Zebra MC40 integrator Guide

MC40
INTEGRATOR GUIDE
Copyrights
The products described in this document may include copyrighted computer programs. Laws in the United States and other countries preserve for certain exclusive rights for copyrighted computer programs. Accordingly, any copyrighted computer programs contained in the products described in this document may not be copied or reproduced in any manner without the express written permission.
No part of this document may be reproduced, transmitted, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, without the prior written permission.
Furthermore, the purchase of our products shall not be deemed to grant either directly or by implication, estoppel or otherwise, any license under the copyrights, patents or patent applications, except for the normal non-exclusive, royalty-free license to use that arises by operation of law in the sale of a product.
Disclaimer
3
| Copyrights
Please note that certain features, facilities, and capabilities described in this document may not be applicable to or licensed for use on a particular system, or may be dependent upon the characteristics of a particular mobile subscriber unit or configuration of certain parameters. Please refer to your contact for further information.
5 | Revision History
Revision History
Changes to the original guide are listed below:
Change Date Description
-A01 Rev A 10/04/2013 Initial release.
-A02 Rev A 05/20/2014 Add RS507 support, Bluetooth pairing utility. Update PTT Express application, WLAN Advanced features..
-A03 Rev A 02/13/2015 Zebra Rebranding
-A03 Rev B 04/06/2015 Update Accounts section in Chapter 6 Settings.
-A04 Rev A 07/15/15 Add support for KitKat operating system.
-A04 Rev B 12/2/16 Correct Fusion logging text, page 87.
-A04 Rev C 04/20/17 Correct Enterprise Reset description on page 21.
-A05 Rev A 04/20/18 Update approved cleanser active ingredients.
Contents
Copyrights........................................................................................................................................ 3
Revision History...............................................................................................................................
About This Guide...........................................................................................................................13
Documentation Set.............................................................................................................................................. 13
Configurations.....................................................................................................................................................13
Chapter Descriptions........................................................................................................................................... 14
Notational Conventions.......................................................................................................................................14
Icon Conventions.................................................................................................................................................15
Related Documents..............................................................................................................................................15
Service Information.............................................................................................................................................15
Chapter 1: Getting Started....................................................................................17
Unpacking........................................................................................................................................................... 17
Setup....................................................................................................................................................................17
Installing the Battery............................................................................................................................... 17
Charging the Battery............................................................................................................................... 18
Powering On the MC40...........................................................................................................................19
Replacing the Battery.............................................................................................................................. 19
Resetting the Device............................................................................................................................................20
Performing a Soft Reset.......................................................................................................................... 21
Performing a Hard Reset......................................................................................................................... 21
Performing an Enterprise Reset...............................................................................................................21
Performing a Factory Reset.....................................................................................................................22
Contents | 7
5
Chapter 2: Accessories...........................................................................................25
MC40 Accessories...............................................................................................................................................25
Single Slot Charge Only Cradle.......................................................................................................................... 26
Single Slot Charge Cradle Setup.............................................................................................................26
Removing Cradle Insert...........................................................................................................................27
Charging Using the Single Slot Charge Only Cradle..............................................................................28
Four Slot Battery Charger................................................................................................................................... 29
Single Charger Setup...............................................................................................................................29
Two Charger Setup..................................................................................................................................30
Four Charger Setup................................................................................................................................. 31
Charging with the Four Slot Battery Charger......................................................................................... 31
Five Slot Charge Only Cradle............................................................................................................................. 33
Installing a Cup....................................................................................................................................... 33
Installing a Four Slot Battery Charger.................................................................................................... 35
Power to Five Slot Charge Only Cradle..................................................................................................35
Removing Cradle Insert...........................................................................................................................36
Charing Using the Five Slot Charge Only Cradle...................................................................................37
Installing the Finger Strap................................................................................................................................... 38
Installing the Rubber Boot.................................................................................................................................. 41
Third-Party Ethernet Dongles............................................................................................................................. 42
Configuring Ethernet Proxy Settings...................................................................................................... 43
Configuring Ethernet Static IP Address.................................................................................................. 43
Chapter 3: USB Communication..........................................................................45
8 | Contents
Connecting to a Host Computer via USB........................................................................................................... 45
Disconnect from the Host Computer
...................................................................................................................45
Chapter 4: DataWedge Configuration................................................................. 47
Basic Scanning.................................................................................................................................................... 47
Using the Camera.................................................................................................................................... 47
Using the Imager..................................................................................................................................... 48
Profiles.................................................................................................................................................................49
Plug-ins................................................................................................................................................................50
Profiles Screen.....................................................................................................................................................51
Disabling DataWedge..............................................................................................................................52
Creating a New Profile........................................................................................................................................52
Profile Configuration...........................................................................................................................................53
Associating Applications.........................................................................................................................53
Data Capture Panel..................................................................................................................................54
Bar Code Input........................................................................................................................................ 55
Enabled........................................................................................................................................55
Scanner Selection........................................................................................................................ 56
Decoders......................................................................................................................................56
Decoder Params...........................................................................................................................56
Decode Lengths...........................................................................................................................60
UPC EAN Params....................................................................................................................... 60
Reader Params.............................................................................................................................62
Scan Params................................................................................................................................ 63
MSR Input............................................................................................................................................... 63
Keystroke Output.................................................................................................................................... 63
Intent Output............................................................................................................................................64
Intent Overview...........................................................................................................................65
IP Output................................................................................................................................................. 66
Using IP Output with IPWedge...................................................................................................67
Using IP Output without IPWedge..............................................................................................68
Generating Advanced Data Formatting Rules.....................................................................................................70
Configuring ADF Plug-in........................................................................................................................70
Creating a Rule............................................................................................................................71
Defining a Rule........................................................................................................................... 71
Defining Criteria..........................................................................................................................71
Defining an Action...................................................................................................................... 73
Deleting a Rule............................................................................................................................73
Order Rules List.......................................................................................................................... 74
ADF Example..............................................................................................................................75
DataWedge Settings............................................................................................................................................ 78
Importing a Configuration File................................................................................................................79
Exporting a Configuration File................................................................................................................79
Importing a Profile File........................................................................................................................... 79
Exporting a Profile.................................................................................................................................. 80
Restoring DataWedge..............................................................................................................................80
Configuration and Profile File Management.......................................................................................................80
Programming Notes.............................................................................................................................................81
Overriding Trigger Key in an Application..............................................................................................81
Capture Data and Taking a Photo in the Same Application....................................................................81
Disable DataWedge on MC40 and Mass Deploy....................................................................................81
Soft Scan Feature.....................................................................................................................................82
Chapter 5: WLAN Configuration.........................................................................83
Contents | 9
Connecting to a Wi-Fi Network.......................................................................................................................... 83
Manually Adding a Wi-Fi Network
Configuring for a Proxy Server...........................................................................................................................85
Configuring the Device to Use a Static IP Address............................................................................................ 86
Advanced Wi-Fi Settings.................................................................................................................................... 87
Enabling Logging....................................................................................................................................89
Additional Wi-Fi Advanced Features..................................................................................................................90
Zebra Mobility Extensions.................................................................................................................................. 90
Remove a Wi-Fi Network................................................................................................................................... 91
.................................................................................................................... 84
Chapter 6: Administrator Utilities....................................................................... 93
Required Software...............................................................................................................................................93
On-device Application Installation..................................................................................................................... 93
Multi-user/AppLock Configuration.................................................................................................................... 93
Enterprise Administrator Application................................................................................................................. 94
Creating Users......................................................................................................................................... 94
Adding Packages..................................................................................................................................... 95
Creating Groups...................................................................................................................................... 96
Creating Remote Authentication.............................................................................................................96
Save Data.................................................................................................................................................97
Exporting File..........................................................................................................................................97
Importing User List................................................................................................................................. 98
Importing Group List...............................................................................................................................98
Importing Package List........................................................................................................................... 98
Editing a User..........................................................................................................................................98
Deleting a User........................................................................................................................................98
Editing a Group....................................................................................................................................... 98
Deleting a Group..................................................................................................................................... 99
Editing a Package.................................................................................................................................... 99
Deleting a Package.................................................................................................................................. 99
MultiUser Administrator..................................................................................................................................... 99
Importing a Password..............................................................................................................................99
Disabling the Multi-user Feature...........................................................................................................101
Enabling Remote Authentication.......................................................................................................... 101
Disabling Remote Authentication......................................................................................................... 101
Enabling Data Separation......................................................................................................................101
Disabling Data Separation.....................................................................................................................102
Delete User Data................................................................................................................................... 102
Capturing a Log File..............................................................................................................................102
AppLock Administrator.................................................................................................................................... 103
Installing Groups and White Lists.........................................................................................................103
Enabling Application Lock................................................................................................................... 104
Disabling Application Lock.................................................................................................................. 104
Manual File Configuration................................................................................................................................ 105
Determining Applications Installed on the Device............................................................................... 106
Secure Storage...................................................................................................................................................106
Installing a Key..................................................................................................................................... 107
Viewing Key List.................................................................................................................................. 107
Deleting a Key.......................................................................................................................................108
Volumes.................................................................................................................................................108
Creating Volume Using EFS File..............................................................................................108
Creating a Volume Manually.................................................................................................... 109
Mounting a Volume...................................................................................................................109
Listing Volumes........................................................................................................................ 110
Unmounting a Volume.............................................................................................................. 110
10 | Contents
Deleting a Volume.....................................................................................................................110
Encrypting an SD Card
Creating an EFS File............................................................................................................................. 110
Off-line Extraction Tool........................................................................................................................111
Creating an Image..................................................................................................................... 111
Mounting an Image................................................................................................................... 112
Unmounting an Image...............................................................................................................112
..............................................................................................................110
Chapter 7: Device-Config Utility........................................................................ 113
Creating a Golden Configuration...................................................................................................................... 114
Transferring a Golden Configuration................................................................................................................117
Returning to the Default Configuration.............................................................................................................118
Chapter 8: Settings...............................................................................................119
Location Settings...............................................................................................................................................119
Screen Unlock Settings..................................................................................................................................... 119
Single User Mode..................................................................................................................................120
Set Screen Unlock Using PIN................................................................................................... 120
Set Screen Unlock Using Password.......................................................................................... 121
Set Screen Unlock Using Pattern.............................................................................................. 122
Multiple User Mode.............................................................................................................................. 123
Passwords.......................................................................................................................................................... 123
Button Remapping.............................................................................................................................................123
Remapping a Button..............................................................................................................................124
Setting the Headset Key........................................................................................................................ 126
Exporting a Configuration File..............................................................................................................126
Importing a Configuration File..............................................................................................................127
Creating a Remap File...........................................................................................................................127
Accounts............................................................................................................................................................129
Language Usage................................................................................................................................................ 129
Changing the Language Setting............................................................................................................ 129
Adding Words to the Dictionary........................................................................................................... 129
Keyboard Settings............................................................................................................................................. 129
Date Persistence................................................................................................................................................ 129
Ethernet Settings................................................................................................................................................130
Configuring Ethernet Proxy Settings.................................................................................................... 130
Configuring Ethernet Static IP Address................................................................................................ 131
About Device.....................................................................................................................................................132
PTT Express Configuration...............................................................................................................................132
Importing a PTT Express Configuration File........................................................................................132
Chapter 9: Application Deployment...................................................................133
Security..............................................................................................................................................................133
Secure Certificates.................................................................................................................................133
Installing a Secure Certificate............................................................................................................... 133
Configuring Credential Storage Settings...............................................................................................134
Development Tools........................................................................................................................................... 134
ADB USB Setup................................................................................................................................................135
Application Installation..................................................................................................................................... 135
Installing Applications Using the USB Connection..............................................................................135
Installing Applications Using the Android Debug Bridge.................................................................... 136
Mobility Services Platform................................................................................................................... 136
Uninstalling an Application...................................................................................................................137
Contents | 11
Updating the System......................................................................................................................................... 137
Upgrading the Operating System from GingerBread to Jelly Bean
Copying Applications and Configuration Files.....................................................................................141
Upgrading the Operating System from Jelly Bean to KitKat............................................................................141
Converting Non-Voice Configuration to Voice Configuration.............................................................142
Upgrading to KitKat..............................................................................................................................143
Storage...............................................................................................................................................................145
Random Access Memory...................................................................................................................... 145
On-Device Storage................................................................................................................................ 145
Internal Storage..................................................................................................................................... 146
Enterprise Folder................................................................................................................................... 147
Application Management.................................................................................................................................. 147
Viewing Application Details.................................................................................................................148
Stopping an Application........................................................................................................................149
Changing Application Location............................................................................................................ 149
Managing Downloads............................................................................................................................150
..................................................................139
Chapter 10: Maintenance and Troubleshooting............................................... 151
Maintaining the MC40...................................................................................................................................... 151
Battery Safety Guidelines..................................................................................................................................151
Cleaning Instructions.........................................................................................................................................152
Cleaning the MC40............................................................................................................................... 153
Connector Cleaning...................................................................................................................153
Cleaning Cradle Connectors..................................................................................................................153
Troubleshooting.................................................................................................................................................154
Troubleshooting the MC40................................................................................................................... 154
Single-Slot Charge Cradle Troubleshooting......................................................................................... 156
Five-Slot Charge Only Cradle CRDUNIV-40–5000R Troubleshooting.............................................. 156
Four-Slot Battery Charger SACMC40XX-4000R Troubleshooting.....................................................156
Chapter 11: Technical Specifications................................................................. 159
MC40 Technical Specifications........................................................................................................................ 159
MC40 Decode Zone.......................................................................................................................................... 162
MC40 Connector Pin-Outs................................................................................................................................164
Single-Slot Charge Cradle CRDMC40XX-1000R Technical Specifications................................................... 165
Five-Slot Charge Only Cradle CRDUNIV-40-5000R Technical Specifications..............................................166
Four-Slot Battery Charger SACMC40XX-4000R Technical Specifications....................................................167
Chapter 12: Keypad Remap Strings.................................................................. 169
12 | Contents
About This Guide
This guide provides information on using the MC40 and accessories.
