic Scanning
Scanning can be performed using either the imager or the rear-facing camera.
Using the Camera
47 | DataWedge Configuration
To capture bar code data:
Procedure:
1 Ensure that an application is open on the MC40 and a text field is in focus (text cursor in text field).
2 Aim the rear-facing camera at a bar code.
3 Press and hold the Right Scan/Action button. By default, a preview window appears on the screen. The Left and
Right LEDs light red to indicate that data capture is in process.
48 | DataWedge Configuration
Figure 36: Data Capture with Camera
4 Move the MC40 until the bar code is centered under the red target.
5 The Left and Right LEDs light green, a beep sounds and the MC40 vibrates, by default, to indicate the bar code
was decoded successfully. The captured data appears in the text field.
Using the Imager
To capture bar code data:
Procedure:
1 Ensure that an application is open on the MC40 and a text field is in focus (text cursor in text field).
2 Aim the exit window at a bar code.
3 Press and hold the Right Scan/Action button. The red laser aiming pattern turns on to assist in aiming. Ensure that
the bar code is within the area formed by the aiming pattern. The Left and Right LEDs light red to indicate that
data capture is in process.
DataWedge Configuration | 49
Figure 37: Data Capture
4 The Left and Right LEDs light green, a beep sounds and the MC40 vibrates, by default, to indicate the bar code
was decoded successfully. The captured data appears in the text field.
Profiles
DataWedge is based on profiles and plug-ins. A profile contains information on how DataWedge should behave with
different applications.
Using profiles, each application can have a specific DataWedge configuration. For example, each user application can
have a profile which outputs scanned data in the required format when that application comes to the foreground.
DataWedge can be configured to process the same set of captured data differently based on the requirements of each
application.
DataWedge includes the following visible and hidden pre-configured profiles which support specific built-in
applications:
•Visible profiles:
-Profile0 - created automatically the first time DataWedge runs. Generic profile used when there are no user
created profiles associated with an application.
-Launcher - disables scanning when the Launcher is in foreground.
-DWDemo - provides support for the DWDemo application.
•Hidden profiles (not shown to the device):
-RD Client - provides support for MSP.
-MSP Agent - provides support for MSP.
-MspUserAttribute - provides support for MSP.
-Camera - disables scanning when the default camera application is in foreground.
-RhoElements - disables scanning when RhoElements is in foreground.
Profile0
Profile0 can be edited but cannot be associated with an application. That is, DataWedge allows manipulation of
plug-in settings for Profile0 but it does not allow assignment of a foreground application. This configuration allows
DataWedge to send output data to any foreground application other than applications associated with user-defined
profiles when Profile0 is enabled.
50 | DataWedge Configuration
Profile0 can be disabled to allow DataWedge to only send output data to those applications which are associated inuser-defined profiles. For example, create a profile associating a specific application, disable Profile0 and then scan.
DataWedge only sends data to the application specified in the user-created profile. This adds additional security to
DataWedge enabling the sending of data only to specified applications.
Plug-ins
A plug-in is a software module utilized in DataWedge to extend its functionality to encompass technologies such as
bar code scanning. The plug-ins can be categorized into three types based on their operations:
•Input Plug-ins
Output Plug-ins
•
•Process Plug-ins.
Input Plug-ins
An Input Plug-in supports an input device, such as a bar code scanner contained in, or attached to the device.
DataWedge contains base plug-ins for these input devices.
•Bar Code Scanner Input Plug-in – The Bar Code Scanner Input Plug-in is responsible for reading data from the
integrated bar code scanner and supports different types of bar code readers including laser, imager and internal
camera. Raw data read from the bar code scanner can be processed or formatted using Process Plug-ins as
required. DataWedge has built-in feedback functionality for the bar code scanner to issue user alerts. The
feedback settings can be configured according to user requirement.
•MSR Input Plug-in – The Magnetic Stripe Reader (MSR) Input Plug-in is responsible for reading data from an
MSR. Raw data read from the MSR can be processed or formatted using Process Plug-ins as required.
DataWedge has built-in feedback functionality for the MSR to issue user alerts. The feedback settings can be
configured according to user requirement.
Process Plug-ins
Process Plug-ins are used in DataWedge to manipulate the received data according to the requirement, before
sending to the foreground application via the Output Plug-in.
•Basic Data Formatting Process Plug-in – The Basic Data Formatting Plug-in allows DataWedge to add a prefix
and/or a suffix to the captured data before passing it to an Output Plug-in.
•Advanced Data Formatting Process Plug-in – The Advanced Data Formatting Plug-in allows DataWedge to
apply rules (actions to be performed based on defined criteria) to the data received via an input plug-in before
passing it to an Output Plug-in.
Output Plug-ins
Output Plug-ins are responsible for sending the data from Input Plug-ins to a foreground application on the device.
•Keystroke Output Plug-in – The Keystroke Output Plug-in collects and sends data received from the Input Plugin to the foreground applications by emulating keystrokes.
•Intent Output Plug-in – The Intent Output Plug-in collects and sends data received from the Input Plug-ins to
foreground applications using the Android Intent mechanism.
•IP Output Plug-in – The IP Output Plug-in collects and sends data received from the Input Plug-ins to a host
computer via a network connection. Captured data can be sent over an IP network to a specified IP address and
port using either TCP or UDP transport protocols.
Profiles Screen
To launch DataWedge, touch > DataWedge. By default, three profiles appear:
•Profile0
•Launcher
•DWDemo.
Profile0 is the default profile and is used when no other profile can be applied.
Figure 38: DataWedge Profiles Screen
DataWedge Configuration | 51
Profile names are color coded. Enabled profiles are white and disabled profiles are gray.
To configure a profile touch the profile name.
Profile Context Menu
Touch and hold a profile to open a context menu that allows additional actions to be performed on the selected
profile.
Figure 39: Profile Context Menu
The profile context menu allows the profile to be edited (same as just tapping on a profile), renamed or deleted.
Options Menu
Touch
or to open the options menu.
52 | DataWedge Configuration
Figure 40: DataWedge Options Menu
The menu provides options to create a new profiles, access to general DataWedge settings and DataWedge version
information.
Disabling DataWedge
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch Settings.
5 Touch DataWedge enabled.
The blue check disappears from the checkbox indicating that DataWedge is disabled.
.
.
or .
Creating a New Profile
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch New profile.
5 In the New profile dialog box, enter a name for the new profile. It is recommended that profile names be unique
and made up of only alpha-numeric characters (A-Z, a-z, 0-9).
Figure 41: New Profile Name Dialog Box
6 Touch OK.
The new profile name appears in the DataWedge profile screen.
.
.
or .
Profile Configuration
To configure the Profile0 or a user-created profile, touch the profile name.
Figure 42: Profile Configuration Screen
DataWedge Configuration | 53
The configuration screen lists the following sections:
•Profile enabled
Applications
•
•Barcode Input
•MSR Input
•Keystroke output
•Intent Output
•IP Output.
Associating Applications
Use Applications option to associate applications with this profile. User created profiles should be associated with one
or more applications and its activities.
Procedure:
1 Touch Associated apps. A list of applications/activities associated with the profile displays. Initially the list does
not contain any applications/activities.
2 Touch
3 Touch New app/activity.
4 In the Select application screen, select the desired application from the list.
5 In the Select activity menu, selecting the activity adds that application/activity combination to the associated
application list for that profile. Selecting * as the activity results in all activities within that application being
associated to the profile. During operation, DataWedge tries to match the specific application/activity
combinations with the foreground application/activity before trying to match the general application/*
combinations.
6
Touch
.
.
54 | DataWedge Configuration
Data Capture Panel
The Data Capture panel (DCP) is a DataWedge feature that enables the user to initiate data capture by touching a
designated part of the screen. A variable screen overlay acts like a scan button.
Figure 43: Minimized Data Capture Panel
Drag the DCP tab horizontally to maximized overlay. Drag the DCP tab vertically to reposition the tab.
Figure 44: Maximized DCP
Touch the Magnet icon to change the orientation of the overlay to opposite side of the screen.
The DataWedge profile configuration screen allows the user to configure how the DCP appears on the screen once the
particular profile is enabled. The DCP is hidden by default. Enabling DCP option displays seven additional
configuration parameters.
Figure 45: Data Capture Panel Settings
DataWedge Configuration | 55
•Orientation - Indicates whether the DCP displays on the right hand or left hand side of the screen. Options: Left
(default) or Right.
•Start state - Indicates whether the DCP should be started in maximized or minimized state. Options: Minimized
(default) or Maximized.
•Minimized height - Indicates the height of the DCP when in the minimized state (default - 112).
•Minimized width - Indicates the width of the DCP when in the minimized state (default - 56).
•Start position (vertical) - Indicates the distance from top of the device screen to the DCP (default - 292).
•Maximized height - Indicates the height of DCP when in maximized state (default - 697).
•Button Color - Use to change the color and transparency of the DCP overlap. Touch to open the color picker
window.
Figure 46: Color Picker
Bar Code Input
Use the Bar Code Input options to configure the Bar Code Scanner Input Plug-in for the profile.
Enabled
Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled.
56 | DataWedge Configuration
Scanner Selection
Configures which scanning device to use for bar code data capture when the profile is active.
•Auto - The software automatically selects the 2D Imager.
•Camera scanner - Scanning is performed with the rear-facing camera.
•2D Imager - Scanning is performed using the 2D Imager.
Decoders
Use the Bar Code Input options to configure the Bar Code Scanner Input Plug-in for the profile.
Configures which bar code decoders are enabled or disabled. For best performance disable all unnecessary decoders.
Touch Decoders. The Barcode input screen appears. A check in the checkbox indicates that the decoder is enabled.
By default the most commonly used decoders are enabled (shown below with an asterisk). The supported decoders
are:
UPC-A*UPC-E0*EAN-13*
EAN-8*Code 128*Code 39*
Interleaved 2 of 5GS1 DataBar*GS1 DataBar Limited
GS1 DataBar ExpandedDatamatrix*QR Code*
PDF417*Composite ABComposite C
MicroQRAztec*Maxicode*
MicroPDFUSPostnetUSPlanet
UK PostalJapanese PostalAustralian Postal
Canadian PostalDutch PostalUS4state
US4state FICSCodabar*MSI
Code 93Trioptic 39Discrete 2 of 5
Chinese 2 of 5Korean 3 of 5Code 11
TLC 39MAIL MARKHAN XIN
Matrix 2 of 5UPC-E1
Touch to return to the previous screen.
Decoder Params
Use Decode Params to configure individual decoder parameters.
•UPCA
-Report Check Digit - The check digit is the last character of the symbol used to verify the integrity of the
data. Enables or disables this option. A check in the checkbox indicates that the option is enabled (default enabled).
-Preamble - Preamble characters are part of the UPC symbol consisting of Country Code and System
Character. Select the appropriate option to match the host system.
There are three options for transmitting a UPCA preamble:
+ Preamble None - Transmit no preamble.
+ Preamble Sys Char - Transmit System Character only (default).
DataWedge Configuration | 57
+ Preamble Country and Sys Char - Transmit System Character and Country Code (“0” for USA). Select
the appropriate option to match the host system.
•UPCE0
-Report Check Digit - The check digit is the last character of the symbol used to verify the integrity of the
data. Enables or disables this option. A check in the checkbox indicates that the option is enabled (default disabled).
-Preamble - Preamble characters are part of the UPC symbol consisting of Country Code and System
Character. Select the appropriate option to match the host system.
There are three options for transmitting a UPCE0 preamble:
+ Preamble Sys Char - Transmit System Character only.
+ Preamble Country and Sys Char - Transmit System Character and Country Code (“0” for USA).
+ Preamble None - Transmit no preamble (default).
-Convert UPCE0 To UPCA - Enable to convert UPCE0 (zero suppressed) decoded data to UPC-A format
before transmission. After conversion, the data follows UPC-A format and is affected by UPC-A programming
selections. Disable to transmit UPCE0 decoded data as UPCE0 data, without conversion (default - disabled).
•Code128
-Length1 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
-Length2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
-Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - disabled).
-Enable Plain Code 128 - Flag to enable other 128 sub types (besides GS1-128 and ISBT-128).
-Enable GS1-128 - Set the GS1 128 subtype. A check in the checkbox indicates that the option is enabled
(default - enabled).
-Enable ISBT128 - Set the ISBT128 subtype. A check in the checkbox indicates that the option is enabled
(default - enabled).
-ISBT128 Concatenation Mode - Select an option for concatenating pairs of ISBT code types:
+ Concat Mode Never - Do not concatenate pairs of ISBT codes encountered (default).
+ Concat Mode Always - There must be two ISBT codes in order to decode and perform concatenation.
Does not decode single ISBT symbols.
+ Concat Mode Auto - Decodes and concatenates pairs of ISBT codes immediately. If only a single ISBT
symbol is present, the device must decode the symbol the number of times set via DataWedge
Configuration 4 - 11 Redundancy - Code128 before transmitting its data to confirm that there is no
additional ISBT symbol.
-Check ISBT Table - The ISBT specification includes a table that lists several types of ISBT bar codes that are
commonly used in pairs. If ISBT128 Concat Mode is set, enable Check ISBT Table to concatenate only those
pairs found in this table. Other types of ISBT codes are not concatenated. A check in the checkbox indicates
that redundancy is enabled (default - disabled).
-Security Level - The scanner offers four levels of decode security for Code 128 bar codes. Select increasing
levels of security for decreasing levels of bar code quality. There is an inverse relationship between security
and scanner aggressiveness, so choose only that level of security necessary for any given application.
+ Security Level 0 - This setting allows the scanner to operate in its most aggressive state, while providing
sufficient security in decoding most “in-spec” bar codes.
+ Security Level 1 - This setting eliminates most misdecodes (default).
+ Security Level 2 - Select this option if Security level 1 fails to eliminate misdecodes.
+ Security Level 3 - If Security Level 2 is selected and misdecodes still occur, select this security level. Be
advised, selecting this option is an extreme measure against mis-decoding severely out of spec bar codes.
Selecting this level of security significantly impairs the decoding ability of the scanner. If this level of
security is needed, try to improve the quality of the bar codes.
+ Code128 Reduced Quiet Zone - Enables decoding of margin-less Code 128 bar codes.
58 | DataWedge Configuration
+ Ignore Code128 FCN4 - When enabled, and a Code 128 bar code has an embedded FNC4 character, it
will be removed from the data and the following characters will not be changed. When the feature is
disabled, the FNC4 character will not be transmitted but the following character will have 128 added to it.
•Code39
-Length1 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
-Length2 - Use to set decode lengths 4 (default - 55). See Decode Lengths on page 60 for more information.
-Verify Check Digit - Enable this feature to check the integrity of all Code 39 symbols to verify that the data
complies with a specified check digit algorithm. The digital scanner decodes only those Code 39 symbols that
include a modulo 43 check digit. Enable this feature only if the Code 39 symbols contain a modulo 43 check
digit (default - disabled).
-Report Check Digit - Transmit Code 39 data with or without the check digit. A check in the checkbox
indicates to send Code 39 data with check digit (default - disabled).
-Full ASCII - Code 39 Full ASCII is a variant of Code 39 that pairs characters to encode the full ASCII
character set. To enable or disable Code 39 Full ASCII (default - disabled),
-Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - disabled).
-Convert Code39 To Code32 - Code 32 is a variant of Code 39 used by the Italian pharmaceutical industry.
Scan the appropriate bar code below to enable or disable converting Code 39 to Code 32 (default - disabled).
-Report Code32 Prefix - Scan the appropriate bar code to enable or disable adding the prefix character “A” to
all Code 32 bar codes (default - disabled).
-Code39 Reduced Quiet Zone - Enables decoding of margin-less Code 39 bar codes.
•Interleaved 2 of 5
-Length1 - Use to set decode lengths (default - 14). See Decode Lengths on page 60 for more information.
-Length2 - Use to set decode lengths (default - 10). See Decode Lengths on page 60 for more information.
-Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - enabled).
-Check Digit
+ No Check Digit - A check digit is not used. (default)
+ USS Check Digit - Select to check the integrity of all Interleaved 2 of 5 symbols to verify the data
complies with either the Uniform Symbology Specification (USS) check digit algorithm.
+ OPCC Check Digit - Select to check the integrity of all Interleaved 2 of 5 symbols to verify the data
complies with either the Optical Product Code Council (OPCC) check digit algorithm.
-Report Check Digit - Transmit Interleaved 2 of 5 data with or without the check digit. A check in the
checkbox indicates to send Interleaved 2 of 5 data with check digit (default - disabled).
-Convert ITF-14 To EAN13 - Convert 14-character Interleaved 2 of 5 bar codes to EAN-13, and transmit as
EAN-13. The Interleaved 2 of 5 bar code must be enabled and must have a leading zero and a valid EAN-13
check digit. A check in the checkbox indicates that the option is enabled (default - disabled).
-I2of5 Reduced Quiet Zone - Enables decoding of margin-less I2of5 bar codes.
•Composite AB
-UCC Link Mode
+ Link Flag ignored - 1D component is transmitted regardless of whether a 2D component is detected.
+ Always Linked - 1D and the 2D components are transmitted. If 2D is not present, the 1D component is not
transmitted.
+ Auto Discriminate - the digital scanner determines if there is a 2D portion, then transmits the 1D
component, as well as the 2D portion if present. (default).
•UK Postal
DataWedge Configuration | 59
-Report Check Digit - Transmit UK Postal data with or without the check digit. A check in the checkbox
indicates to send UK Postal data with check digit (default - disabled).
•Codabar
-Length1 - Use to set decode lengths (default - 6). SeeDecode Lengths on page 60 for more information.
-Length2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
-Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - enabled).
-CLSI Editing - Enable this parameter to strip the start and stop characters and insert a space after the first,
fifth, and tenth characters of a 14-character Codabar symbol. Enable this feature if the host system requires this
data format (default - disabled).
-NOTIS Editing - Enable this parameter to strip the start and stop characters from a decoded Codabar symbol.
Enable this feature if the host system requires this data format (default - disabled).
•MSI
-Length 1 - Use to set decode lengths (default - 4). See Decode Lengths on page 60 for more information.
-Length 2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
-Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - enabled).
-Check Digit - With MSI symbols, one check digit is mandatory and always verified by the reader. The second
check digit is optional.
+ One Check Digit - Verify one check digit (default).
+ Two Check Digits - Verify two check digits.
-Check Digit Scheme - Two algorithms are possible for the verification of the second MSI check digit. Select
the algorithm used to encode the check digit.
+ Mod-11-10 - First check digit is MOD 11 and second check digit is MOD 10 (default).
+ Mod-10-10 - Both check digits are MOD 10.
-Report Check Digit - Transmit MSI data with or without the check digit. A check in the checkbox indicates to
send MSI data with check digit (default - disabled).
•Code93
-Length1 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
-Length2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
-Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - disabled).
•Discrete 2 of 5
-Length1 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
-Length2 - Use to set decode lengths (default - 14). See Decode Lengths on page 60 for more information.
-Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - enabled).
•Code 11
-Length1 - Use to set decode lengths (default - 4). See Decode Lengths on page 60 for more information.
-Length2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
-Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - enabled).