Note:
Screens and windows pictured in this guide are samples and can differ from actual screens.
This guide covers Android™ operating system Android Open Source Project (AOSP) Version 4.1.1 (Jelly Bean) and AOSP Version 4.4.4 (KitKat™). Throughout this guide specific references are made to Jelly Bean and KitKat to distinguish between operating system versions.
Documentation Set
The documentation set for the MC40 provides information for specific user needs, and includes:
MC40 Quick Start Guide - describes how to get the device up and running.
MC40 Regulatory Guide - provides required regulatory information.
MC40 User Guide - describes how to use the device.
MC40 Integrator Guide - describes how to set up the device and accessories.
13 | About This Guide
Configurations
This guide covers the following configurations:
Configuration Radios Display Memory
MC40
WLAN:
802.11a/b/g/n/r
WPAN: Blue­tooth v2.1 with EDR (Jelly Bean) Bluetooth v 4.0 Low Energy (Kit­Kat)
Software Versions
To determine the current software versions touch or > About device.
Serial number – Displays the serial number.
Model number – Displays the model number.
Android version – Displays the operating system version.
Kernel version – Displays the kernel version number.
Build number – Displays the software build number.
4.3” color WVGA
1 GB RAM / 8 GB Flash
Data Capture Options
camera and im­ager or camera, imager and MSR, optional RS507 Hands-free Im­ager
Operating Sys­tem
Android-based, Android Open­Source Project
4.1.1 (Jelly Bean) or 4.4.4 (KitKat)
Jelly Bean Build Number
The build number contains the software revision number and whether the MC40 is VoIP telephony ready.
14 | About This Guide
Example Build Number: 0z-4AJ11–J-xxxx–xxxx–y0–M1–mmddyy
z = software version number
y = VoIP telephone ready
where:
0 = not VoIP telephony ready
V = VoIP telephony ready.
F = FIPS & VoIP telephony ready.
KitKat Build Number
The build number contains the software revision number and whether the MC40 is VoIP telephony ready and FIPS ready.
Example Build Number: 0z-xx–xx-4AJ22–K–y0–M1–mmddyy
z = software version number
y = VoIP telephone ready/FIPS ready
where:
V = VoIP telephony ready.
F = FIPS & VoIP telephony ready.
Chapter Descriptions
Topics covered in this guide are as follows:
Getting Started on page 17
Accessories on page 25 describes the available accessories and how to use them with the MC40.
USB Communication on page 45 describes how to connect the MC40 to a host computer using USB.
DataWedge Configuration on page 47 describes how to use and configure the DataWedge application.
WLAN Configuration on page 83 describes the how to configure the MC40 to connect with a wireless LAN network.
Administrator Utilities on page 93 provides information for using the suite of administrative tools for configuring the MC40.
Settings on page 119 provides the settings for configuring the MC40.
Application Deployment on page 133 provides information for developing and managing applications.
Maintenance and Troubleshooting on page 151 includes instructions on cleaning and storing the MC40, and provides troubleshooting solutions for potential problems during MC40 operation.
Technical Specifications on page 159 provides the technical specifications for the MC40.
Keypad Remap Strings on page 169 provides a list of remap strings used when remapping keys.
provides information on getting the MC40 up and running for the first time.
Notational Conventions
The following conventions are used in this document:
Italics are used to highlight the following:
- Chapters and sections in this and related documents
Icons on a screen.
-
Bold text is used to highlight the following:
- Dialog box, window, and screen names
- Drop-down list and list box names
- Check box and radio button names
Button names on a screen.
-
Bullets (•) indicate:
- Action items
- Lists of alternatives
- Lists of required steps that are not necessarily sequential
Sequential lists (for example, lists that describe step-by-step procedures) appear as numbered lists.
Icon Conventions
The documentation set is designed to give the reader more visual clues. The following graphic icons are used throughout the documentation set. These icons and their associated meanings are described below.
Warning: The word WARNING with the associated safety icon implies information that, if disregarded, could result in death or serious injury, or serious product damage.
Caution: The word CAUTION with the associated safety icon implies information that, if disregarded, may result in minor or moderate injury, or serious product damage.
About This Guide | 15
Note: NOTE contains information more important than the surrounding text, such as exceptions or preconditions. They also refer the reader elsewhere for additional information, remind the reader how to complete an action (when it is not part of the current procedure, for instance), or tell the reader where something is located on the screen. There is no warning level associated with a note.
Related Documents
MC40 Quick Start Guide, p/n 72-166941-xx
MC40 Regulatory Guide, p/n 72-166942-xx
MC40 User Guide, p/n 72E-166940-xx
RS507 Hands-free Imager Product Reference Guide, p/n 72E-120802–xx
For the latest version of this guide and all guides, go to: http://www.zebra.com/support
Service Information
If you have a problem with your equipment, contact Zebra Support Center for your region. Contact information is available at: http://www.zebra.com/support.
When contacting the Zebra Support Center, please have the following information available:
Serial number of the unit (found on manufacturing label)
Model number or product name (found on manufacturing label)
Software type and version number
16 | About This Guide
Figure 1: Manufacturing Label Location
Zebra responds to calls by email or telephone within the time limits set forth in support agreements.
If your problem cannot be solved by the Zebra Support Center, you may need to return your equipment for servicing and will be given specific directions. Zebra is not responsible for any damages incurred during shipment if the approved shipping container is not used. Shipping the units improperly can possibly void the warranty.
If you purchased your product from a Zebra business partner, contact that business partner for support.
Chapter
1
Getting Started
This chapter provides the features of the MC40 and explains how to set it up for the first time.
Unpacking
Carefully remove all protective material from the MC40 and save the shipping container for later storage and shipping.
Verify the following items are in the box:
17 | Getting Started
MC40 Lithium-ion battery
Quick Start Guide
Regulatory Guide.
Inspect the equipment for damage. If any equipment is missing or damaged, contact the Zebra Support Center immediately. See Service Information on page 15 for contact information.
Setup
To start using the MC40 for the first time:
Install the battery Charge the MC40
Power on the MC40.
Installing the Battery
To install the battery:
Procedure:
1 Align the battery with the slots in the battery compartment.
18 | Getting Started
Figure 2: Inserting the Battery
2 Lower the battery and press down until it snaps into place.
3 Press down on the battery latch.
4 Press the Power button to turn on the MC40.
Charging the Battery
Caution: Ensure that you follow the guidelines for battery safety described in Battery Safety Guidelines
page 151.
Before using the MC40 for the first time, charge the main battery until the Right light emitting diode (LED) turns solid green (see Table 1: Battery Charge LED Status on page 18 MC40, use a cable or a cradle with the appropriate power supply. For information about the accessories available for the MC40, see Accessories on page 25.
The MC40 is equipped with a memory backup battery that automatically charges from the fully-charged main battery. When using the MC40 for the first time, the backup battery requires approximately 36 hours to fully charge. This is also true any time the backup battery is discharged, which occurs when the main battery is removed for several hours. The backup battery retains random access memory (RAM) data in memory for at least 10 minutes (at room temperature) when the MC40’s main battery is removed, when Battery Swap feature is used. When the MC40 reaches a very low battery state, the combination of main battery and backup battery retains RAM data in memory for at least 48 hours.
For cable and cradle setup and charging procedures refer to the MC40 Integrator Guide.
Micro USB Cable
Single Slot Charging Cradle
Five Slot Charge Only Cradle.
Table 1: Battery Charge LED Status
Status Indications
for charge status indications). To charge the
on
Off
MC40 is not charging.
MC40 is not inserted correctly in the cradle.
MC40 is not connected to a power source.
Charger or cradle is not powered.
Table continued…
Status Indications
Getting Started | 19
Slow Blinking Amber (3 blinks ev­ery 2 seconds)
Solid Green Charging complete.
Fast Blinking Amber (3 blinks/ second)
Flashes Amber once (when Power button pressed)
Fast Blinking Amber (when Power button pressed)
MC40 is charging.
Charging error, e.g.:
Temperature is too low or too high. Charging has gone on too long without completion (typically eight hours).
Critical battery state. Battery too low to boot device.
Battery over-temperature condition. Device shuts down. Battery will not charge until temperature returns to normal operating value.
Charging Temperature
Charge batteries in ambient temperatures from 0 °C to 40 °C (32 °F to 104 °F) or up to 45 °C (113 °F) as reported by
the battery. To view the battery temperature, touch
Note that charging is intelligently controlled by the MC40. To accomplish this, for small periods of time, the MC40 or accessory alternately enables and disables battery charging to keep the battery at acceptable temperatures. The MC40 or accessory indicates when charging is disabled due to abnormal temperatures via its LED.
or > About device > Battery Information.
Charging Spare Batteries
See Accessories on page 25 for information on using accessories to charge spare batteries.
Powering On the MC40
If the MC40 did not turn on when the battery was installed, press the Power button until the Right and Left LEDs flash once. The splash screen displays for about a minute as the MC40 initializes its flash file system. Note that these windows also appear upon reset.
Replacing the Battery
Note: Ensure that the Battery Swap mode procedures are followed, otherwise the backup battery will deplete quickly.
Procedure:
1 Press the Power button until the menu displays.
2 Touch Battery swap. The Right and Left LEDs light red.
3 Wait until the LEDs turns off.
4 Lift the battery latch.
20 | Getting Started
Figure 3: Lift Battery Latch
5 Remove the battery out of the battery compartment.
Figure 4: Remove Battery
6 Align the replacement battery in the battery compartment.
7 Lower the battery and press down until it snaps into place.
8 Press down on the battery latch.
9 Press the Power button to turn on the MC40.
Resetting the Device
There are four reset functions:
Soft Reset
Hard Reset
Enterprise Reset
Factory Reset.
Getting Started | 21
Performing a Soft Reset
Perform a soft reset if applications stop responding.
Procedure:
1 Press and hold the Power button until the menu appears.
2 Touch
3 The device shuts down and then reboots.
Reset.
Performing a Hard Reset
Perform a Hard Reset if the device stops responding. To perform a Hard Reset:
Procedure:
1 Simultaneously press the Power, Left Scan/Action and Up Volume buttons.
2 The device shuts down and then reboots.
Performing an Enterprise Reset
An Enterprise Reset erases all data in the /cache and /data partitions and clears all device settings, except those in the / enterprise partition.
Before performing an Enterprise Reset, copy all applications and the key remap configuration file that you want to persist after the reset into the /enterprise/usr/persist folder.
Procedure:
1 Download the Enterprise Reset file from Zebra Support Central web site.
2 Copy the 40N0JxxERxxxxxxx.zip (Jelly Bean) or 40N0KxxERxxxxxxx.zip (KitKat) file to the root
directory of the On-device Storage. See USB Communication on page 45
3 Press and hold the Power button until the Device options menu appears.
4 Touch Reset.
5 Touch OK. The device resets.
6 Press and hold the Left Scan/Action button.
7 When the Recovery Mode screen appears release the button.
.
22 | Getting Started
Figure 5: Recovery Mode Screen
8
Touch
Figure 6: System Recovery Screen
9 Press the Up and Down Volume buttons to navigate to the Apply update from /sdcard option.
10 Press the PTT button.
11 Press the Up and Down Volume buttons to navigate to the 40N0JxxERxxxxxxx.zip (Jelly Bean) or
40N0KxxERxxxxxxx.zip (KitKat) file.
12 Press the PTT button. The Enterprise Reset occurs and then the device resets.
. The System Recovery screen appears.
Performing a Factory Reset
A Factory Reset erases all data in the /cache, /data and /enterprise partitions in internal storage and clears all device settings. A Factory Reset returns the device to the last installed operating system image. To revert to a previous
Getting Started | 23
operating system version, re-install that operating system image. See Updating the System on page 137 information.
Procedure:
1 Download the Enterprise Reset file from Zebra Support Central web site.
2 Copy the 40N0JxxFRxxxxxxx.zip (Jelly Bean) or 40N0KxxFRxxxxxxx.zip (KitKat) file to the root
directory of the On-device Storage. See USB Communication on page 45.
3 Press and hold the Power button until the Device options menu appears.
4 Touch Reset.
5 Touch OK. The device resets.
6 Press and hold the Left Scan/Action button.
7 When the Recovery Mode screen appears release the Left Scan/Action button.
Figure 7: Recovery Mode Screen
for more
8
Touch
.