-Verify Check Digit - Check the integrity of all Code 11 symbols to verify that the data complies with the
specified check digit algorithm. This selects the check digit mechanism for the decoded Code 11 bar code.
+ No Check Digit - Do not verify check digit.
+ 1 Check Digit - Bar code contains one check digit (default).
+ 2 Check Digits - Bar code contains two check digits.
-Report Check Digit - Transmit Code 11 data with or without the check digit. A check in the checkbox
indicates to send Code 11 data with check digit (default - disabled).
60 | DataWedge Configuration
•HAN XIN
-HAN XIN Inverse
+ Disable - Disables decoding of HAN XIN inverse bar codes (default).
+ Enable - Enables decoding of HAN XIN inverse bar codes.
+ Auto - Decodes both HAN XIN regular and inverse bar codes.
•Matrix 2 of 5
-Length1 - Use to set decode lengths (default - 10). See Decode Lengths on page 60 for more information.
-Length2 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
-Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - disabled).
-Report Check Digit - Transmit Matrix 2 of 5 data with or without the check digit. A check in the checkbox
indicates to send Matrix 2 of 5 data with check digit (default - enabled).
-Verify Check Digit - Enable this feature to check the integrity of all Matrix 2 of 5 symbols to verify that the
data complies with a specified check digit algorithm (default - enabled).
•UPCE1
-Report Check Digit - The check digit is the last character of the symbol used to verify the integrity of the
data. Enables or disables this option. A check in the checkbox indicates that the option is enabled (default disabled).
-Preamble - Preamble characters are part of the UPC symbol consisting of Country Code and System
Character. Select the appropriate option to match the host system.
There are three options for transmitting a UPCE1 preamble:
+ Preamble Sys Char - Transmit System Character only.
+ Preamble Country and Sys Char - Transmit System Character and Country Code (“0” for USA).
+ Preamble None - Transmit no preamble (default).
-Convert UPCE1 To UPCA - Enable this to convert UPCE1 decoded data to UPC-A format before
transmission. After conversion, the data follows UPC-A format and is affected by UPC-A programming
selections. Disable this to transmit UPCE1 decoded data as UPCE1 data, without conversion (default disabled).
Decode Lengths
The allowable decode lengths are specified by options Length1 and Length2 as follows:
•Variable length: Decode symbols containing any number of characters.
Set both Length1 and Length2 to 0.
-
•Range: Decode a symbol with a specific length range (from a to b, including a and b).
-Set Length1 to a and set Length2 to b.
•Two Discrete Lengths: Decode only symbols containing either of two selected lengths.
-Set both Length1 or Length2 to the specific lengths. Length1 must be greater than Length2.
•One Discrete Length: Decode only symbols containing a specific length.
-Set both Length1 and Length2 to the specific length.
UPC EAN Params
Allows the configuration of the parameters that apply to more than one UPC or EAN decoder.
•Security Level - The scanner offers four levels of decode security for UPC/EAN bar codes. Select higher security
levels for lower quality bar codes. There is an inverse relationship between security and decode speed, so be sure
to choose only that level of security necessary for the application.
DataWedge Configuration | 61
-Level 0 - This default setting allows the scanner to operate fastest, while providing sufficient security in
decoding “in-spec” UPC/EAN bar codes (default).
-Level 1 - As bar code quality levels diminish, certain characters become prone to misdecodes before others
(i.e., 1, 2, 7, 8). If the scanner is misdecoding poorly printed bar codes, and the misdecodes are limited to these
characters, select this security level.
-Level 2 - If the scanner is misdecoding poorly printed bar codes, and the misdecodes are not limited to
characters 1, 2, 7, and 8, select this security level.
-Level 3 - If the scanner is still misdecoding, select this security level. Be advised, selecting this option is an
extreme measure against misdecoding severely out of spec bar codes. Selecting this level of security can
significantly impair the decoding ability of the scanner. If this level of security is necessary, try to improve the
quality of the bar codes.
•Supplemental2 - Enables or disables this option. A check in the checkbox indicates that the option is enabled.
•Supplemental5 - Enables or disables this option. A check in the checkbox indicates that the option is enabled.
•Supplemental Mode
-No Supplementals - the scanner is presented with a UPC/EAN plus supplemental symbol, the scanner
decodes UPC/EAN and ignores the supplemental characters (default).
-Supplemental Always - the scanner only decodes UPC/EAN symbols with supplemental characters, and
ignores symbols without supplementals.
-Supplements Auto - the scanner decodes UPC/EAN symbols with supplemental characters immediately. If
the symbol does not have a supplemental, the scanner must decode the bar code the number of times set via
UPC/EAN Supplemental Redundancy before transmitting its data to confirm that there is no supplemental.
-Supplemental Smart - Enables smart supplementals. In this mode the decoder returns the decoded value of
the main block right away if it does not belong to one of the following supplemental types: 378, 379, 977, 978,
979, 414, 419, 434 or 439. If the bar code starts with one of the prefixes it searches the image more
aggressively for a supplemental. Tries to scan the supplemental if it is present. If the supplemental scanning
failed, then the main bar code is returned.
-Supplemental 378-379 - Enables (auto-discriminate) supplemental for UPC/EAN codes starting with 378 or
379. Disables reading of supplementals for any other UPC/EAN bar code not starting with 378 or 379. Tries to
scan the supplemental if it is present. If the supplemental scanning failed, then the main bar code is returned.
-Supplemental 978-979 - Enables (auto-discriminate) supplemental for UPC/EAN codes starting with 978 or
979. Disables reading of supplementals for another UPC/EAN bar code not starting with 978 or 979. Tries to
scan the supplemental if it is present. If the supplemental scanning failed, then the main bar code is returned.
-Supplemental 414-419-434-439 - Enables (auto-discriminate) supplemental for UPC/EAN codes starting with
414, 419, 434 or 439. Disables reading of supplementals for another UPC/EAN bar code 4 - 16 not starting
with 414, 419, 434 or 439. Tries to scan the supplemental if it is present. If the supplemental scanning failed,
then the main bar code is returned.
-Supplemental 977 - Enables (auto-discriminate) supplemental for UPC/EAN codes starting with 977.
Disables reading of supplementals for another UPC/EAN barcode not starting with 977. Tries to scan the
supplemental if it is present. If the supplemental scanning failed, then the main bar code is returned.
•Retry Count - Retry count for auto-discriminating for supplementals. Possible values are 2 to 20 inclusive. Note
that this flag is only considered if Supplemental Mode - UPC EAN is set to one of the following values:
Supplementals Auto, Supplementals Smart, Supplementals 378-379, Supplementals 978-979, Supplementals
977 or Supplementals 414-419-434-439 (2 to 20, default 10).
•Bookland - Enable Bookland decoding. A check in the checkbox indicates that the option is enabled.
•Coupon - Enables Coupon code decoding. Note that in order to successfully decode Coupon codes, all of the
correct decoders must be enabled. A check in the checkbox indicates that the option is enabled.
•Coupon Repost Mode - Traditional coupon symbols are composed of two bar code: UPC/EAN and Code 128. A
new coupon symbol is composed of a single Data Expanded bar code. The new format offers more options for
purchase values (up to $999.999) and supports complex discount offers as a second purchase requirement. An
interim coupon symbol also exists that contain both types of bar codes: UPC/EAN and Databar Expanded. This
format accommodates both retailers that do not recognize or use the additional information included in the new
coupon symbol, as well as those who can process new coupon symbols.
62 | DataWedge Configuration
-Old Coupon Report Mode - Scanning an old coupon symbol reports both UPC and Code 128, scanning is
interim coupon symbol reports UPC, and scanning a new coupon symbol reports nothing (no decode).
-New Coupon Report Mode - Scanning an old coupon symbol reports either UPC or Code 128, and scanning
an interim coupon symbol or a new coupon symbol reports Databar Expanded.
-Both Coupon Report Modes - Scanning an old coupon symbol reports both UPC and Code 128, and scanning
an interim coupon symbol or a new coupon symbol reports Databar Expanded.
•Convert DataBar To UPC EAN - If this is set it converts DataBar bar codes to UPC/EAN format. For this
setting to work UPC/EAN symbologies must be enabled. A check in the checkbox indicates that the option is
enabled.
Reader Params
Allows the configuration of parameters specific to the selected bar code reader.
•Beam Timer - Sets the maximum amount of time that the reader remains on (0 - 60,000 ms in increments of 100
ms). A value of 0 sets the reader to stay on indefinitely (default -15000).
•Linear Security Level - Sets the number of times a bar code is read to confirm an accurate decode.
-Security Short or Codabar - Two times read redundancy if short bar code or Codabar.
-Security All Twice - Two times read redundancy for all bar codes (default).
-Security Long and Short - Two times read redundancy for long bar codes, three times for short bar codes.
-Security All Thrice - Three times read redundancy for all bar codes.
•Picklist - Allows the imager to decode only the bar code that is directly under the cross-hair/reticle (+) part of the
pattern. This feature is useful in applications where multiple bar codes may appear in the field of view during a
decode session and only one of them is targeted for decode.
-Disable – Disables Picklist mode. Any bar code within the field of view can be decoded (default).
-Centered - Enables the Picklist mode so that only the bar code in the center of the image is decoded. This is
most useful when used in conjunction with the static and dynamic reticle viewfinder modes. Note: This mode
is only valid for decoder modules that supports a viewfinder. If one tries to set this for a unsupported decoder
then the device would issue an error. (Camera scanner only).
-Reticle - Enables the Picklist mode so that only the bar code that is directly under the cross-hair (reticle) is
decoded. This is useful when used in conjunction with the static and dynamic reticle viewfinder modes. (Scan
Module Only)
•Aiming Pattern - Turns imager aiming pattern on or off during data capture. On (default) or Off.