24 | Getting Started
Figure 8: System Recovery Screen
9 Press the Up and Down volume buttons to navigate to the Apply update from /sdcard option.
10 Press the PTT button.
11 Press the Up and Down volume buttons to navigate to the 40N0JxxFRxxxxxxx.zip (Jelly Bean) or
40N0KxxFRxxxxxxx.zip (KitKat) file.
12 Press the PTT button. The Factory Reset occurs and then the device resets.
Chapter
2
Accessories
This chapter provides information for using the accessories for the device.
MC40 Accessories
Table 2: MC40 Accessories on page 25 lists the accessories available for the MC40.
Table 2: MC40 Accessories
25 | Accessories
Accessory Part Number Description
Cradles
Single Slot Charge Only Cra­dle
Five Slot Charge Only Cradle Base
Five Slot Charge Only Cradle
Chargers
Four Slot Battery Charger
Power Supply PWRS-124306-01R Provides power to the MC40 and Single Slot Charge Cradle.
Power Supply (12 VDC, 4.16 A)
Cables
Micro USB Ca­ble
CRDMC40XX-1000R Charges the MC40.
CRDUNIV-XX-5000R Provides charging for up to five MC40 devices or four MC40 de-
vices and one Four Slot Battery Charger using optional Charging Cups. Requires additional power supplies.
CRDUNIV-40-5000R Provides charging for up to five MC40 devices.
SACMC40XX-4000R Charges up to four MC40 batteries.
PWRS-14000-148C Provides power to the Five Slot Charge Only Cradle and the
Four Slot Battery Charger.
25-MCXUSB-01R Provides power to the MC40 and USB communication with a
host computer.
US AC Line Cord (3-wire)
2-way DC Cable 25-122026-02R Connects one power supply (PWRS-14000-148C) to two Four
4-way DC Cable 25-85992-01R Connects one power supply (PWRS-14000-241R) to four Four
23844-00-00R Provides power to the power supplies.
Slot Battery Chargers.
Slot Battery Chargers.
Table continued…
26 | Accessories
Accessory Part Number Description
Miscellaneous
Spare 2680 mAh lithium-ion bat­tery
Charging Cup CUPMC40XX-1000R Mounts onto the Five Slot Charge Only Cradle Base and pro-
Battery Charger Cup
Universal Blank Slot Cover
Protective Rub­ber Boot
Soft Hip Holster SG-MC40HLSTR-02R Mounts on belt and provides storage for the MC40.
Finger Strap
Rack/Wall Mount Bracket
Wired Headset HDST-25MM-PTVP-01 2.5 mm wired headset for PTT and VoIP telephony communica-
BTRY-MC40EAB0E
BTRY-MC40EAB0E-10R
CUPUNIBTRY-1000R Mounts on the Five Slot Charge Only Cradle Base and provides
CUPUNICVR-5000R Mounts on the Five Slot Charge Only Cradle and covers a slot
SG-MC40-RBOOT-01R
SG-MC40-RBOOT-10R
SG-MC40STRAP-01R
SG-MC40STRAP-10R
KT-UNIVLBRKT-01R Provides for mounting the Five Slot Charge Only Cradle onto a
Replacement 2680 mAh battery.
Replacement 2680 mAh battery (10-pack)
vides MC40 charging slot (Single pack).
mounting for the Four Slot Battery Charger.
when a cup is not required (5-pack).
Provides additional protection for the MC40.
Provides additional protection for the MC40 (10–pack).
Mounts on the back of the MC40 and provides secure option for holding the device (Single pack or 10-pack).
standard rack or wall.
tions.
Single Slot Charge Only Cradle
The Single Slot Charge Only Cradle provides power for operating and charging the MC40.
Note: Do not connect the micro USB cable from the Single Slot Charge cradle to a host computer USB port. The cradle cannot charge the MC40 if connected to a host computer.
Single Slot Charge Cradle Setup
Procedure:
1 Plug the micro USB connector into the microUSB port on the cradle.
2 Route the micro USB end of the Micro USB Cable through the Cable Channel and exit either to the front or back
of the cradle.
Figure 9: Micro USB Cable Installation
USB Port USB Port USB Cable
USB Cable Cable Channel Cable Channel
Micro USB Cable
Power Supply
3 Plug the other end of the Micro USB Cable into the USB port on the power supply.
4 Plug the power supply into a wall outlet.
Accessories | 27
Figure 10: Single Slot Charge Only Cradle Setup
Procedure:
1 With finger nail, grasp insert notch.
Removing Cradle Insert
28 | Accessories
Figure 11: Grasp Insert Notch
2 Pull insert out of cradle.
Figure 12: Remove Insert
Charging Using the Single Slot Charge Only Cradle
To charge the MC40 battery, place the MC40 into the cradle.
Figure 13: MC40 Battery Charging
Accessories | 29
The Right LED indicates the status of the battery charging. See Table 1: Battery Charge LED Status on page 18 charging status indications. The 2680 mAh battery charges in approximately four hours.
Charge batteries in ambient temperatures from 0 °C to 40 °C (32 °F to 104 °F) or up to 45 °C (113 °F) as reported by
the battery. To view the battery temperature, touch is intelligently controlled by the MC40. To accomplish this, for small periods of time, the charger alternately enables and disables battery charging to keep the battery at acceptable temperatures. The charger indicates when charging is disabled due to abnormal temperatures via its LED.
or > About device > Battery Information. Charging
Four Slot Battery Charger
The Four Slot Battery Charger charges up to four MC40 spare batteries.
Single Charger Setup
Procedure:
1 Plug the power supply plug into the power port on the back of the charger.
2 Plug the AC line cord into the power supply.
3 Plug the AC line cord into an AC outlet.
for
30 | Accessories
Figure 14: Four Slot Battery Charger
Two Charger Setup
Procedure:
1 Plug the 2-way DC Cable plugs into the power port on the back of the each charger.
2 Plug the power supply plug into the jack of the 2-way DC Cable.
3 Plug the AC line cord into the power supply.
4 Plug the AC line cord into an AC outlet.
Figure 15: Setup with 2–way DC Cable
Four Charger Setup
Procedure:
1 Plug the 4-way DC Cable plugs into the power port on the back of the each charger.
2 Plug the 4-way DC Cable connector into the power output of the power supply.
3 Plug the AC line cord into the power supply.
4 Plug the AC line cord into an AC outlet.
Figure 16: Setup with 4–way DC Cable
Accessories | 31
Charging with the Four Slot Battery Charger
To charge the spare batteries insert the spare battery into a spare battery charging well.
A Charge LED is provided for each battery charging well. See Table 3: Spare Battery Charge LED Status on page
32 for charging status indications. The 2680 mAh battery charges in approximately four hours.
32 | Accessories
Figure 17: Charging Batteries
Charge batteries in temperatures from 0 °C to 40 °C (32 °F to 104 °F). Charging is intelligently controlled by the charger in order to ensure safe operation and optimize long-term battery life. To accomplish this, for small periods of time, the charger alternately enables and disables battery charging to keep the battery at acceptable temperatures. The charger indicates when charging is disabled due to abnormal temperatures via the Charge LED.
Table 3: Spare Battery Charge LED Status
Status Indications
Off
Slow Blinking Amber Battery is charging.
Solid Green Charging complete.
Fast Blinking Amber Charging error, e.g.:
No battery a slot.
Battery is not charging.
Battery is not inserted correctly in the charger.
Charger is not powered.
Temperature is too low or too high. Charging has gone on too long without completion.
Five Slot Charge Only Cradle
The Five Slot Charge Only cradle:
Provides power for operating and charging the MC40. Simultaneously charges up to five MC40s.
Figure 18: Five Slot Charge Only Cradle
Accessories | 33
Installing a Cup
The Five Slot Charge Only Cradle ships without any cradle cups installed. To base accepts the MC40 Charging Cup, Battery Charger Cup and Blank Slot Cover. To install the cradle cups:
Procedure:
1 Remove power from the cradle base before installing cups.
2 Align the lip of the cup with the slot on the front of the cradle. Ensure that the cup is positioned within the Slot
Alignment Tabs.
34 | Accessories
Figure 19: Five Slot Charge Only Cradle Cup Installation
3 Slide the lip into the slot and rotate the cup until it is flat on the cradle base.
4 Using a Phillips screwdriver, secure the cup to the charger base using the two screws provided with the cup.
Figure 20: Securing Cup to Base
5 Each slot on the Cradle Base must have a cup installed.
6 Repeat for each additional cup.
Installing a Four Slot Battery Charger
To install a Four Slot Battery Charger:
Procedure:
Accessories | 35
1 Install a Battery Charger Cup. See Installing a Cup on page 33
2 Align the mounting slots on the bottom of the Four Slot Battery Charger with the screws on the cup.
3 Slide the Four Slot Battery Charger down until it snaps into place.
Figure 21: Multi Slot Charge Only Cradle Four Slot Battery Charger Installation
.
Power to Five Slot Charge Only Cradle
Use one power supply to provide power to the Charging Base to power the Charging Cups. A separate power supply is required for each Four Slot Battery Charger installed. The power supply is connected directly to the For Slot Battery Charger.
36 | Accessories
Figure 22: Five Slot Charge Only Cradle Power Connections
Removing Cradle Insert
Procedure:
1 With finger nail, grasp insert notch.
Figure 23: Grasp Insert Notch
2 Pull insert out of cradle.
Figure 24: Remove Insert
Accessories | 37
Charing Using the Five Slot Charge Only Cradle
Insert the MC40 into a slot to begin charging.
The Right LED indicates the status of the battery charging in the MC40. See Table 1: Battery Charge LED Status on
page 18
Charge batteries in ambient temperatures from 0 °C to 40 °C (32 °F to 104 °F) or up to 45 °C (113 °F) as reported by
the battery. To view the battery temperature, touch is intelligently controlled by the MC40. To accomplish this, for small periods of time, the charger alternately enables and disables battery charging to keep the battery at acceptable temperatures. The charger indicates when charging is disabled due to abnormal temperatures via its LED.
for charging status indications. The 2680 mAh battery charges in approximately four hours.
or > About device > Battery Information. Charging
38 | Accessories
Figure 25: Charging MC40 and Spare Battery
Installing the Finger Strap
Use the optional finger strap to securely hold the MC40 while working.
Procedure:
1 Press the Power button until the Device options menu appears.
2 Touch Power off.
3 Remove the battery.
Figure 26: Remove Battery
4 Using a Phillips screwdriver, remove the two screws securing the plug to the MC40.
Accessories | 39
Figure 27: Remove Plug
5 Align the screws in the bracket of the finger strap with the mounting holes on the MC40.
40 | Accessories
Figure 28: Align Finger Strap
6 Secure the finger strap to the MC40 using a Phillips screwdriver.
Figure 29: Secure Finger Strap to MC40
7 Replace the battery.
Figure 30: Install Battery
Accessories | 41
Installing the Rubber Boot
Use to rubber boot to add additional protection to the MC40.
Figure 31: Rubber Boot
Procedure:
1 Insert the bottom of the MC40 into the bottom of the rubber boot.
42 | Accessories
Figure 32: Insert MC40 into Boot
2 Pull the top of the rubber boot over the top of the MC40.
Figure 33: Pull Boot Over MC40
3 Ensure that the rubber boot is sitting flat against the MC40.
Third-Party Ethernet Dongles
The MC40 provides support for third-party Ethernet dongles.
Configuring Ethernet Proxy Settings
The MC40 includes Ethernet cradle drivers. The MC40 can connect to an Ethernet network using a third-party Ethernet dongle.
Procedure:
After connecting the MC40, configure the Ethernet connection:
Accessories | 43
1
Touch
2
Touch
3 Touch Ethernet.
4 Slide the switch to the ON position.
5 Connect the MC40 and Ethernet dongle.
6 Touch and hold Eth0 until the menu appears.
7 Touch Modify Proxy.
Figure 34: Ethernet Proxy Settings
.
or .
8 Touch the Proxy settings drop-down list and select Manual.
9 In the Proxy hostname field, enter the proxy server address.
10 In the Proxy port field, enter the proxy server port number.
11 Note: When entering proxy addresses in the Bypass proxy for field, do not use spaces or carriage
returns between addresses.
In the Bypass proxy for text box, enter addresses for web sites that do not require to go through the proxy server. Use the separator “|” between addresses.
12 Touch Modify.
13
Touch
.
Configuring Ethernet Static IP Address
The MC40 includes Ethernet cradle drivers. The MC40 can connect to an Ethernet network using a third-party Ethernet dongle.
Procedure:
1
Touch
2
Touch or .
3 Touch Ethernet.
4 Slide the switch to the ON position.
5 Connect the MC40 and Ethernet dongle.
After connecting the MC40, configure the Ethernet connection:
.
44 | Accessories
6 Touch and hold Eth0 until the menu appears.
7 Touch Disconnect.
Figure 35: Ethernet Proxy Settings
8 Touch and hold Eth0 until the menu appears.
9 Touch the IP setting drop-down list and select Static.
10 In the IP adress field, enter the proxy server address.
11 If required, in the Gateway text box, enter a gateway address for the device.
12 If required, in the Network prefix length text box, enter a the prefix length.
13 If required, in the DNS 1 text box, enter a Domain Name System (DNS) address.
14 If required, in the DNS 2 text box, enter a DNS address.
15 Touch Connect.
16
Touch
.
45 | USB Communication
Chapter
3
USB Communication
This chapter provides information for transferring files between the device and a host computer.
Connecting to a Host Computer via USB
Connect the device to a host computer using the micro USB cable to transfer files between the MC40 and the host computer.
Caution:
When connecting the MC40 to a host computer, follow the host computer’s instructions for connecting and disconnecting USB devices, to avoid damaging or corrupting files.
Procedure:
1 Connect the micro USB connector to the USB port on the device. See Accessories on page 25 for setup
information.
2 Connect the USB A connector to the host computer USB port.
Connected as a media device or Connected as camera appears on the Status bar.
3 If Connected as a camera appears, pull down the Notification shade and touch Connected as a camera and then
touch Media device (MTP).
4 Caution: Ensure that all applications are not running. Loss of data may occur.
On the host computer, open a file explorer application.
5
Locate the device as a portable device and open to view contents.
6 Copy or delete files as required.
Note: While USB storage is in use, access to the On-Device Storage is disabled.
Disconnect from the Host Computer
Caution:
Carefully follow the host computer’s instructions to unmount the microSD card and disconnect USB devices correctly to avoid losing information.
Procedure:
1 On the host computer, unmount the device.
2 Remove the micro USB cable from the device.
Chapter
4
DataWedge Configuration
DataWedge is an application that reads data, processes the data and sends the data to an application.
Basic Scanning
Scanning can be performed using either the imager or the rear-facing camera.
Using the Camera
47 | DataWedge Configuration
To capture bar code data:
Procedure:
1 Ensure that an application is open on the MC40 and a text field is in focus (text cursor in text field).
2 Aim the rear-facing camera at a bar code.
3 Press and hold the Right Scan/Action button. By default, a preview window appears on the screen. The Left and
Right LEDs light red to indicate that data capture is in process.
48 | DataWedge Configuration
Figure 36: Data Capture with Camera
4 Move the MC40 until the bar code is centered under the red target.
5 The Left and Right LEDs light green, a beep sounds and the MC40 vibrates, by default, to indicate the bar code
was decoded successfully. The captured data appears in the text field.
Using the Imager
To capture bar code data:
Procedure:
1 Ensure that an application is open on the MC40 and a text field is in focus (text cursor in text field).
2 Aim the exit window at a bar code.
3 Press and hold the Right Scan/Action button. The red laser aiming pattern turns on to assist in aiming. Ensure that
the bar code is within the area formed by the aiming pattern. The Left and Right LEDs light red to indicate that data capture is in process.
DataWedge Configuration | 49
Figure 37: Data Capture
4 The Left and Right LEDs light green, a beep sounds and the MC40 vibrates, by default, to indicate the bar code
was decoded successfully. The captured data appears in the text field.
Profiles
DataWedge is based on profiles and plug-ins. A profile contains information on how DataWedge should behave with different applications.
Profile information consists of:
Associated application Input plug-in configurations
Output plug-in configurations
Process plug-in configurations.
Using profiles, each application can have a specific DataWedge configuration. For example, each user application can have a profile which outputs scanned data in the required format when that application comes to the foreground. DataWedge can be configured to process the same set of captured data differently based on the requirements of each application.
DataWedge includes the following visible and hidden pre-configured profiles which support specific built-in applications:
Visible profiles:
- Profile0 - created automatically the first time DataWedge runs. Generic profile used when there are no user
created profiles associated with an application.
- Launcher - disables scanning when the Launcher is in foreground.
- DWDemo - provides support for the DWDemo application.
Hidden profiles (not shown to the device):
- RD Client - provides support for MSP.
- MSP Agent - provides support for MSP.
- MspUserAttribute - provides support for MSP.
- Camera - disables scanning when the default camera application is in foreground.
- RhoElements - disables scanning when RhoElements is in foreground.
Profile0
Profile0 can be edited but cannot be associated with an application. That is, DataWedge allows manipulation of plug-in settings for Profile0 but it does not allow assignment of a foreground application. This configuration allows DataWedge to send output data to any foreground application other than applications associated with user-defined profiles when Profile0 is enabled.
50 | DataWedge Configuration
Profile0 can be disabled to allow DataWedge to only send output data to those applications which are associated in user-defined profiles. For example, create a profile associating a specific application, disable Profile0 and then scan. DataWedge only sends data to the application specified in the user-created profile. This adds additional security to DataWedge enabling the sending of data only to specified applications.
Plug-ins
A plug-in is a software module utilized in DataWedge to extend its functionality to encompass technologies such as bar code scanning. The plug-ins can be categorized into three types based on their operations:
Input Plug-ins Output Plug-ins
Process Plug-ins.
Input Plug-ins
An Input Plug-in supports an input device, such as a bar code scanner contained in, or attached to the device. DataWedge contains base plug-ins for these input devices.
Bar Code Scanner Input Plug-in – The Bar Code Scanner Input Plug-in is responsible for reading data from the integrated bar code scanner and supports different types of bar code readers including laser, imager and internal camera. Raw data read from the bar code scanner can be processed or formatted using Process Plug-ins as required. DataWedge has built-in feedback functionality for the bar code scanner to issue user alerts. The feedback settings can be configured according to user requirement.
MSR Input Plug-in – The Magnetic Stripe Reader (MSR) Input Plug-in is responsible for reading data from an MSR. Raw data read from the MSR can be processed or formatted using Process Plug-ins as required. DataWedge has built-in feedback functionality for the MSR to issue user alerts. The feedback settings can be configured according to user requirement.
Process Plug-ins
Process Plug-ins are used in DataWedge to manipulate the received data according to the requirement, before sending to the foreground application via the Output Plug-in.
Basic Data Formatting Process Plug-in – The Basic Data Formatting Plug-in allows DataWedge to add a prefix and/or a suffix to the captured data before passing it to an Output Plug-in.
Advanced Data Formatting Process Plug-in – The Advanced Data Formatting Plug-in allows DataWedge to apply rules (actions to be performed based on defined criteria) to the data received via an input plug-in before passing it to an Output Plug-in.
Output Plug-ins
Output Plug-ins are responsible for sending the data from Input Plug-ins to a foreground application on the device.
Keystroke Output Plug-in – The Keystroke Output Plug-in collects and sends data received from the Input Plug­in to the foreground applications by emulating keystrokes.
Intent Output Plug-in – The Intent Output Plug-in collects and sends data received from the Input Plug-ins to foreground applications using the Android Intent mechanism.
IP Output Plug-in – The IP Output Plug-in collects and sends data received from the Input Plug-ins to a host computer via a network connection. Captured data can be sent over an IP network to a specified IP address and port using either TCP or UDP transport protocols.
Profiles Screen
To launch DataWedge, touch > DataWedge. By default, three profiles appear:
Profile0
Launcher
DWDemo.
Profile0 is the default profile and is used when no other profile can be applied.
Figure 38: DataWedge Profiles Screen
DataWedge Configuration | 51
Profile names are color coded. Enabled profiles are white and disabled profiles are gray.
To configure a profile touch the profile name.
Profile Context Menu
Touch and hold a profile to open a context menu that allows additional actions to be performed on the selected profile.
Figure 39: Profile Context Menu
The profile context menu allows the profile to be edited (same as just tapping on a profile), renamed or deleted.
Options Menu
Touch
or to open the options menu.
52 | DataWedge Configuration
Figure 40: DataWedge Options Menu
The menu provides options to create a new profiles, access to general DataWedge settings and DataWedge version information.
Disabling DataWedge
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch Settings.
5 Touch DataWedge enabled.
The blue check disappears from the checkbox indicating that DataWedge is disabled.
.
.
or .
Creating a New Profile
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch New profile.
5 In the New profile dialog box, enter a name for the new profile. It is recommended that profile names be unique
and made up of only alpha-numeric characters (A-Z, a-z, 0-9).
Figure 41: New Profile Name Dialog Box
6 Touch OK.
The new profile name appears in the DataWedge profile screen.
.
.
or .
Profile Configuration
To configure the Profile0 or a user-created profile, touch the profile name.
Figure 42: Profile Configuration Screen
DataWedge Configuration | 53
The configuration screen lists the following sections:
Profile enabled Applications
Barcode Input
MSR Input
Keystroke output
Intent Output
IP Output.
Associating Applications
Use Applications option to associate applications with this profile. User created profiles should be associated with one or more applications and its activities.
Procedure:
1 Touch Associated apps. A list of applications/activities associated with the profile displays. Initially the list does
not contain any applications/activities.
2 Touch
3 Touch New app/activity.
4 In the Select application screen, select the desired application from the list.
5 In the Select activity menu, selecting the activity adds that application/activity combination to the associated
application list for that profile. Selecting * as the activity results in all activities within that application being associated to the profile. During operation, DataWedge tries to match the specific application/activity combinations with the foreground application/activity before trying to match the general application/* combinations.
6
Touch
.
.
54 | DataWedge Configuration
Data Capture Panel
The Data Capture panel (DCP) is a DataWedge feature that enables the user to initiate data capture by touching a designated part of the screen. A variable screen overlay acts like a scan button.
Figure 43: Minimized Data Capture Panel
Drag the DCP tab horizontally to maximized overlay. Drag the DCP tab vertically to reposition the tab.
Figure 44: Maximized DCP
Touch the Magnet icon to change the orientation of the overlay to opposite side of the screen.
The DataWedge profile configuration screen allows the user to configure how the DCP appears on the screen once the particular profile is enabled. The DCP is hidden by default. Enabling DCP option displays seven additional configuration parameters.
Figure 45: Data Capture Panel Settings
DataWedge Configuration | 55
Orientation - Indicates whether the DCP displays on the right hand or left hand side of the screen. Options: Left (default) or Right.
Start state - Indicates whether the DCP should be started in maximized or minimized state. Options: Minimized (default) or Maximized.
Minimized height - Indicates the height of the DCP when in the minimized state (default - 112).
Minimized width - Indicates the width of the DCP when in the minimized state (default - 56).
Start position (vertical) - Indicates the distance from top of the device screen to the DCP (default - 292).
Maximized height - Indicates the height of DCP when in maximized state (default - 697).
Button Color - Use to change the color and transparency of the DCP overlap. Touch to open the color picker window.
Figure 46: Color Picker
Bar Code Input
Use the Bar Code Input options to configure the Bar Code Scanner Input Plug-in for the profile.
Enabled
Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled.
56 | DataWedge Configuration
Scanner Selection
Configures which scanning device to use for bar code data capture when the profile is active.
Auto - The software automatically selects the 2D Imager.
Camera scanner - Scanning is performed with the rear-facing camera.
2D Imager - Scanning is performed using the 2D Imager.
Decoders
Use the Bar Code Input options to configure the Bar Code Scanner Input Plug-in for the profile.
Configures which bar code decoders are enabled or disabled. For best performance disable all unnecessary decoders.
Touch Decoders. The Barcode input screen appears. A check in the checkbox indicates that the decoder is enabled. By default the most commonly used decoders are enabled (shown below with an asterisk). The supported decoders are:
UPC-A* UPC-E0* EAN-13*
EAN-8* Code 128* Code 39*
Interleaved 2 of 5 GS1 DataBar* GS1 DataBar Limited
GS1 DataBar Expanded Datamatrix* QR Code*
PDF417* Composite AB Composite C
MicroQR Aztec* Maxicode*
MicroPDF USPostnet USPlanet
UK Postal Japanese Postal Australian Postal
Canadian Postal Dutch Postal US4state
US4state FICS Codabar* MSI
Code 93 Trioptic 39 Discrete 2 of 5
Chinese 2 of 5 Korean 3 of 5 Code 11
TLC 39 MAIL MARK HAN XIN
Matrix 2 of 5 UPC-E1
Touch to return to the previous screen.
Decoder Params
Use Decode Params to configure individual decoder parameters.
UPCA
- Report Check Digit - The check digit is the last character of the symbol used to verify the integrity of the
data. Enables or disables this option. A check in the checkbox indicates that the option is enabled (default ­enabled).
- Preamble - Preamble characters are part of the UPC symbol consisting of Country Code and System
Character. Select the appropriate option to match the host system.
There are three options for transmitting a UPCA preamble:
+ Preamble None - Transmit no preamble. + Preamble Sys Char - Transmit System Character only (default).
DataWedge Configuration | 57
+ Preamble Country and Sys Char - Transmit System Character and Country Code (“0” for USA). Select
the appropriate option to match the host system.
UPCE0
- Report Check Digit - The check digit is the last character of the symbol used to verify the integrity of the
data. Enables or disables this option. A check in the checkbox indicates that the option is enabled (default ­disabled).
- Preamble - Preamble characters are part of the UPC symbol consisting of Country Code and System
Character. Select the appropriate option to match the host system.
There are three options for transmitting a UPCE0 preamble:
+ Preamble Sys Char - Transmit System Character only. + Preamble Country and Sys Char - Transmit System Character and Country Code (“0” for USA). + Preamble None - Transmit no preamble (default).