•Aim Type
-Trigger - The device decodes a bar code on each Scan button press. (default).
-Continuous Read - The device continuously decodes bar codes as long as the Scan button is held down and
the previous bar code decoding is complete. This mode is useful when the user wants to perform rapid
scanning.
•Same Symbol Timeout - Use to prevent the device from decoding the same bar code within a specific time
interval (applicable only when Aim Type is set to Continuous Read). The user can perform rapid scanning and
prevents the user from decoding the same bar code twice. Set this value to an appropriate interval (in
milliseconds). A value of 0 indicates no interval is required between two successive reads (default - 500).
•Different Symbol Timeout - Use to prevent the device from decoding another bar code within a specific interval
(applicable only when aim type is set to Continuous Read). The user may want to prevent decoding too quickly
and set an interval that the user can aim before scanning the next bar code. A value of 0 indicates no interval is
required between two successive reads (default - 500).
•
•LCD Mode - Enables or disables LCD mode. LCD mode enhances the ability of the imager to read bar codes
from LCD displays such as cellphones (imager only).
-Disable - Disables the LCD mode (default).
-Enable - Enables LCD mode.
DataWedge Configuration | 63
Note: When using the LCD mode, a degradation in performance may be observed and the aiming
crosshair may blink until the bar code is decoded.
•Hardware Engine Low Power Timeout - (Imager only)
•Inverse 1D Mode - This parameter allows the user to select decoding on inverse 1D bar codes.
-Disable - Disables decoding of inverse 1D bar codes (default).
-Enable - Enables decoding of only inverse 1D bar codes.
-Auto - Allows decoding of both twice positive and inverse 1D bar codes.
•1D Quiet Zone Level - Sets the effort the decoder performs to decode margin-less bar codes. Applies to any
symbology with margin-less bar code decode enabled parameter. Since higher margin-less levels will increase the
mis-decode risk and decoding time, we strongly recommend the user only enable the symbologies which needs to
choose higher margin-less level, and leave all other symbologies at low default level 1.
•Viewfinder Mode - Configures the Viewfinder modes supported for camera scanning.
-Viewfinder Enabled - Enables only the viewfinder.
-Static Reticle - Enables the viewfinder and a red reticle in the center of the screen which helps selecting the
bar code (default).
Scan Params
Allows the configuration of Code ID and decode feedback options.
•Code ID Type - A Code ID character identifies the code type of a scanned bar code. This is useful when the
reader is decoding more than one code type. Select a code ID character to insert between the prefix and the
decoded symbol.
-Code ID Type None - No prefix (default).
-Code ID Type Aim - A standards based three character prefix.
-Code ID Type Symbol - A Symbol defined single character prefix.
Note: Not all ringtones are fully supported as decode tones and those of longer length may be truncated
when used as a decode tone. The recommendation is to test the selected tone for operation before
deployment to a customer site.
•Volume Type - Set the good decode beep to a system or other sound. This allows for independent control of the
good beep volume.
-Ringer and Notifications - Set the good decode beep to the ringer and notifications sound.(default)
-Music and media - Set the good decode beep to the music and media sound
-Alarms - Set the good decode beep to the alarm sound
•Decode Audio Feedback - Select an audio tone to sound upon a good decode.
•Decode Haptic Feedback - Enable the device to vibrate upon a good decode (default - enabled).
•Decode Feedback LED Timer - Set the amount of time (in milliseconds) that the green Data Capture LED stays
lit after a good decode. (default - 75 msec.)
•Decoding LED Notification - Enable the device to light the red Data Capture LED when data capture is in
progress. (default - disabled).
MSR Input
Use MSR Input options to configure the MSR Input Plug-in for the profile.
•Enabled — Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled.
Keystroke Output
Use to configure the Keystroke Output Plug-in for the profile.
64 | DataWedge Configuration
•Enabled — Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled (default
- enabled).
•Action key character - Enables decoding of a special character embedded within a bar code or MSR data for use
in native Android applications. This feature is helpful when populating or executing a form.
-None - Action key character feature is disabled (default).
-Tab - Tab character code in a bar code is processed. When DataWedge detects this character code in a bar
code, move the focus to the next field.
-Line feed - Line feed character code in a bar code is processed. When DataWedge detects this character code
in a bar code, move the focus to the next field.
-Carriage return - Carriage return character code in a bar code is processed. When DataWedge detects this
character code in a bar code, move the focus to the next field.
•Advanced data formatting - is a way to customizing data before transmission. Use advanced data formatting
(ADF) to edit scan data to suit requirements.
-Enable - Enables or disables ADF. A check in the checkbox indicates that ADF is enabled (default - disabled).
-Rules - ADF uses rules to customize data. These rules perform detailed actions when the data meets certain
criteria. One rule may consist of single or multiple criteria applied to single or multiple actions. See
Generating Advanced Data Formatting Rules on page 70
•Basic data formatting - Allows the configuration of any data formatting for the related Output Plug-in. When the
plug-in is disabled, any data is passed on without modification.
for more information.
-Enabled - Enables or disables Basic Data Formatting. A check in the checkbox indicates that it is enabled
(default - enabled).
-Prefix to data - Add characters to the beginning of the data when sent.
-Suffix to data - Add characters to the end of the data when sent.
-Send data - Set to transfer the captured data to the foreground application. Disabling this option prevents the
actual data from being transmitted. However, the prefix and suffix strings, if present, are still transmitted even
when this option is disabled (default - enabled).
-Send as hex - Set to send the data in hexadecimal format. A check in the checkbox indicates that the plug-in is
enabled (default - disabled).
-Send TAB key - Set to append a tab character to the end of the processed data. A check in the checkbox
indicates that the plug-in is enabled (default - disabled).
-Send ENTER key - Set to append an Enter character to the end of the processed data. A check in the
checkbox indicates that the plug-in is enabled (default - disabled).
Intent Output
Allows configuration of the Intent Output Plug-in for the profile. The Intent Output Plug-in allows the captured data
to be sent to an application in the form of an implicit Intent. Refer to the Android Developer web site for more
information, http://developer.android.com.
•Enabled - Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled (default disabled).
•Intent action - Enter the Intent Action name (required).
•Intent category - Enter the Intent Category name (required).
•Intent delivery - Select the method by which the intent is delivered:
-Send via StartActivity
-Send via startService (default)
-Broadcast intent
•Advanced data formatting - is a way to customizing data before transmission. Use advanced data formatting
(ADF) to edit scan data to suit requirements.
-Enable - Enables or disables ADF. A check in the checkbox indicates that ADF is enabled (default - disabled).
DataWedge Configuration | 65
-Rules - ADF uses rules to customize data. These rules perform detailed actions when the data meets certain
criteria. One rule may consist of single or multiple criteria applied to single or multiple actions. See
Generating Advanced Data Formatting Rules on page 70
•Basic data formatting - Allows configuration of any data formatting for the related Output Plug-in. When the
plug-in is disabled any data is passed on without modification.
-Enabled - Enables or disables Basic Data Formatting. A check in the checkbox indicates that it is enabled
(default - enabled).
-Prefix to data - Add characters to the beginning of the data when sent.
-Suffix to data - Add characters to the end of the data when sent.
-Send data - Set to transfer the captured data to the foreground application. Disabling this option prevents the
actual data from being transmitted. However, the prefix and suffix strings, if present, are still transmitted even
when this option is disabled (default - enabled).
-Send as hex - Set to send the data in hexadecimal format. A check in the checkbox indicates that the plug-in is
enabled (default - disabled).
-Send TAB key - Set to append a tab character to the end of the processed data. A check in the checkbox
indicates that the plug-in is enabled (default - disabled).
-Send ENTER key - Set to append an Enter character to the end of the processed data. A check in the
checkbox indicates that the plug-in is enabled (default - disabled).
for more information.
Intent Overview
The core components of an Android application (its activities, services, and broadcast receivers) are activated by
intents. An intent is a bundle of information (an Intent object) describing a desired action - including the data to be
acted upon, the category of component that should perform the action, and other pertinent instructions. Android
locates an appropriate component to respond to the intent, launches a new instance of the component if one is needed,
and passes it the Intent object.
Components advertise their capabilities, the kinds of intents they can respond to, through intent filters. Since the
system must learn which intents a component can handle before it launches the component, intent filters are specified
in the manifest as <intent-filter>elements. A component may have any number of filters, each one describing a
different capability. For example, if the manifest contains the following:
In the Intent output plug-in configuration, the Intent action would be:
android.intent.category.DEFAULT
and the Intent category would be:
android.intent.category.MAIN.
The Intent delivery option allows the method by which the intent is delivered to be specified. The delivery
mechanisms are Send via startActivity, Send via startService or Broadcast intent.
The decode related data added to the Intent’s bundle can be retrieved using the Intent.getStringExtra() and
Intent.getSerializableExtra() calls, using the following String tags:
Decode data is returned as a list of byte arrays. In most cases there will be one byte array per decode. For bar
-
code symbologies that support concatenation e.g. Codabar, Code128, MicroPDF, etc., the decoded data is
stored in multiple byte arrays (one byte array per bar code). Clients can get data in each byte array by passing
an index.
The MSR related data added to the Intent's bundle can be retrieved using the Intent.getStringExtra() and
Intent.getSerializableExtra() calls, using the following String tags:
-MSR track 3 decode status as an Integer where 0 indicates a successful decode.
Most scanning applications might want the user to be able to decode data and for that decode data to be sent to the
*current* activity but not necessarily displayed. If this is the case, then the activity needs to be marked as
‘singleTop’ in its AndroidManifest.xml file. If your activity is not defined as singleTop, then on every decode, the
system will create another copy of your Activity and send the decode data to this second copy.