- Convert UPCE0 To UPCA - Enable to convert UPCE0 (zero suppressed) decoded data to UPC-A format
before transmission. After conversion, the data follows UPC-A format and is affected by UPC-A programming selections. Disable to transmit UPCE0 decoded data as UPCE0 data, without conversion (default - disabled).
Code128
- Length1 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
- Length2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
- Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox
indicates that redundancy is enabled (default - disabled).
- Enable Plain Code 128 - Flag to enable other 128 sub types (besides GS1-128 and ISBT-128).
- Enable GS1-128 - Set the GS1 128 subtype. A check in the checkbox indicates that the option is enabled
(default - enabled).
- Enable ISBT128 - Set the ISBT128 subtype. A check in the checkbox indicates that the option is enabled
(default - enabled).
- ISBT128 Concatenation Mode - Select an option for concatenating pairs of ISBT code types:
+ Concat Mode Never - Do not concatenate pairs of ISBT codes encountered (default). + Concat Mode Always - There must be two ISBT codes in order to decode and perform concatenation.
Does not decode single ISBT symbols.
+ Concat Mode Auto - Decodes and concatenates pairs of ISBT codes immediately. If only a single ISBT
symbol is present, the device must decode the symbol the number of times set via DataWedge Configuration 4 - 11 Redundancy - Code128 before transmitting its data to confirm that there is no additional ISBT symbol.
- Check ISBT Table - The ISBT specification includes a table that lists several types of ISBT bar codes that are
commonly used in pairs. If ISBT128 Concat Mode is set, enable Check ISBT Table to concatenate only those pairs found in this table. Other types of ISBT codes are not concatenated. A check in the checkbox indicates that redundancy is enabled (default - disabled).
- Security Level - The scanner offers four levels of decode security for Code 128 bar codes. Select increasing
levels of security for decreasing levels of bar code quality. There is an inverse relationship between security and scanner aggressiveness, so choose only that level of security necessary for any given application.
+ Security Level 0 - This setting allows the scanner to operate in its most aggressive state, while providing
sufficient security in decoding most “in-spec” bar codes. + Security Level 1 - This setting eliminates most misdecodes (default). + Security Level 2 - Select this option if Security level 1 fails to eliminate misdecodes. + Security Level 3 - If Security Level 2 is selected and misdecodes still occur, select this security level. Be
advised, selecting this option is an extreme measure against mis-decoding severely out of spec bar codes.
Selecting this level of security significantly impairs the decoding ability of the scanner. If this level of
security is needed, try to improve the quality of the bar codes. + Code128 Reduced Quiet Zone - Enables decoding of margin-less Code 128 bar codes.
58 | DataWedge Configuration
+ Ignore Code128 FCN4 - When enabled, and a Code 128 bar code has an embedded FNC4 character, it
will be removed from the data and the following characters will not be changed. When the feature is
disabled, the FNC4 character will not be transmitted but the following character will have 128 added to it.
Code39
- Length1 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
- Length2 - Use to set decode lengths 4 (default - 55). See Decode Lengths on page 60 for more information.
- Verify Check Digit - Enable this feature to check the integrity of all Code 39 symbols to verify that the data complies with a specified check digit algorithm. The digital scanner decodes only those Code 39 symbols that include a modulo 43 check digit. Enable this feature only if the Code 39 symbols contain a modulo 43 check digit (default - disabled).
- Report Check Digit - Transmit Code 39 data with or without the check digit. A check in the checkbox indicates to send Code 39 data with check digit (default - disabled).
- Full ASCII - Code 39 Full ASCII is a variant of Code 39 that pairs characters to encode the full ASCII character set. To enable or disable Code 39 Full ASCII (default - disabled),
- Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox indicates that redundancy is enabled (default - disabled).
- Convert Code39 To Code32 - Code 32 is a variant of Code 39 used by the Italian pharmaceutical industry. Scan the appropriate bar code below to enable or disable converting Code 39 to Code 32 (default - disabled).
- Report Code32 Prefix - Scan the appropriate bar code to enable or disable adding the prefix character “A” to all Code 32 bar codes (default - disabled).
- Security Level - Options: Security level 0, Security Level 1, Security Level 2 and Security Level 3 (default
- Security level 1).
- Code39 Reduced Quiet Zone - Enables decoding of margin-less Code 39 bar codes.
Interleaved 2 of 5
- Length1 - Use to set decode lengths (default - 14). See Decode Lengths on page 60 for more information.
- Length2 - Use to set decode lengths (default - 10). See Decode Lengths on page 60 for more information.
- Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox indicates that redundancy is enabled (default - enabled).
- Check Digit
+ No Check Digit - A check digit is not used. (default) + USS Check Digit - Select to check the integrity of all Interleaved 2 of 5 symbols to verify the data
complies with either the Uniform Symbology Specification (USS) check digit algorithm.
+ OPCC Check Digit - Select to check the integrity of all Interleaved 2 of 5 symbols to verify the data
complies with either the Optical Product Code Council (OPCC) check digit algorithm.
- Report Check Digit - Transmit Interleaved 2 of 5 data with or without the check digit. A check in the checkbox indicates to send Interleaved 2 of 5 data with check digit (default - disabled).
- Convert ITF-14 To EAN13 - Convert 14-character Interleaved 2 of 5 bar codes to EAN-13, and transmit as EAN-13. The Interleaved 2 of 5 bar code must be enabled and must have a leading zero and a valid EAN-13 check digit. A check in the checkbox indicates that the option is enabled (default - disabled).
- I2of5 Security Level - Options: I2of5 Security level 0, I2of5 Security Level 1, I2of5 Security Level 2 and I2of5 Security Level 3 (default - I2of5 Security level 1).
- I2of5 Reduced Quiet Zone - Enables decoding of margin-less I2of5 bar codes.
Composite AB
- UCC Link Mode
+ Link Flag ignored - 1D component is transmitted regardless of whether a 2D component is detected. + Always Linked - 1D and the 2D components are transmitted. If 2D is not present, the 1D component is not
transmitted.
+ Auto Discriminate - the digital scanner determines if there is a 2D portion, then transmits the 1D
component, as well as the 2D portion if present. (default).
UK Postal
DataWedge Configuration | 59
- Report Check Digit - Transmit UK Postal data with or without the check digit. A check in the checkbox indicates to send UK Postal data with check digit (default - disabled).
Codabar
- Length1 - Use to set decode lengths (default - 6). SeeDecode Lengths on page 60 for more information.
- Length2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
- Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox indicates that redundancy is enabled (default - enabled).
- CLSI Editing - Enable this parameter to strip the start and stop characters and insert a space after the first, fifth, and tenth characters of a 14-character Codabar symbol. Enable this feature if the host system requires this data format (default - disabled).
- NOTIS Editing - Enable this parameter to strip the start and stop characters from a decoded Codabar symbol. Enable this feature if the host system requires this data format (default - disabled).
MSI
- Length 1 - Use to set decode lengths (default - 4). See Decode Lengths on page 60 for more information.
- Length 2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
- Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox indicates that redundancy is enabled (default - enabled).
- Check Digit - With MSI symbols, one check digit is mandatory and always verified by the reader. The second check digit is optional.
+ One Check Digit - Verify one check digit (default). + Two Check Digits - Verify two check digits.
- Check Digit Scheme - Two algorithms are possible for the verification of the second MSI check digit. Select the algorithm used to encode the check digit.
+ Mod-11-10 - First check digit is MOD 11 and second check digit is MOD 10 (default). + Mod-10-10 - Both check digits are MOD 10.
- Report Check Digit - Transmit MSI data with or without the check digit. A check in the checkbox indicates to send MSI data with check digit (default - disabled).
Code93
- Length1 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
- Length2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
- Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox indicates that redundancy is enabled (default - disabled).
Discrete 2 of 5
- Length1 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
- Length2 - Use to set decode lengths (default - 14). See Decode Lengths on page 60 for more information.
- Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox indicates that redundancy is enabled (default - enabled).
Code 11
- Length1 - Use to set decode lengths (default - 4). See Decode Lengths on page 60 for more information.
- Length2 - Use to set decode lengths (default - 55). See Decode Lengths on page 60 for more information.
- Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox indicates that redundancy is enabled (default - enabled).
- Verify Check Digit - Check the integrity of all Code 11 symbols to verify that the data complies with the specified check digit algorithm. This selects the check digit mechanism for the decoded Code 11 bar code.
+ No Check Digit - Do not verify check digit. + 1 Check Digit - Bar code contains one check digit (default). + 2 Check Digits - Bar code contains two check digits.
- Report Check Digit - Transmit Code 11 data with or without the check digit. A check in the checkbox indicates to send Code 11 data with check digit (default - disabled).
60 | DataWedge Configuration
HAN XIN
- HAN XIN Inverse
+ Disable - Disables decoding of HAN XIN inverse bar codes (default). + Enable - Enables decoding of HAN XIN inverse bar codes. + Auto - Decodes both HAN XIN regular and inverse bar codes.
Matrix 2 of 5
- Length1 - Use to set decode lengths (default - 10). See Decode Lengths on page 60 for more information.
- Length2 - Use to set decode lengths (default - 0). See Decode Lengths on page 60 for more information.
- Redundancy - Sets the reader to read the bar code twice before accepting data. A check in the checkbox indicates that redundancy is enabled (default - disabled).
- Report Check Digit - Transmit Matrix 2 of 5 data with or without the check digit. A check in the checkbox indicates to send Matrix 2 of 5 data with check digit (default - enabled).
- Verify Check Digit - Enable this feature to check the integrity of all Matrix 2 of 5 symbols to verify that the data complies with a specified check digit algorithm (default - enabled).
UPCE1
- Report Check Digit - The check digit is the last character of the symbol used to verify the integrity of the data. Enables or disables this option. A check in the checkbox indicates that the option is enabled (default ­disabled).
- Preamble - Preamble characters are part of the UPC symbol consisting of Country Code and System Character. Select the appropriate option to match the host system.
There are three options for transmitting a UPCE1 preamble:
+ Preamble Sys Char - Transmit System Character only. + Preamble Country and Sys Char - Transmit System Character and Country Code (“0” for USA). + Preamble None - Transmit no preamble (default).
- Convert UPCE1 To UPCA - Enable this to convert UPCE1 decoded data to UPC-A format before transmission. After conversion, the data follows UPC-A format and is affected by UPC-A programming selections. Disable this to transmit UPCE1 decoded data as UPCE1 data, without conversion (default ­disabled).
Decode Lengths
The allowable decode lengths are specified by options Length1 and Length2 as follows:
Variable length: Decode symbols containing any number of characters.
Set both Length1 and Length2 to 0.
-
Range: Decode a symbol with a specific length range (from a to b, including a and b).
- Set Length1 to a and set Length2 to b.
Two Discrete Lengths: Decode only symbols containing either of two selected lengths.
- Set both Length1 or Length2 to the specific lengths. Length1 must be greater than Length2.
One Discrete Length: Decode only symbols containing a specific length.
- Set both Length1 and Length2 to the specific length.
UPC EAN Params
Allows the configuration of the parameters that apply to more than one UPC or EAN decoder.
Security Level - The scanner offers four levels of decode security for UPC/EAN bar codes. Select higher security levels for lower quality bar codes. There is an inverse relationship between security and decode speed, so be sure to choose only that level of security necessary for the application.
DataWedge Configuration | 61
- Level 0 - This default setting allows the scanner to operate fastest, while providing sufficient security in
decoding “in-spec” UPC/EAN bar codes (default).
- Level 1 - As bar code quality levels diminish, certain characters become prone to misdecodes before others
(i.e., 1, 2, 7, 8). If the scanner is misdecoding poorly printed bar codes, and the misdecodes are limited to these characters, select this security level.
- Level 2 - If the scanner is misdecoding poorly printed bar codes, and the misdecodes are not limited to
characters 1, 2, 7, and 8, select this security level.
- Level 3 - If the scanner is still misdecoding, select this security level. Be advised, selecting this option is an
extreme measure against misdecoding severely out of spec bar codes. Selecting this level of security can significantly impair the decoding ability of the scanner. If this level of security is necessary, try to improve the quality of the bar codes.
Supplemental2 - Enables or disables this option. A check in the checkbox indicates that the option is enabled.
Supplemental5 - Enables or disables this option. A check in the checkbox indicates that the option is enabled.
Supplemental Mode
- No Supplementals - the scanner is presented with a UPC/EAN plus supplemental symbol, the scanner
decodes UPC/EAN and ignores the supplemental characters (default).
- Supplemental Always - the scanner only decodes UPC/EAN symbols with supplemental characters, and
ignores symbols without supplementals.
- Supplements Auto - the scanner decodes UPC/EAN symbols with supplemental characters immediately. If
the symbol does not have a supplemental, the scanner must decode the bar code the number of times set via UPC/EAN Supplemental Redundancy before transmitting its data to confirm that there is no supplemental.
- Supplemental Smart - Enables smart supplementals. In this mode the decoder returns the decoded value of
the main block right away if it does not belong to one of the following supplemental types: 378, 379, 977, 978, 979, 414, 419, 434 or 439. If the bar code starts with one of the prefixes it searches the image more aggressively for a supplemental. Tries to scan the supplemental if it is present. If the supplemental scanning failed, then the main bar code is returned.