Finally there will be a configuration option for each process plug-in so that the process plug-in can be configured
specifically for the intent output, which in this case is the basic data formatting process plug-in.
IP Output
Note: IPWedge application is required on a host computer. Download the IPWedge application from the
Support Central web site: http://www.zebra.com/support.
IP Output allows DataWedge to send captured data to a host computer via a network connection. Captured data can
be sent over an IP network to a specified IP address and port using either TCP or UDP transport protocols.
•Enabled - Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled (default disabled).
•Remote Wedge - Enable or disable the Remote Wedge option (default - enabled). Remote Wedge is used with the
IPWedge application.
•Protocol - Select the protocol used by the remote application. Options: TCP (default) or UDP.
•IP address - Enter the IP address used by the remote application (default - 0.0.0.0).
•Port - Enter the port number used by the remote application (default - 58627).
•Advanced data formatting - is a way of customizing data before transmission. Use advanced data formatting
(ADF) to edit scan data to suit requirements.
-Enable - Enables or disables ADF. A check in the checkbox indicates that ADF is enabled (default - disabled).
DataWedge Configuration | 67
-Rules - ADF uses rules to customize data. These rules perform detailed actions when the data meets certain
criteria. One rule may consist of single or multiple criteria applied to single or multiple actions. See
Generating Advanced Data Formatting Rules on page 70
•Basic data formatting - Allows configuration of any data formatting for the related Output Plug-in. When the
plug-in is disabled any data is passed on without modification.
-Enabled - Enables or disables Basic Data Formatting. A check in the checkbox indicates that it is enabled
(default - enabled).
-Prefix to data - Add characters to the beginning of the data when sent.
-Suffix to data - Add characters to the end of the data when sent.
-Send data - Set to transfer the captured data to the foreground application. Disabling this option prevents the
actual data from being transmitted. However, the prefix and suffix strings, if present, are still transmitted even
when this option is disabled (default - enabled).
-Send as hex - Set to send the data in hexadecimal format. A check in the checkbox indicates that the plug-in is
enabled (default - disabled).
-Send TAB key - Set to append a tab character to the end of the processed data. A check in the checkbox
indicates that the plug-in is enabled (default - disabled).
-Send ENTER key - Set to append an Enter character to the end of the processed data. A check in the
checkbox indicates that the plug-in is enabled (default - disabled).
for more information.
Usage
This section provides information on how to configure IP Output using the DataWedge configuration user interface.
To use IP Output in a particular DataWedge profile (for example: Profile0), scroll downward on IP Output.
Figure 47: IP Output Screen
Using IP Output with IPWedge
IPWedge is a computer application that can be easily configured to retrieve data sent over network by DataWedge IP
Output. Refer to the IPWedge User Manual on how to install and configure in a host computer. To enable IP Output
to send captured data to a remote computer that is installed with IPWedge:
Procedure:
1 In IP Output, touch Enabled.
A check appears in the checkbox.
68 | DataWedge Configuration
2 Ensure Remote Wedge option is enabled.
3 Touch Protocol.
4 In the Choose protocol dialog box, touch the same protocol selected for the IPWedge computer application.
(TCP is the default).
Figure 48: Protocol Selection
5 Touch IP Address.
6 In the Enter IP Address dialog box, enter the IP address of host computer to send data to.
Figure 49: IP Address Entry
7 Touch Port.
8 In the Enter port number dialog box, enter same port number selected for IPWedge computer application.
Figure 50: Port Number Entry
9 Configure Advanced data formatting and Basic data formatting Plug-in if any required modification to be done
to captured data before sending to remote computer.
Using IP Output without IPWedge
IP Output Plug-in can be used to send captured data from DataWedge to a remote device or host computer without
using IPWedge. At the data receiving end, the host computer or mobile device should have an application, that listens
DataWedge Configuration | 69
to TCP or UDP data coming from a configured port and IP address in the IP Output plug-in. To enable IP Output to
send captured data to a remote computer:
Procedure:
1 In IP Output, touch Enabled.
A check appears in the checkbox.
2 Ensure Remote Wedge option is disabled.
3 Touch Protocol.
4 In the Choose protocol dialog box, touch the same protocol selected in the client application. (TCP is the default).
Figure 51: Protocol Selection
5 Touch IP Address.
6 In the Enter IP address dialog box, enter the IP address of host computer to send data to.
Figure 52: IP Address Entry
7 Touch Port.
8 In the Enter port number dialog box, enter the port number that the host computer application is listening on.
Figure 53: Port Number Entry
9 Configure Advanced Data Formatting and Basic Data Formatting Plug-in if any required modification to be
done to captured data before sending to remote computer.
70 | DataWedge Configuration
Generating Advanced Data Formatting Rules
The ADF plug-in applies rules (actions to be performed based on defined criteria) to the data received via an input
plug-in before sending it to the output plug-in.
•Rules - The ADF process plug-in consists of one or more rules. DataWedge formats the output data according to
the first matching rule. A rule is a combination of criteria and a set of actions to be performed, upon fulfillment of
the criteria set in the rule.
Criteria - Criteria can be set according to Input plug-in, symbology, matching string within the data (at the
•
specified position) and/or data length. Received data must match the defined criteria in order for the data to be
processed.
•Actions - A set of procedures defined to format data. There are four types of actions which are for formatting
cursor movement, data modification, data sending and delay specifications. An action can be defined to send the
first number of characters to the Output plug-in, pad the output data with spaces or zeros, remove spaces in data,
etc.
Configuring ADF Plug-in
Configuring the ADF plug-in consists of creating a rule, defining the criteria and defining the actions.
Procedure:
1
Touch
2
Touch
3 Touch a DataWedge profile.
4 In Keystroke Output, touch Advanced data formatting.
Figure 54: Advanced Data Formatting Screen
.
.
5 Touch the Enable checkbox to enable ADF.
Creating a Rule
Note: By default, Rule0, is the only rule in the Rules list.
Procedure:
DataWedge Configuration | 71
1
Touch
2 Touch New rule.
3 Touch the Enter rule name text box.
4 In the text box, enter a name for the new rule.
5 Touch Done.
6 Touch OK.
or .
Defining a Rule
Procedure:
1 Touch the newly created rule in the Rules list.
Figure 55: Rule List Screen
2 Touch the Rule enabled checkbox to enable the current rule.
Defining Criteria
Procedure:
1 Touch Criteria.
72 | DataWedge Configuration
Figure 56: Criteria Screen
2 Touch String to check for option to specify the string that must be present in the data.
3 In the Enter the string to check for dialog box, enter the string.
4 Touch Done.
5 Touch OK.
6 Touch String position option to specify the position of the string specified in the String to check for option. The
ADF rule is only applied if the specific string in String to check for is found at the specified String position
location (zero for the start of the string).
7 Touch the + or - to change the value.
8 Touch OK.
9 Touch String length option to specify a length for the received data. The ADF rule only applies to the bar code
data with that specified length.
10 Touch the + or - to change the value.
11 Touch OK.
12 Touch Source criteria option to associate an input device to an ADF rule. The ADF rule only applies to data
received from associated input devices.
13 Touch Barcode input or MSR input. Options vary depending upon the device configuration.
14 Touch the Source enabled checkbox to accept data from this source.
Figure 57: Barcode Input Screen
DataWedge Configuration | 73
15 For Barcode inputs, touch the All decoders enabled checkbox to select all bar code symbologies. Deselect the
All decoders enabled checkbox to individually select the symbologies.
16
Touch until the Rule screen appears.
17 If required, repeat steps to create another rule.
18
Touch until the Rule screen appears.
Defining an Action
Note: By default the Send remaining action is in the Actions list.
Procedure:
1
Touch
2 Touch New action.
3 In the New action menu, select an action to add to the Actions list. See Table 4: ADF Supported Actions on page
74
for a list of supported ADF actions.
4 Some Actions require additional information. Touch the Action to display additional information fields.
5 Repeat steps to create more actions.
6
Touch
7
Touch .
or .
.
Deleting a Rule
Procedure:
1 Touch and hold on a rule until the context menu appears.
2 Touch Delete to delete the rule from the Rules list.
Note: When there is no rule available for ADF plug-in or all rules are disabled, DataWedge passes
decoded data to the output plug-in without processing the data.
74 | DataWedge Configuration
Order Rules List
Note: When there are no rules defined, ADF passes the captured data through as is. In contrast, when rules
are defined but all are disabled, ADF does not pass any captured data through.
Rules are processed in top-down order. The rules that are on top of the list are processed first. Use the icon next to the
rule to move it to another position in the list.
Table 4: ADF Supported Actions
TypeActionsDescription
Cursor Movement
Data Modification
Skip aheadMoves the cursor forward by a specified number of characters. Enter the
number of characters to move the cursor ahead.
Skip backMoves the cursor back by a specified number of characters. Enter the
number of characters to move the cursor back.
Skip to startMoves the cursor to the beginning of the data.
Move toMoves the cursor forward until the specified string is found. Enter the
string in the data field.
Move past aMoves the cursor forward past the specified string. Enter the string in
the data field.
Crunch spacesRemove spaces between words to one and remove all spaces at the be-
ginning and end of the data.
Stop space crunchStops space crunching. This disables the last Crunch spaces action.
Remove all spacesRemove all spaces in the data.
Stop space removalStop removing spaces. This disables the last Remove all spaces action.
Remove leading zerosRemove all zeros at the beginning of data.
Stop zero removalStop removing zeros at the beginning of data. This disables the previous
Remove leading zeros action.
Pad with zerosLeft pad data with zeros to meet the specified length. Enter the number
zeros to pad.