- Supplemental 378-379 - Enables (auto-discriminate) supplemental for UPC/EAN codes starting with 378 or
379. Disables reading of supplementals for any other UPC/EAN bar code not starting with 378 or 379. Tries to scan the supplemental if it is present. If the supplemental scanning failed, then the main bar code is returned.
- Supplemental 978-979 - Enables (auto-discriminate) supplemental for UPC/EAN codes starting with 978 or
979. Disables reading of supplementals for another UPC/EAN bar code not starting with 978 or 979. Tries to scan the supplemental if it is present. If the supplemental scanning failed, then the main bar code is returned.
- Supplemental 414-419-434-439 - Enables (auto-discriminate) supplemental for UPC/EAN codes starting with
414, 419, 434 or 439. Disables reading of supplementals for another UPC/EAN bar code 4 - 16 not starting with 414, 419, 434 or 439. Tries to scan the supplemental if it is present. If the supplemental scanning failed, then the main bar code is returned.
- Supplemental 977 - Enables (auto-discriminate) supplemental for UPC/EAN codes starting with 977.
Disables reading of supplementals for another UPC/EAN barcode not starting with 977. Tries to scan the supplemental if it is present. If the supplemental scanning failed, then the main bar code is returned.
Retry Count - Retry count for auto-discriminating for supplementals. Possible values are 2 to 20 inclusive. Note that this flag is only considered if Supplemental Mode - UPC EAN is set to one of the following values:
Supplementals Auto, Supplementals Smart, Supplementals 378-379, Supplementals 978-979, Supplementals 977 or Supplementals 414-419-434-439 (2 to 20, default 10).
Bookland - Enable Bookland decoding. A check in the checkbox indicates that the option is enabled.
Coupon - Enables Coupon code decoding. Note that in order to successfully decode Coupon codes, all of the correct decoders must be enabled. A check in the checkbox indicates that the option is enabled.
Coupon Repost Mode - Traditional coupon symbols are composed of two bar code: UPC/EAN and Code 128. A new coupon symbol is composed of a single Data Expanded bar code. The new format offers more options for purchase values (up to $999.999) and supports complex discount offers as a second purchase requirement. An interim coupon symbol also exists that contain both types of bar codes: UPC/EAN and Databar Expanded. This format accommodates both retailers that do not recognize or use the additional information included in the new coupon symbol, as well as those who can process new coupon symbols.
62 | DataWedge Configuration
- Old Coupon Report Mode - Scanning an old coupon symbol reports both UPC and Code 128, scanning is
interim coupon symbol reports UPC, and scanning a new coupon symbol reports nothing (no decode).
- New Coupon Report Mode - Scanning an old coupon symbol reports either UPC or Code 128, and scanning
an interim coupon symbol or a new coupon symbol reports Databar Expanded.
- Both Coupon Report Modes - Scanning an old coupon symbol reports both UPC and Code 128, and scanning
an interim coupon symbol or a new coupon symbol reports Databar Expanded.
Convert DataBar To UPC EAN - If this is set it converts DataBar bar codes to UPC/EAN format. For this setting to work UPC/EAN symbologies must be enabled. A check in the checkbox indicates that the option is enabled.
Reader Params
Allows the configuration of parameters specific to the selected bar code reader.
Beam Timer - Sets the maximum amount of time that the reader remains on (0 - 60,000 ms in increments of 100 ms). A value of 0 sets the reader to stay on indefinitely (default -15000).
Linear Security Level - Sets the number of times a bar code is read to confirm an accurate decode.
- Security Short or Codabar - Two times read redundancy if short bar code or Codabar.
- Security All Twice - Two times read redundancy for all bar codes (default).
- Security Long and Short - Two times read redundancy for long bar codes, three times for short bar codes.
- Security All Thrice - Three times read redundancy for all bar codes.
Picklist - Allows the imager to decode only the bar code that is directly under the cross-hair/reticle (+) part of the pattern. This feature is useful in applications where multiple bar codes may appear in the field of view during a decode session and only one of them is targeted for decode.
- Disable – Disables Picklist mode. Any bar code within the field of view can be decoded (default).
- Centered - Enables the Picklist mode so that only the bar code in the center of the image is decoded. This is
most useful when used in conjunction with the static and dynamic reticle viewfinder modes. Note: This mode is only valid for decoder modules that supports a viewfinder. If one tries to set this for a unsupported decoder then the device would issue an error. (Camera scanner only).
- Reticle - Enables the Picklist mode so that only the bar code that is directly under the cross-hair (reticle) is
decoded. This is useful when used in conjunction with the static and dynamic reticle viewfinder modes. (Scan Module Only)
Aiming Pattern - Turns imager aiming pattern on or off during data capture. On (default) or Off.
Aim Type
- Trigger - The device decodes a bar code on each Scan button press. (default).
- Continuous Read - The device continuously decodes bar codes as long as the Scan button is held down and
the previous bar code decoding is complete. This mode is useful when the user wants to perform rapid scanning.
Same Symbol Timeout - Use to prevent the device from decoding the same bar code within a specific time interval (applicable only when Aim Type is set to Continuous Read). The user can perform rapid scanning and prevents the user from decoding the same bar code twice. Set this value to an appropriate interval (in milliseconds). A value of 0 indicates no interval is required between two successive reads (default - 500).
Different Symbol Timeout - Use to prevent the device from decoding another bar code within a specific interval (applicable only when aim type is set to Continuous Read). The user may want to prevent decoding too quickly and set an interval that the user can aim before scanning the next bar code. A value of 0 indicates no interval is required between two successive reads (default - 500).
LCD Mode - Enables or disables LCD mode. LCD mode enhances the ability of the imager to read bar codes from LCD displays such as cellphones (imager only).
- Disable - Disables the LCD mode (default).
- Enable - Enables LCD mode.
DataWedge Configuration | 63
Note: When using the LCD mode, a degradation in performance may be observed and the aiming crosshair may blink until the bar code is decoded.
Hardware Engine Low Power Timeout - (Imager only)
Inverse 1D Mode - This parameter allows the user to select decoding on inverse 1D bar codes.
- Disable - Disables decoding of inverse 1D bar codes (default).
- Enable - Enables decoding of only inverse 1D bar codes.
- Auto - Allows decoding of both twice positive and inverse 1D bar codes.
1D Quiet Zone Level - Sets the effort the decoder performs to decode margin-less bar codes. Applies to any symbology with margin-less bar code decode enabled parameter. Since higher margin-less levels will increase the mis-decode risk and decoding time, we strongly recommend the user only enable the symbologies which needs to choose higher margin-less level, and leave all other symbologies at low default level 1.
Poor Quality Decode Effort - Enable poor quality bar code decoding enhancement feature.
Viewfinder Mode - Configures the Viewfinder modes supported for camera scanning.
- Viewfinder Enabled - Enables only the viewfinder.
- Static Reticle - Enables the viewfinder and a red reticle in the center of the screen which helps selecting the
bar code (default).
Scan Params
Allows the configuration of Code ID and decode feedback options.
Code ID Type - A Code ID character identifies the code type of a scanned bar code. This is useful when the reader is decoding more than one code type. Select a code ID character to insert between the prefix and the decoded symbol.
- Code ID Type None - No prefix (default).
- Code ID Type Aim - A standards based three character prefix.
- Code ID Type Symbol - A Symbol defined single character prefix.
Note: Not all ringtones are fully supported as decode tones and those of longer length may be truncated when used as a decode tone. The recommendation is to test the selected tone for operation before deployment to a customer site.
Volume Type - Set the good decode beep to a system or other sound. This allows for independent control of the good beep volume.
- Ringer and Notifications - Set the good decode beep to the ringer and notifications sound.(default)
- Music and media - Set the good decode beep to the music and media sound
- Alarms - Set the good decode beep to the alarm sound
Decode Audio Feedback - Select an audio tone to sound upon a good decode.
Decode Haptic Feedback - Enable the device to vibrate upon a good decode (default - enabled).
Decode Feedback LED Timer - Set the amount of time (in milliseconds) that the green Data Capture LED stays lit after a good decode. (default - 75 msec.)
Decoding LED Notification - Enable the device to light the red Data Capture LED when data capture is in progress. (default - disabled).
MSR Input
Use MSR Input options to configure the MSR Input Plug-in for the profile.
Enabled — Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled.
Keystroke Output
Use to configure the Keystroke Output Plug-in for the profile.
64 | DataWedge Configuration
Enabled — Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled (default
- enabled).
Action key character - Enables decoding of a special character embedded within a bar code or MSR data for use in native Android applications. This feature is helpful when populating or executing a form.
- None - Action key character feature is disabled (default).
- Tab - Tab character code in a bar code is processed. When DataWedge detects this character code in a bar
code, move the focus to the next field.
- Line feed - Line feed character code in a bar code is processed. When DataWedge detects this character code
in a bar code, move the focus to the next field.
- Carriage return - Carriage return character code in a bar code is processed. When DataWedge detects this
character code in a bar code, move the focus to the next field.
Advanced data formatting - is a way to customizing data before transmission. Use advanced data formatting (ADF) to edit scan data to suit requirements.
- Enable - Enables or disables ADF. A check in the checkbox indicates that ADF is enabled (default - disabled).
- Rules - ADF uses rules to customize data. These rules perform detailed actions when the data meets certain
criteria. One rule may consist of single or multiple criteria applied to single or multiple actions. See
Generating Advanced Data Formatting Rules on page 70
Basic data formatting - Allows the configuration of any data formatting for the related Output Plug-in. When the plug-in is disabled, any data is passed on without modification.
for more information.
- Enabled - Enables or disables Basic Data Formatting. A check in the checkbox indicates that it is enabled
(default - enabled).
- Prefix to data - Add characters to the beginning of the data when sent.
- Suffix to data - Add characters to the end of the data when sent.
- Send data - Set to transfer the captured data to the foreground application. Disabling this option prevents the
actual data from being transmitted. However, the prefix and suffix strings, if present, are still transmitted even when this option is disabled (default - enabled).
- Send as hex - Set to send the data in hexadecimal format. A check in the checkbox indicates that the plug-in is
enabled (default - disabled).
- Send TAB key - Set to append a tab character to the end of the processed data. A check in the checkbox
indicates that the plug-in is enabled (default - disabled).
- Send ENTER key - Set to append an Enter character to the end of the processed data. A check in the
checkbox indicates that the plug-in is enabled (default - disabled).
Intent Output
Allows configuration of the Intent Output Plug-in for the profile. The Intent Output Plug-in allows the captured data to be sent to an application in the form of an implicit Intent. Refer to the Android Developer web site for more information, http://developer.android.com.
Enabled - Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled (default ­disabled).
Intent action - Enter the Intent Action name (required).
Intent category - Enter the Intent Category name (required).
Intent delivery - Select the method by which the intent is delivered:
- Send via StartActivity
- Send via startService (default)
- Broadcast intent
Advanced data formatting - is a way to customizing data before transmission. Use advanced data formatting (ADF) to edit scan data to suit requirements.
- Enable - Enables or disables ADF. A check in the checkbox indicates that ADF is enabled (default - disabled).
DataWedge Configuration | 65
- Rules - ADF uses rules to customize data. These rules perform detailed actions when the data meets certain
criteria. One rule may consist of single or multiple criteria applied to single or multiple actions. See
Generating Advanced Data Formatting Rules on page 70
Basic data formatting - Allows configuration of any data formatting for the related Output Plug-in. When the plug-in is disabled any data is passed on without modification.
- Enabled - Enables or disables Basic Data Formatting. A check in the checkbox indicates that it is enabled
(default - enabled).
- Prefix to data - Add characters to the beginning of the data when sent.
- Suffix to data - Add characters to the end of the data when sent.
- Send data - Set to transfer the captured data to the foreground application. Disabling this option prevents the
actual data from being transmitted. However, the prefix and suffix strings, if present, are still transmitted even when this option is disabled (default - enabled).
- Send as hex - Set to send the data in hexadecimal format. A check in the checkbox indicates that the plug-in is
enabled (default - disabled).
- Send TAB key - Set to append a tab character to the end of the processed data. A check in the checkbox
indicates that the plug-in is enabled (default - disabled).
- Send ENTER key - Set to append an Enter character to the end of the processed data. A check in the
checkbox indicates that the plug-in is enabled (default - disabled).
for more information.
Intent Overview
The core components of an Android application (its activities, services, and broadcast receivers) are activated by intents. An intent is a bundle of information (an Intent object) describing a desired action - including the data to be acted upon, the category of component that should perform the action, and other pertinent instructions. Android locates an appropriate component to respond to the intent, launches a new instance of the component if one is needed, and passes it the Intent object.
Components advertise their capabilities, the kinds of intents they can respond to, through intent filters. Since the system must learn which intents a component can handle before it launches the component, intent filters are specified in the manifest as <intent-filter>elements. A component may have any number of filters, each one describing a different capability. For example, if the manifest contains the following:
<intent-filter . . . >
<action android:name=”android.intent.action.DEFAULT” />
<category android:name=”android.intent.category.MAIN” />
</intent-filter>
In the Intent output plug-in configuration, the Intent action would be:
android.intent.category.DEFAULT
and the Intent category would be:
android.intent.category.MAIN.