Stop pad zerosStop padding with zeros. This disables the previous Pad with zeros ac-
tion.
Pad with spacesLeft pad data with spaces to meet the specified length. Enter the number
spaces to pad.
Stop pad spacesStop padding with spaces. This disables the previous Pad with spaces
action.
Replace stringReplaces a specified string with a new string. Enter the string to replace
and the string to replace it with.
Stop all replace stringStop all Replace string actions.
Data Sending Send nextSends the specified number of characters from the current cursor posi-
tion. Enter the number of characters to send.
Send remainingSends all data that remains from the current cursor position.
Send up toSends all data up to a specified string. Enter the string.
Table continued…
TypeActionsDescription
Send pausePauses the specified number of milliseconds before continuing the next
action. Enter the amount of time in milliseconds.
Send stringSends a specified string. Enter the string to send.
Send charSends a specified ASCII/ Unicode character. Enter a character value.
The maximum Unicode character value can be entered is U-10FFFF (=
1114111 in decimal).
Deleting an Action
Procedure:
1 Touch and hold the action name.
2 Select Delete action from the context menu.
ADF Example
The following illustrates an example of creating Advanced Data Formatting:
When a user scans a bar code with the following criteria:
DataWedge Configuration | 75
•Code 39 bar code.
length of 12 characters.
•
•contains 129 at the start position.
Modify the data as follows:
•Pad all sends with zeros to length 8.
•send all data up to character X.
•send a space character.
To create an ADF rule for the above example:
Procedure:
1
Touch
2 Touch DataWedge.
3 Touch Profile0.
4 Under Keystroke Output, touch Advanced data formatting.
5 Touch Enable.
6 Touch Rule0.
7 Touch Criteria.
8 Touch String to check for.
9 In the Enter the string to check for text box, enter 129 and then touch OK.
10 Touch String position.
11 Change the value to 0.
12 Touch OK.
13 Touch String length.
14 Change value to 12.
15 Touch OK.
16 Touch Source criteria.
17 Touch Barcode input.
.
76 | DataWedge Configuration
18 Touch All decoders enabled to disable all decoders.
19 Touch Code 39.
20
Touch three times.
21 Touch and hold on the Send remaining rule until a menu appears.
22 Touch Delete action.
23
Touch
24 Touch New action.
25 Select Pad with zeros.
26 Touch the Pad with zeros rule.
27 Touch How many.
28 Change value to 8 and then touch OK.
29
Touch
30
Touch
31 Touch New action.
32 Select Send up to.
33 Touch Send up to rule.
34 Touch String.
35 In the Enter a string text box, enter X.
36 Touch OK.
37
Touch
38
Touch
39 Touch New action.
40 Select Send char.
41 Touch Send char rule.
42 Touch Character code.
43 In the Enter character code text box, enter 32.
44 Touch OK.
45
Touch
or .
three times.
or .
three times.
or .
.
Figure 58: ADF Sample Screen
DataWedge Configuration | 77
46 Ensure that an application is open on the device and a text field is in focus (text cursor in text field).
47 Aim the exit window at the bar code.
Figure 59: Sample Bar Code
48 Press and hold the scan button.
The red laser aiming pattern turns on to assist in aiming. Ensure that the bar code is within the area formed by the
aiming pattern. The LED light red to indicate that data capture is in process.
49 The LED lights green, a beep sounds and the device vibrates, by default, to indicate the bar code was decoded
successfully. The formatted data 000129X<space>appears in the text field.
Scanning a Code 39 bar code of 1299X15598 does not transmit data (rule is ignored) because the bar code data
did not meet the length criteria.
78 | DataWedge Configuration
Figure 60: Formatted Data
DataWedge Settings
The DataWedge Settings screen provides access to general, non-profile related options. Touch or >
Settings.
Figure 61: DataWedge Settings Window
•DataWedge enabled - Enables or disables DataWedge. To disable DataWedge uncheck this option.
•Enable logging - Enables or disables debug output file to logcat. To enable logging check this option.
•Import - allows import of a DataWedge configuration file. The imported configuration replaces the current
configuration.
•Export - allows export of the current DataWedge configuration to the microSD card.
DataWedge Configuration | 79
•Import Profile - allows import of a DataWedge profile file.
•Export Profile - allows export of a DataWedge profile.
•Restore - return the current configuration back to factory defaults.
Importing a Configuration File
Procedure:
1 Copy the configuration file to a location on the device (Internal Storage or microSD card).
2
Touch
3
Touch
4
Touch
5 Touch Settings.
6 Touch Import.
7 Select the datawedge.db file. Use . and .. and folder entries to browse to the configuration file. The
configuration file (datawedge.db) is imported and replaces the current configuration.
.
.
or .
Exporting a Configuration File
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch Settings.
5 Touch Export.
6 In the Export To dialog box, select the location to store the file.
7 Touch Export to export the DataWedge configuration file to the selected location.
.
.
or .
Importing a Profile File
Note: Do not change the filename of the of the profile file. If the filename is changed, the file will not be
imported.
Procedure:
1 Copy the profile file to the root of the On-Device Storage.
2
Touch
3
Touch
4
Touch
5 Touch Settings.
6 Touch Import Profile.
7 Select the profile configuration file (dwprofile_xxx.db, where x = the name of the profile) in the file
selection dialog box. Use ., .., and folder entries to locate the profile file.
8 Touch the profile filename. The profile file (dwprofile_xxx.db) is imported and appears in the profile list.
.
.
or .
80 | DataWedge Configuration
Exporting a Profile
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch Change to change the location to save the file.
5 Select Internal Storage or External Storage.
6 Touch OK.
7 Select a profile from the profile list.
8 Touch Export. The profile file (dwprofile_x.db, where x = name of the profile) is saved to the selected
location.
.
.
or .
Restoring DataWedge
To restore DataWedge to the factory default configuration:
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch Settings.
5 Touch Restore.
6 Touch Yes.
.
.
or .
Configuration and Profile File Management
The configuration or profile settings for DataWedge can be saved to a file for distribution to other devices.
After making configuration or profile changes, export the new configuration or profile to the root of the microSD
card. The configuration file created is automatically named datawedge.db. The profile file created is
automatically named dwprofile_x.db, where x is the profile name. The files can then the copied to the microSD
card of other devices and imported into DataWedge on those devices. Importing a configuration or profile replaces
the existing settings.
After making configuration or profile changes, export the new configuration or profile to the root of the On-device
Storage. The configuration file created is automatically named datawedge.db. The profile file created is
automatically named dwprofile_x.db, where x is the profile name. The files can then the copied to theOn—
device Storage of other devices and imported into DataWedge on those devices. Importing a configuration or profile
replaces the existing settings.
Enterprise Folder
Internal storage contains the Enterprise folder (/enterprise). The Enterprise folder is persistent and maintains
data after an Enterprise reset. After an Enterprise Reset, DataWedge checks folder /enterprise/device/
settings/datawedge/enterprisereset/ for a configuration file, datawedge.db or a profile file,
dwprofile_x.db. If the file is found, it imports the file to replace any existing configuration or profile.
DataWedge Configuration | 81
Note: A Factory Reset deletes all files in the Enterprise folder.
Auto Import
DataWedge supports remote deployment of a configuration to a device, using tools such as MSP. DataWedge
monitors the /enterprise/device/settings/datawedge/autoimport folder for the DataWedge
configuration file (datawedge.db) or a profile file (dwprofile_x.db). When DataWedge launches it checks
the folder. If a configuration or profile file is found, it imports the file to replace any existing configuration or profile.
Once the file has been imported it is deleted from the folder.
While DataWedge is running it receives a notification from the system that a file has been placed into the /enterprise/device/settings/datawedge/autoimport folder. When this occurs, DataWedge imports
this new configuration or profile, replacing the existing one and delete the file. DataWedge begins using the imported
configuration immediately.
Note:
A Factory Reset deletes all files in the Enterprise folder.
It is strongly recommended that the user exits DataWedge before remotely deploying any configuration or
profile. It is required that the file permissions are set to 666.
Programming Notes
The following paragraphs provide specific programming information when using DataWedge.
Overriding Trigger Key in an Application
To override the trigger key in an application, create a profile for the application that disables the Barcode input. In the
application, use standard APIs, such as onKeyDown() to listen for the KEYCODE_BUTTON_L1 and
KEYCODE_BUTTON_R1 presses.
Capture Data and Taking a Photo in the Same Application
To be able to capture bar code data and take a photo in the same application:
•Create a Datawedge profile pertaining to the picture taking Activity in your application that disables scanning and
use standard Android SDK APIs to control the Camera.
•
The default Datawedge profile takes care of the scanning in the application. You might want to create another
DataWedge profile that caters to any specific scanning needs, associated to your Application's Activity pertaining
to scanning.
Disable DataWedge on MC40 and Mass Deploy
To disable DataWedge and deploy onto multiple MC40 devices:
Procedure:
1
Touch
2 Touch DataWedge.
3
Touch
4 Touch Settings.
5 Unselect the DataWedge enabled check box.
.
or .
82 | DataWedge Configuration
6 Export the DataWedge configuration. See Exporting a Configuration File on page 79
Configuration and Profile File Management on page 80 for instructions for using the auto import feature.
for instructions. See
Soft Scan Feature
DataWedge allows a native Android application to programmatically start, stop, or toggle the scan trigger state. The
application can issue an Android Broadcast Intent, to control the scanner, without requiring the scan button to be
pressed. The active DataWedge profile is required to control all the parameters during a scan operation.
The structure of the broadcast intent that resolves to the soft scan is:
-Protected Extensible Authentication Protocol (PEAP) - with Microsoft Challenge-Handshake Authentication
Protocol version 2 (MSCHAPv2) and Generic Token Card (GTC) authentication.
-EAP-Flexible Authentication via Secure Tunneling (FAST) - with MSCHAPv2 and GTC authentication.
-EAP-Transport Layer Security (TLS)
-EAP-TTLS - with Password Authentication Protocol (PAP), MSCHAP and MSCHAPv2 authentication.
83 | WLAN Configuration
Connecting to a Wi-Fi Network
Note: By default, the network Proxy is set to None and the IP settings is set to DHCP. See Configuring for
a Proxy Server on page 85
a Static IP Address on page 86 for setting the device to use a static IP address.
Procedure:
1
Touch
2
Touch
3 Slide the Wi-Fi switch to the On position. The device searches for WLANs in the area and displays them in the
list. Open networks are indicated with
4 Scroll through the list and touch the desired WLAN network.
or .
Wi-Fi.
for setting connection to a proxy server and see Configuring the Device to Use
and secure networks are indicated with .
84 | WLAN Configuration
Figure 62: WLAN Network Security Dialog Boxes
5Note:
Touch Show password checkbox to display password as it is entered.
Enter the required password. or other credentials then touch Connect. See the system administrator for more
information.
6 The MC40 obtains a network address and other required information from the network using the dynamic host
configuration protocol (DHCP) protocol. To configure the MC40 with a fixed internet protocol (IP) address, see
the MC40 Integrator Guide.
7 When the device connects to the network, the network name appears at the top of the list and Connected appears
below the network name.
Manually Adding a Wi-Fi Network
Manually add a Wi-Fi network if the network does not broadcast its name (SSID) or to add a Wi-Fi network when out
of range.
Procedure:
1
Touch
2
Touch
3 Slide the Wi-Fi switch to the On position.
4 Touch + at the bottom of the screen.
5 In the Network SSID text box, enter the name of the Wi-Fi network.
6 In the Security drop-down list, select the type of security. Options:
or .
Wi-Fi.
•None
•WEP
•WPA/WPA2 PSK
WLAN Configuration | 85
•802.1x EAP.
7 If the network security is None, touch Save.
8 If the network security is WEP or WPA/WPA2 PSK, enter the required password and then touch Save.
9 If the network security is 802.1x EAP:
•Touch the EAP method
•Touch the Phase 2 authentication drop-down list and select an authentication method.
•If required, touch CA certificate and select a Certification Authority (CA) certificate. Note: Certificates are
installed using the Security settings.
•If required, touch User certificate and select a user certificate. Note: User certificates are installed using the
Security settings.
•If required, in the Identity text box, enter the username credentials.
•If desired, in the Anonymous identity text box, enter an anonymous identity username.
•If required, in the Password text box, enter the password for then given identity.
10
Touch Save. To connect to the saved network, touch and hold on the saved network and select Connect to
network.
11
Touch
Note: By default, the network Proxy is set to None and the IP settings is set to DHCP. See Configuring
for a Proxy Server on page 85
to Use a Static IP Address on page 86 for setting the device to use a static IP address.
.
drop-down list and select PEAP, TLS, TTLS, LEAP or FAST.
for setting connection to a proxy server and see Configuring the Device
Configuring for a Proxy Server
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers.
A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource,
available from a different server. The proxy server evaluates the request according to its filtering rules. For example,
it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource
by connecting to the relevant server and requesting the service on behalf of the client.
It is important for enterprise customers to be able to set up secure computing environments within their companies,
and proxy configuration is an essential part of doing that. Proxy configuration acts as a security barrier ensuring that
the proxy server monitors all traffic between the Internet and the intranet. This is normally an integral part of security
enforcement in corporate firewalls within intranets.
Procedure:
1 In the network dialog box, touch a network.
2 Touch Show advanced options checkbox.
3 Touch Proxy settings and select Manual.
86 | WLAN Configuration
Figure 63: Proxy Settings
4 In the Proxy hostname text box, enter the address of the proxy server.
5 In the Proxy port text box, enter the port number for the proxy server.
Note: When entering proxy addresses the Bypass proxy for field, do not use spaces or carriage returns
between addresses.
6 In the Bypass proxy for text box, enter addresses for web sites that do not require to go through the proxy server.
Use a comma “,” between addresses.
7 Touch Connect.
8
Touch
.
Configuring the Device to Use a Static IP Address
By default, the device is configured to use Dynamic Host Configuration Protocol (DHCP) to assign an Internet
protocol (IP) address when connecting to a wireless network. To configure the device to connect to a network using a
static IP address:
Procedure:
1 In the network dialog box, touch a network.
2 Touch Show advanced options checkbox.
3 Touch IP settings and select Static.
Figure 64: Static IP Settings
4 In the IP address text box, enter an IP address for the device.
5 If required, in the Gateway text box, enter a gateway address for the device.
6 If required, in the Network prefix length text box, enter a the prefix length.
7 If required, in the DNS 1 text box, enter a Domain Name System (DNS) address.
8 If required, in the DNS 2 text box, enter a DNS address.
9 Touch Connect.
10
Touch
.
Advanced Wi-Fi Settings
Note: Advanced Wi-Fi settings are for the device not for a specific wireless network.
WLAN Configuration | 87
Use the Advanced settings to configure additional Wi-Fi settings. Touch
advanced settings.
•General
-Network notification - When enabled, notifies the user when an open network is available.
-Keep Wi-Fi on during sleep - Opens a menu to set whether and when the Wi-Fi radio turns off.
+ Always On - The radio stays on when the device enters suspend mode.
+ Only when plugged in - The radio stays on while the device is connected to external power.
+ Never On - The radio turns off when the device enters suspend mode (default).
-Install Certificates – Touch to install certificates (KitKat only).
-MAC address - Displays the Media Access Control (MAC) address of the device when connecting to Wi-Fi
networks.
•Regulatory
-Country selection - Allows user to select the country of operation. If Auto is selected, the MC40 will acquire
the country information from the Access Points and displays the acquired country name.
-Region code - Displays the current region code.
•Band and Channel Selection
-Wi-Fi frequency band - Use to select the frequency band. Options: Auto (default), 5 GHz only or 2.4 GHz
only.
-Available channels (2.4 GHz) - Use to select specific channels. Touch to display the Available channels
menu. Select specific channels. Touch OK.
-Available channels (5 GHz) - Use to select specific channels. Touch to display the Available channels menu.
Select specific channels. Touch OK.
or > Advanced to view the
•Logging
- Advanced Logging - Provides support for capture of system logs to a file to help in debugging and
resolution of Wi-Fi related issues. Disabled by default. In the Advanced Logging dialog box, select Enable
Logging. If desired, change the log directory location. When enabled, the following log are captured:
Note:
All log files are saved in /storage/sdcard/fusionlogs on the MC40.
Fusion will ask the user whether he wants to clear out previous logs before starting logging.
tcpdump capture file and fusion-sysinfo.log will only be generated when advanced logging
is stopped.
88 | WLAN Configuration
+ Android logcat output with time stamps and the kernel messages in the file: fusion-wlan.log.
+ tcpdump intermediate capture of packets between network stack and driver in the file: fusion-
pktcap.pcap
Fusion versions, Wi-Fi state machine logs and other framework information in the file: fusion-
+
sysinfo.log.
-Wireless logs - Use to capture Wi-Fi log files.
+ Fusion Logger - Touch to open the Fusion Logger application. This application maintains a history of
high level WLAN events which helps to understand the status of connectivity.
Figure 65: Fusion Logger Screen
+ Fusion Status - Touch to display live status of WLAN state. Also provides information of device and
connected profile. (KitKat only)
Figure 66: Fusion Status Screen
•About
-Version - Displays the current Fusion information.
Enabling Logging
Note: Make sure that no other ADB command or any application that captures KMSG is running.
11 After logging is complete:, unckeck Advanced Logging.
•On Jelly Bean devices, touch Stop Logging.
On KitKat devices, touch Enable Logging
•
The MC40 saves the log file fusion-wlan.log to On Device Storage root directory (Jelly Bean) or On
Device Storage fusionlogs directory (KitKat).
12 Connect MC40 to host computer.
13 Copy the log file from the location listed above.
14 Disconnect the MC40 from the host computer.
90 | WLAN Configuration
Additional Wi-Fi Advanced Features
Some additional Wi-Fi settings cannot be accessed from the User Interface. They can be configured by using Wi-Fi
(CSP). Refer to EMDK documentation for the details on the Wi-Fi settings configuration using the Wi-Fi CSP.
•Auto Time Config - Using this feature, the device can sync up its time with Zebra WLAN infrastructure. This
feature works only when the device is connected to Zebra WLAN infrastructure and the feature is enabled on the
WLAN infrastructure side. Default: disabled.
•PMKID Caching - Allows the device to skip 802.1x authentication during roaming if it had previously connected
to that AP with a full 802.1x authentication. Defaut: disabled. Note: disable OKC when enabling PMKID
Caching.
•
•Opportunistic Key Caching - Use this feature to skip 802.1x authentication during roaming. The device will go
for full 802.1x authentication for the first time it connects to the network. For subsequent roaming, the device
skips 802.1x authentication. Default: enabled.
•Cisco Centralized Key Management - Allows the device to skip 802.1x and key-handshake phases during
roaming. This feature is available only when the device is connected to a Cisco infrastructure that supports Cisco
Centralized Key Management (CCKM). Default: enabled.
•Fast Transition - Fast Transition (FT) is the fast roaming standard, 802.11r. With this feature, the device can skip
802.1x and key-handshake phases during roam. Default: enabled.
•Fast Transition Resource Information Container - Allows the device to request TSPEC as part of reassociation frame exchange. This helps to avoid sending a separate resource request after roaming is completed.