The Intent delivery option allows the method by which the intent is delivered to be specified. The delivery mechanisms are Send via startActivity, Send via startService or Broadcast intent.
The decode related data added to the Intent’s bundle can be retrieved using the Intent.getStringExtra() and Intent.getSerializableExtra() calls, using the following String tags:
String LABEL_TYPE_TAG = “com.symbol.emdk.datawedge.label_type”;
- String contains the label type of the bar code.
String DATA_STRING_TAG = “com.symbol.emdk.datawedge.data_string”;
66 | DataWedge Configuration
- String contains the output data as a String. In the case of concatenated bar codes, the decode data is
concatenated and sent out as a single string.
String DECODE_DATA_TAG = “com.symbol.emdk.datawedge.decode_data”;
Decode data is returned as a list of byte arrays. In most cases there will be one byte array per decode. For bar
-
code symbologies that support concatenation e.g. Codabar, Code128, MicroPDF, etc., the decoded data is stored in multiple byte arrays (one byte array per bar code). Clients can get data in each byte array by passing an index.
The MSR related data added to the Intent's bundle can be retrieved using the Intent.getStringExtra() and Intent.getSerializableExtra() calls, using the following String tags:
String MSR_DATA_TAG = “com.symbol.emdk.datawedge.msr_data”;
- String contains the output data as a String. The data from the MSR tracks is concatenated and sent out as a
single string.
String MSR_TRACK1_TAG = “com.symbol.emdk.datawedge.msr_track1”;
- MSR track 1 data is returned as a byte array.
String MSR_TRACK2_TAG = “com.symbol.emdk.datawedge.msr_track2”;
- MSR track 2 data is returned as a byte array.
String MSR_TRACK3_TAG = “com.symbol.emdk.datawedge.msr_track3”;
- MSR track 3 data is returned as a byte array.
String MSR_TRACK1_STATUS_TAG = “com.symbol.emdk.datawedge.msr_track1_status”;
- MSR track 1 decode status as an Integer where 0 indicates a successful decode.
String MSR_TRACK2_STATUS_TAG = “com.symbol.emdk.datawedge.msr_track2_status”;
- MSR track 2 decode status as an Integer where 0 indicates a successful decode.
String MSR_TRACK3_STATUS_TAG = “com.symbol.emdk.datawedge.msr_track3_status”;
- MSR track 3 decode status as an Integer where 0 indicates a successful decode.
Most scanning applications might want the user to be able to decode data and for that decode data to be sent to the *current* activity but not necessarily displayed. If this is the case, then the activity needs to be marked as ‘singleTop’ in its AndroidManifest.xml file. If your activity is not defined as singleTop, then on every decode, the system will create another copy of your Activity and send the decode data to this second copy.
Finally there will be a configuration option for each process plug-in so that the process plug-in can be configured specifically for the intent output, which in this case is the basic data formatting process plug-in.
IP Output
Note: IPWedge application is required on a host computer. Download the IPWedge application from the Support Central web site: http://www.zebra.com/support.
IP Output allows DataWedge to send captured data to a host computer via a network connection. Captured data can be sent over an IP network to a specified IP address and port using either TCP or UDP transport protocols.
Enabled - Enables or disables this plug-in. A check in the checkbox indicates that the plug-in is enabled (default ­disabled).
Remote Wedge - Enable or disable the Remote Wedge option (default - enabled). Remote Wedge is used with the IPWedge application.
Protocol - Select the protocol used by the remote application. Options: TCP (default) or UDP.
IP address - Enter the IP address used by the remote application (default - 0.0.0.0).
Port - Enter the port number used by the remote application (default - 58627).
Advanced data formatting - is a way of customizing data before transmission. Use advanced data formatting (ADF) to edit scan data to suit requirements.
- Enable - Enables or disables ADF. A check in the checkbox indicates that ADF is enabled (default - disabled).
DataWedge Configuration | 67
- Rules - ADF uses rules to customize data. These rules perform detailed actions when the data meets certain
criteria. One rule may consist of single or multiple criteria applied to single or multiple actions. See
Generating Advanced Data Formatting Rules on page 70
Basic data formatting - Allows configuration of any data formatting for the related Output Plug-in. When the plug-in is disabled any data is passed on without modification.
- Enabled - Enables or disables Basic Data Formatting. A check in the checkbox indicates that it is enabled
(default - enabled).
- Prefix to data - Add characters to the beginning of the data when sent.
- Suffix to data - Add characters to the end of the data when sent.
- Send data - Set to transfer the captured data to the foreground application. Disabling this option prevents the
actual data from being transmitted. However, the prefix and suffix strings, if present, are still transmitted even when this option is disabled (default - enabled).
- Send as hex - Set to send the data in hexadecimal format. A check in the checkbox indicates that the plug-in is
enabled (default - disabled).
- Send TAB key - Set to append a tab character to the end of the processed data. A check in the checkbox
indicates that the plug-in is enabled (default - disabled).
- Send ENTER key - Set to append an Enter character to the end of the processed data. A check in the
checkbox indicates that the plug-in is enabled (default - disabled).
for more information.
Usage
This section provides information on how to configure IP Output using the DataWedge configuration user interface. To use IP Output in a particular DataWedge profile (for example: Profile0), scroll downward on IP Output.
Figure 47: IP Output Screen
Using IP Output with IPWedge
IPWedge is a computer application that can be easily configured to retrieve data sent over network by DataWedge IP Output. Refer to the IPWedge User Manual on how to install and configure in a host computer. To enable IP Output to send captured data to a remote computer that is installed with IPWedge:
Procedure:
1 In IP Output, touch Enabled.
A check appears in the checkbox.
68 | DataWedge Configuration
2 Ensure Remote Wedge option is enabled.
3 Touch Protocol.
4 In the Choose protocol dialog box, touch the same protocol selected for the IPWedge computer application.
(TCP is the default).
Figure 48: Protocol Selection
5 Touch IP Address.
6 In the Enter IP Address dialog box, enter the IP address of host computer to send data to.
Figure 49: IP Address Entry
7 Touch Port.
8 In the Enter port number dialog box, enter same port number selected for IPWedge computer application.
Figure 50: Port Number Entry
9 Configure Advanced data formatting and Basic data formatting Plug-in if any required modification to be done
to captured data before sending to remote computer.
Using IP Output without IPWedge
IP Output Plug-in can be used to send captured data from DataWedge to a remote device or host computer without using IPWedge. At the data receiving end, the host computer or mobile device should have an application, that listens
DataWedge Configuration | 69
to TCP or UDP data coming from a configured port and IP address in the IP Output plug-in. To enable IP Output to send captured data to a remote computer:
Procedure:
1 In IP Output, touch Enabled.
A check appears in the checkbox.
2 Ensure Remote Wedge option is disabled.
3 Touch Protocol.
4 In the Choose protocol dialog box, touch the same protocol selected in the client application. (TCP is the default).
Figure 51: Protocol Selection
5 Touch IP Address.
6 In the Enter IP address dialog box, enter the IP address of host computer to send data to.
Figure 52: IP Address Entry
7 Touch Port.
8 In the Enter port number dialog box, enter the port number that the host computer application is listening on.
Figure 53: Port Number Entry
9 Configure Advanced Data Formatting and Basic Data Formatting Plug-in if any required modification to be
done to captured data before sending to remote computer.
70 | DataWedge Configuration
Generating Advanced Data Formatting Rules
The ADF plug-in applies rules (actions to be performed based on defined criteria) to the data received via an input plug-in before sending it to the output plug-in.
Rules - The ADF process plug-in consists of one or more rules. DataWedge formats the output data according to the first matching rule. A rule is a combination of criteria and a set of actions to be performed, upon fulfillment of the criteria set in the rule.
Criteria - Criteria can be set according to Input plug-in, symbology, matching string within the data (at the
• specified position) and/or data length. Received data must match the defined criteria in order for the data to be processed.
Actions - A set of procedures defined to format data. There are four types of actions which are for formatting cursor movement, data modification, data sending and delay specifications. An action can be defined to send the first number of characters to the Output plug-in, pad the output data with spaces or zeros, remove spaces in data, etc.
Configuring ADF Plug-in
Configuring the ADF plug-in consists of creating a rule, defining the criteria and defining the actions.
Procedure:
1
Touch
2
Touch
3 Touch a DataWedge profile.
4 In Keystroke Output, touch Advanced data formatting.
Figure 54: Advanced Data Formatting Screen
.
.
5 Touch the Enable checkbox to enable ADF.
Creating a Rule
Note: By default, Rule0, is the only rule in the Rules list.
Procedure:
DataWedge Configuration | 71
1
Touch
2 Touch New rule.
3 Touch the Enter rule name text box.
4 In the text box, enter a name for the new rule.
5 Touch Done.
6 Touch OK.
or .
Defining a Rule
Procedure:
1 Touch the newly created rule in the Rules list.
Figure 55: Rule List Screen
2 Touch the Rule enabled checkbox to enable the current rule.
Defining Criteria
Procedure:
1 Touch Criteria.
72 | DataWedge Configuration
Figure 56: Criteria Screen
2 Touch String to check for option to specify the string that must be present in the data.
3 In the Enter the string to check for dialog box, enter the string.
4 Touch Done.
5 Touch OK.
6 Touch String position option to specify the position of the string specified in the String to check for option. The
ADF rule is only applied if the specific string in String to check for is found at the specified String position location (zero for the start of the string).
7 Touch the + or - to change the value.
8 Touch OK.
9 Touch String length option to specify a length for the received data. The ADF rule only applies to the bar code
data with that specified length.
10 Touch the + or - to change the value.
11 Touch OK.
12 Touch Source criteria option to associate an input device to an ADF rule. The ADF rule only applies to data
received from associated input devices.
13 Touch Barcode input or MSR input. Options vary depending upon the device configuration.
14 Touch the Source enabled checkbox to accept data from this source.
Figure 57: Barcode Input Screen
DataWedge Configuration | 73
15 For Barcode inputs, touch the All decoders enabled checkbox to select all bar code symbologies. Deselect the
All decoders enabled checkbox to individually select the symbologies.
16
Touch until the Rule screen appears.
17 If required, repeat steps to create another rule.
18
Touch until the Rule screen appears.
Defining an Action
Note: By default the Send remaining action is in the Actions list.
Procedure:
1
Touch
2 Touch New action.
3 In the New action menu, select an action to add to the Actions list. See Table 4: ADF Supported Actions on page
74
for a list of supported ADF actions.
4 Some Actions require additional information. Touch the Action to display additional information fields.
5 Repeat steps to create more actions.
6
Touch
7
Touch .
or .
.
Deleting a Rule
Procedure:
1 Touch and hold on a rule until the context menu appears.
2 Touch Delete to delete the rule from the Rules list.
Note: When there is no rule available for ADF plug-in or all rules are disabled, DataWedge passes
decoded data to the output plug-in without processing the data.
74 | DataWedge Configuration
Order Rules List
Note: When there are no rules defined, ADF passes the captured data through as is. In contrast, when rules are defined but all are disabled, ADF does not pass any captured data through.
Rules are processed in top-down order. The rules that are on top of the list are processed first. Use the icon next to the rule to move it to another position in the list.
Table 4: ADF Supported Actions
Type Actions Description
Cursor Move­ment
Data Modifi­cation
Skip ahead Moves the cursor forward by a specified number of characters. Enter the
number of characters to move the cursor ahead.
Skip back Moves the cursor back by a specified number of characters. Enter the
number of characters to move the cursor back.
Skip to start Moves the cursor to the beginning of the data.
Move to Moves the cursor forward until the specified string is found. Enter the
string in the data field.
Move past a Moves the cursor forward past the specified string. Enter the string in
the data field.
Crunch spaces Remove spaces between words to one and remove all spaces at the be-
ginning and end of the data.
Stop space crunch Stops space crunching. This disables the last Crunch spaces action.
Remove all spaces Remove all spaces in the data.
Stop space removal Stop removing spaces. This disables the last Remove all spaces action.
Remove leading zeros Remove all zeros at the beginning of data.
Stop zero removal Stop removing zeros at the beginning of data. This disables the previous
Remove leading zeros action.
Pad with zeros Left pad data with zeros to meet the specified length. Enter the number
zeros to pad.
Stop pad zeros Stop padding with zeros. This disables the previous Pad with zeros ac-
tion.
Pad with spaces Left pad data with spaces to meet the specified length. Enter the number
spaces to pad.
Stop pad spaces Stop padding with spaces. This disables the previous Pad with spaces
action.
Replace string Replaces a specified string with a new string. Enter the string to replace
and the string to replace it with.
Stop all replace string Stop all Replace string actions.
Data Sending Send next Sends the specified number of characters from the current cursor posi-
tion. Enter the number of characters to send.
Send remaining Sends all data that remains from the current cursor position.
Send up to Sends all data up to a specified string. Enter the string.
Table continued…
Type Actions Description
Send pause Pauses the specified number of milliseconds before continuing the next
action. Enter the amount of time in milliseconds.
Send string Sends a specified string. Enter the string to send.