Default: disabled.
•Power Save - The device can be configured to work in different power save modes: This feature is only available
on KitKat devices.
1 Active
2 Power save using WMM-PS - This is the default power save mode. Device uses WMM-PS power save
3 Power save using PS-Poll - In this method, the device will use PS-Poll frames to retrieve buffered frames
4 Null Data Power Save - In Null Data Power Save (NDP), the device will stay awake for 100 ms after the last
•FIPS - The device supports FIPS 140-2 Level 1. In this mode, the device will not support TKIP and WEP
encryption modes. When Wi-Fi is enabled, the stack will run predefined tests to make sure that the encryption
engine is working correctly and the firmware and firmware loader modules are correct.
•802.11k - Using 802.11k, the device can discover neighbor APs and adds support for different types of radio
resource measurements. Default: enabled. KitKat only.
•Band Preference - The device can be configured to prefer one band over another. By default, device prefers 5
GHz frequency band over 2.4 GHz. KitKat only.
•Subnet Roaming - When the device roams between different sub networks, if it detects that it is roaming to a
different subnet, the device will request a fresh IP address. Default: disabled.
- Keeps the WLAN radio always in active mode (i.e. power save mode disabled).
method if the AP is configured to use this. If the AP is not supporting WMM-PS, the device will use PS-Poll
power save method.
from the AP.
frame is sent or received. The device will send a Null Data packet with power management bit cleared to
retrieve buffered frames from the AP.
Zebra Mobility Extensions
Zebra Mobility Extensions make use of 802.11 specifications and Zebra proprietary extensions to achieve the highest
level of performance, efficiency and reliability. The MC40 with Android KitKat adds support for the following Zebra
Mobility Extensions. These features are not available on Jelly Bean.
WLAN Configuration | 91
•Coverage Hole Detection - The MC40 KitKat includes enhancements to the IEEE 802.11k standard. These
improvements will report gaps in signal coverage to the Zebra wireless LAN infrastructure. Network
administrators can detect and mitigate coverage gaps present in the network for greater reliability. Default:
enabled.
•Aggregated Fast Transition - Aggregated FT improves on IEEE 802.11r, Over-the-DS fast roaming. In
conjunction with Zebra wireless LAN infrastructure, the MC40 with Android KitKat will achieve more reliable
and consistent fast roaming. Default: enabled.
•Scan Assist - The MC40 with Android KitKat monitors neighbor access points and retrieves roaming related
information from the Zebra wireless LAN infrastructure without doing scans. Using this Scan Assist feature, the
MC40 KitKat improves roaming. Default: enabled.
Remove a Wi-Fi Network
To remove a remembered or connected network:
Procedure:
1
Touch
2
Touch
3
Touch
4 In the Wi-Fi networks list, touch and hold the name of the network.
5 In the menu, touch Forget network.
6
Touch
.
or .
Wi-Fi.
.
93 | Administrator Utilities
Chapter
6
Administrator Utilities
We provide a suite of utilities that allow an administrator to manage the following features:
•Multi-user Login - The Multi-user Login feature allows an administrator to set up the device to be used by
multiple users. The users have access to specific applications and features depending upon the user settings.
Application Lock - The Application Lock feature allows an administrator to restrict application access for specific
•
applications by user or groups of users. The permitted applications are managed using groups of user accounts
from Multi-user Login feature.
•Secure Storage - Secure Storage Administrator application allows installation and deletion of encrypted keys and
creation, mounting, un-mounting and deletion of the encrypted file systems.
The following applications help the administrator configure these features.
•On-device applications - reside on the device.
-MultiUser Administrator
-AppLock Administrator
-Secure Storage Administrator.
•Host computer application - reside on a host computer.
-Enterprise Administrator.
Required Software
These tools are available on the Support Central web site at http://www.zebra.com/support. Download the required
files from the Support Central web site and follow the installation instruction provided.
On-device Application Installation
See Application Installation on page 135
for instruction on installing applications onto the device.
Multi-user/AppLock Configuration
To use the Multi-user Login and Application Lock features, the administrator must create user and group account
information using the Enterprise Administrator application.
Note: The administrator can also create the account information manually. See Manual File Configuration
on page 105 for more information.
94 | Administrator Utilities
Enterprise Administrator Application
Note: .Net Compact Framework 4 or later is required to run the Enterprise Administrator. To download, go
to www.microsoft.com.
Use the Enterprise Administrator application to setup user and group accounts and create the required (Password,
Group and White List) files for using the Multi-user and Application Lock features.
On the host computer launch the Enterprise Administrator application.
Figure 69: Enterprise Administrator Window
Creating Users
Each person that uses the device has to have a user name and password. To create a user:
Procedure:
1 Click + above the Users list box.
Figure 70: User Manager Window
Administrator Utilities | 95
2 In the Username text box, enter a user name. The text is case sensitive and required.
3 In the Password text box, enter a password for the user. The text is case sensitive and required.
4 In the Retype Password text box, re-enter the user password.
5 Select the Admin checkbox to set the user to have administrator rights.
6 Select the Enabled checkbox to enable the user.
7 Click OK.
8 Repeat steps 1 through 7 for each additional user.
Adding Packages
Note: All system applications that are on the default image are available to all users.
Create a list of installed applications (packages) on the device that are available for use by all the users.
Procedure:
1 Click + next to Packages.
Note: To get a list of all the applications (packages) on the device see Determining Applications
Installed on the Device
Figure 71: Package Information Window
on page
106.
2 In the Package name text box, enter the name of an application.
3 Click OK.
96 | Administrator Utilities
4 Repeat steps 1 through 3 for each additional package.
Creating Groups
Create groups of users that have access to specific applications.
Procedure:
1 Click + above the Groups list. The Group Manager window appears with a list of users and packages.
Figure 72: Group Manager Window
2 In the Group name text box, enter a name for the group. This field is required.
3 Select a user in the Available Users list box and then click the Add button to add the user to the Users in Group
list box or click the Add All button to add all the users in the Available Users list box to the Users in Group list
box.
4 Select a package in the Available Packages list box and then click the Add button to add the package to the
Packages in Group list box or click the Add All button to add all the packages in the Available Packages listbox to the Packages in Group list box.
5 Click OK.
6 Click Save.
Creating Remote Authentication
Use the Remote Authentication feature to set a remote server for authentication.
Procedure:
1 Click the Auth button. The Authentication window appears.
Figure 73: Authentication Window
2 Select the Remote radio button.
3 In the Server IP text box, enter the address of the remote server.
4 In the Port text box, enter the port number of the remote server.
5 Select the use SSL Encryption check box if SSL encryption is required.
6 Click OK.
Administrator Utilities | 97
Save Data
At any time, the administrator can save the current data. The application creates two files in the <user>\_APP_DATA
folder: database and passwd.
Exporting File
In order to use the features on the device, export the required files and then copy them to the device. The following
files are created by the Enterprise Administrator application:
•Password File - Filename:
•Group File - Filename: groups. Lists each group and users associated to each group.
•White List Files - Filename: the filenames are the names of the group created in the Group file. Lists the user
installed applications that the group is allowed to access.
•Remote Server - Filename: server. Lists the remote server IP address and port number.
Procedure:
1 Click Export.
2 In the Browse For Folder window, select a folder and then click OK.
3 Click OK.
4 Click File → Export → Server Information.
The server file is saved in the <user>\_APP_DATA folder.
5 Copy all the files to the root of the microSD card. See USB Communication on page 45 for information on
copying files to the device.
6 Copy all the files to the root of the On-device Storage. See USB Communication on page 45 for information on
copying files to the device.
passwd. Lists the user names, encrypted passwords, administrator and enable flags.
98 | Administrator Utilities
Importing User List
Procedure:
1 Click File → Import → User List.
2 Navigate to the location when the passwd file is stored.
3 Select the passwd file.
4 Click Open.
The user information is populated into the Users list.
Importing Group List
Procedure:
1 Click File → Import → Group List.
2 Navigate to the location when the group file is stored.
3 Select the group file.
4 Click Open.
The group and package information is populated into the Groups and Packages list.
Importing Package List
To import a package list (see Package List File
Procedure:
1 Click File → Import → Package List.
2 Navigate to the location when the package file is stored.
3 Select the package text file.
4 Click Open.
The package information is populated into the Packages list.
Editing a User
Procedure:
1 Select a user in the Users list.
2 Click Edit User.
3 Make changes and then click OK.
Deleting a User
Procedure:
1 Select a user in the Users list.
2 Click -. The user name is removed from the list.
on page 106
for instructions for creating a Package List file):
Editing a Group
Procedure:
1 Select a user in the Groups list.
2 Click Edit Group.
3 Make changes and then click OK.
Deleting a Group
Procedure:
1 Select a group in the Groups list.
2 Click -.
3 Click Yes. The group name is removed from the list.
Editing a Package
Procedure:
1 Select a package in the Packages list.
2 Click Edit Package.
3 Make changes and then click OK.
Deleting a Package
Procedure:
1 Select a package in the Packages list.
2 Click -. The package name is removed from the list.
Administrator Utilities | 99
MultiUser Administrator
Use the MultiUser Administrator application to allow an administrator to enable, disable and configure the Multiuser
Login feature.
Importing a Password
When the MultiUser Administrator is used for the first time, the password file must be imported.
Procedure:
1
2
Touch
Touch
.
.
100 | Administrator Utilities
Figure 74: MultiUser Administrator Screen
3 Touch Load User List. The application reads the data from the passwd file and configures the Multi-user Login
feature.
4 Touch Enable Multiuser to enable the feature.
Figure 75: MultiUser Login Screen
5 In the Login text box, enter the username.
6 In the Password text box, enter the password.
7 Touch OK.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.