Send char Sends a specified ASCII/ Unicode character. Enter a character value.
The maximum Unicode character value can be entered is U-10FFFF (= 1114111 in decimal).
Deleting an Action
Procedure:
1 Touch and hold the action name.
2 Select Delete action from the context menu.
ADF Example
The following illustrates an example of creating Advanced Data Formatting:
When a user scans a bar code with the following criteria:
DataWedge Configuration | 75
Code 39 bar code. length of 12 characters.
contains 129 at the start position.
Modify the data as follows:
Pad all sends with zeros to length 8.
send all data up to character X.
send a space character.
To create an ADF rule for the above example:
Procedure:
1
Touch
2 Touch DataWedge.
3 Touch Profile0.
4 Under Keystroke Output, touch Advanced data formatting.
5 Touch Enable.
6 Touch Rule0.
7 Touch Criteria.
8 Touch String to check for.
9 In the Enter the string to check for text box, enter 129 and then touch OK.
10 Touch String position.
11 Change the value to 0.
12 Touch OK.
13 Touch String length.
14 Change value to 12.
15 Touch OK.
16 Touch Source criteria.
17 Touch Barcode input.
.
76 | DataWedge Configuration
18 Touch All decoders enabled to disable all decoders.
19 Touch Code 39.
20
Touch three times.
21 Touch and hold on the Send remaining rule until a menu appears.
22 Touch Delete action.
23
Touch
24 Touch New action.
25 Select Pad with zeros.
26 Touch the Pad with zeros rule.
27 Touch How many.
28 Change value to 8 and then touch OK.
29
Touch
30
Touch
31 Touch New action.
32 Select Send up to.
33 Touch Send up to rule.
34 Touch String.
35 In the Enter a string text box, enter X.
36 Touch OK.
37
Touch
38
Touch
39 Touch New action.
40 Select Send char.
41 Touch Send char rule.
42 Touch Character code.
43 In the Enter character code text box, enter 32.
44 Touch OK.
45
Touch
or .
three times.
or .
three times.
or .
.
Figure 58: ADF Sample Screen
DataWedge Configuration | 77
46 Ensure that an application is open on the device and a text field is in focus (text cursor in text field).
47 Aim the exit window at the bar code.
Figure 59: Sample Bar Code
48 Press and hold the scan button.
The red laser aiming pattern turns on to assist in aiming. Ensure that the bar code is within the area formed by the aiming pattern. The LED light red to indicate that data capture is in process.
49 The LED lights green, a beep sounds and the device vibrates, by default, to indicate the bar code was decoded
successfully. The formatted data 000129X<space>appears in the text field.
Scanning a Code 39 bar code of 1299X15598 does not transmit data (rule is ignored) because the bar code data did not meet the length criteria.
78 | DataWedge Configuration
Figure 60: Formatted Data
DataWedge Settings
The DataWedge Settings screen provides access to general, non-profile related options. Touch or > Settings.
Figure 61: DataWedge Settings Window
DataWedge enabled - Enables or disables DataWedge. To disable DataWedge uncheck this option.
Enable logging - Enables or disables debug output file to logcat. To enable logging check this option.
Import - allows import of a DataWedge configuration file. The imported configuration replaces the current configuration.
Export - allows export of the current DataWedge configuration to the microSD card.
DataWedge Configuration | 79
Import Profile - allows import of a DataWedge profile file.
Export Profile - allows export of a DataWedge profile.
Restore - return the current configuration back to factory defaults.
Importing a Configuration File
Procedure:
1 Copy the configuration file to a location on the device (Internal Storage or microSD card).
2
Touch
3
Touch
4
Touch
5 Touch Settings.
6 Touch Import.
7 Select the datawedge.db file. Use . and .. and folder entries to browse to the configuration file. The
configuration file (datawedge.db) is imported and replaces the current configuration.
.
.
or .
Exporting a Configuration File
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch Settings.
5 Touch Export.
6 In the Export To dialog box, select the location to store the file.
7 Touch Export to export the DataWedge configuration file to the selected location.
.
.
or .
Importing a Profile File
Note: Do not change the filename of the of the profile file. If the filename is changed, the file will not be imported.
Procedure:
1 Copy the profile file to the root of the On-Device Storage.
2
Touch
3
Touch
4
Touch
5 Touch Settings.
6 Touch Import Profile.
7 Select the profile configuration file (dwprofile_xxx.db, where x = the name of the profile) in the file
selection dialog box. Use ., .., and folder entries to locate the profile file.
8 Touch the profile filename. The profile file (dwprofile_xxx.db) is imported and appears in the profile list.
.
.
or .
80 | DataWedge Configuration
Exporting a Profile
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch Change to change the location to save the file.
5 Select Internal Storage or External Storage.
6 Touch OK.
7 Select a profile from the profile list.
8 Touch Export. The profile file (dwprofile_x.db, where x = name of the profile) is saved to the selected
location.
.
.
or .
Restoring DataWedge
To restore DataWedge to the factory default configuration:
Procedure:
1
Touch
2
Touch
3
Touch
4 Touch Settings.
5 Touch Restore.
6 Touch Yes.
.
.
or .
Configuration and Profile File Management
The configuration or profile settings for DataWedge can be saved to a file for distribution to other devices.
After making configuration or profile changes, export the new configuration or profile to the root of the microSD card. The configuration file created is automatically named datawedge.db. The profile file created is automatically named dwprofile_x.db, where x is the profile name. The files can then the copied to the microSD card of other devices and imported into DataWedge on those devices. Importing a configuration or profile replaces the existing settings.
After making configuration or profile changes, export the new configuration or profile to the root of the On-device Storage. The configuration file created is automatically named datawedge.db. The profile file created is automatically named dwprofile_x.db, where x is the profile name. The files can then the copied to theOn— device Storage of other devices and imported into DataWedge on those devices. Importing a configuration or profile replaces the existing settings.
Enterprise Folder
Internal storage contains the Enterprise folder (/enterprise). The Enterprise folder is persistent and maintains data after an Enterprise reset. After an Enterprise Reset, DataWedge checks folder /enterprise/device/
settings/datawedge/enterprisereset/ for a configuration file, datawedge.db or a profile file, dwprofile_x.db. If the file is found, it imports the file to replace any existing configuration or profile.
DataWedge Configuration | 81
Note: A Factory Reset deletes all files in the Enterprise folder.
Auto Import
DataWedge supports remote deployment of a configuration to a device, using tools such as MSP. DataWedge monitors the /enterprise/device/settings/datawedge/autoimport folder for the DataWedge configuration file (datawedge.db) or a profile file (dwprofile_x.db). When DataWedge launches it checks the folder. If a configuration or profile file is found, it imports the file to replace any existing configuration or profile. Once the file has been imported it is deleted from the folder.
While DataWedge is running it receives a notification from the system that a file has been placed into the / enterprise/device/settings/datawedge/autoimport folder. When this occurs, DataWedge imports this new configuration or profile, replacing the existing one and delete the file. DataWedge begins using the imported configuration immediately.
Note:
A Factory Reset deletes all files in the Enterprise folder.
It is strongly recommended that the user exits DataWedge before remotely deploying any configuration or profile. It is required that the file permissions are set to 666.
Programming Notes
The following paragraphs provide specific programming information when using DataWedge.
Overriding Trigger Key in an Application
To override the trigger key in an application, create a profile for the application that disables the Barcode input. In the application, use standard APIs, such as onKeyDown() to listen for the KEYCODE_BUTTON_L1 and KEYCODE_BUTTON_R1 presses.
Capture Data and Taking a Photo in the Same Application
To be able to capture bar code data and take a photo in the same application:
Create a Datawedge profile pertaining to the picture taking Activity in your application that disables scanning and use standard Android SDK APIs to control the Camera.
The default Datawedge profile takes care of the scanning in the application. You might want to create another DataWedge profile that caters to any specific scanning needs, associated to your Application's Activity pertaining to scanning.
Disable DataWedge on MC40 and Mass Deploy
To disable DataWedge and deploy onto multiple MC40 devices:
Procedure:
1
Touch
2 Touch DataWedge.
3
Touch
4 Touch Settings.
5 Unselect the DataWedge enabled check box.
.
or .
82 | DataWedge Configuration
6 Export the DataWedge configuration. See Exporting a Configuration File on page 79
Configuration and Profile File Management on page 80 for instructions for using the auto import feature.
for instructions. See
Soft Scan Feature
DataWedge allows a native Android application to programmatically start, stop, or toggle the scan trigger state. The application can issue an Android Broadcast Intent, to control the scanner, without requiring the scan button to be pressed. The active DataWedge profile is required to control all the parameters during a scan operation.
The structure of the broadcast intent that resolves to the soft scan is:
action: “com.symbol.emdk.datawedge.api.ACTION_SOFTSCANTRIGGER”
extras: This is a String name/value pair that contains trigger state details.
name: “com.symbol.emdk.datawedge.api.EXTRA_PARAMETER”
value: “START_SCANNING” or “STOP_SCANNING” or “TOGGLE_SCANNING”
Sample
Intent sendIntent = new Intent();
sendIntent.setAction(“com.symbol.emdk.datawedge.api.ACTION_SOFTSCANTRIGGER”);
sendIntent.putExtra(“com.symbol.emdk.datawedge.api.EXTRA_PARAMETER”, “TOGGLE_SCANNING”);
sendBroadcast(sendIntent);
Chapter
5
WLAN Configuration
The MC40 supports the following WLAN security options:
Open Wireless Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)/WPA2 Personal (PSK)
Extensible Authentication Protocol (EAP)
- Lightweight Extensible Authentication Protocol (LEAP)
- Protected Extensible Authentication Protocol (PEAP) - with Microsoft Challenge-Handshake Authentication
Protocol version 2 (MSCHAPv2) and Generic Token Card (GTC) authentication.
- EAP-Flexible Authentication via Secure Tunneling (FAST) - with MSCHAPv2 and GTC authentication.
- EAP-Transport Layer Security (TLS)
- EAP-TTLS - with Password Authentication Protocol (PAP), MSCHAP and MSCHAPv2 authentication.
83 | WLAN Configuration
Connecting to a Wi-Fi Network
Note: By default, the network Proxy is set to None and the IP settings is set to DHCP. See Configuring for
a Proxy Server on page 85 a Static IP Address on page 86 for setting the device to use a static IP address.
Procedure:
1
Touch
2
Touch
3 Slide the Wi-Fi switch to the On position. The device searches for WLANs in the area and displays them in the
list. Open networks are indicated with
4 Scroll through the list and touch the desired WLAN network.
or .
Wi-Fi.
for setting connection to a proxy server and see Configuring the Device to Use
and secure networks are indicated with .
84 | WLAN Configuration
Figure 62: WLAN Network Security Dialog Boxes
5 Note:
Touch Show password checkbox to display password as it is entered.
Enter the required password. or other credentials then touch Connect. See the system administrator for more information.
6 The MC40 obtains a network address and other required information from the network using the dynamic host
configuration protocol (DHCP) protocol. To configure the MC40 with a fixed internet protocol (IP) address, see the MC40 Integrator Guide.
7 When the device connects to the network, the network name appears at the top of the list and Connected appears
below the network name.
Manually Adding a Wi-Fi Network
Manually add a Wi-Fi network if the network does not broadcast its name (SSID) or to add a Wi-Fi network when out of range.
Procedure:
1
Touch
2
Touch
3 Slide the Wi-Fi switch to the On position.
4 Touch + at the bottom of the screen.
5 In the Network SSID text box, enter the name of the Wi-Fi network.
6 In the Security drop-down list, select the type of security. Options:
or .
Wi-Fi.
None
WEP
WPA/WPA2 PSK
WLAN Configuration | 85
802.1x EAP.
7 If the network security is None, touch Save.
8 If the network security is WEP or WPA/WPA2 PSK, enter the required password and then touch Save.
9 If the network security is 802.1x EAP:
Touch the EAP method
Touch the Phase 2 authentication drop-down list and select an authentication method.
If required, touch CA certificate and select a Certification Authority (CA) certificate. Note: Certificates are
installed using the Security settings.
If required, touch User certificate and select a user certificate. Note: User certificates are installed using the
Security settings.
If required, in the Identity text box, enter the username credentials.
If desired, in the Anonymous identity text box, enter an anonymous identity username.
If required, in the Password text box, enter the password for then given identity.
10
Touch Save. To connect to the saved network, touch and hold on the saved network and select Connect to network.
11
Touch
Note: By default, the network Proxy is set to None and the IP settings is set to DHCP. See Configuring
for a Proxy Server on page 85 to Use a Static IP Address on page 86 for setting the device to use a static IP address.
.
drop-down list and select PEAP, TLS, TTLS, LEAP or FAST.
for setting connection to a proxy server and see Configuring the Device
Configuring for a Proxy Server
A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client.
It is important for enterprise customers to be able to set up secure computing environments within their companies, and proxy configuration is an essential part of doing that. Proxy configuration acts as a security barrier ensuring that the proxy server monitors all traffic between the Internet and the intranet. This is normally an integral part of security enforcement in corporate firewalls within intranets.
Procedure:
1 In the network dialog box, touch a network.
2 Touch Show advanced options checkbox.
3 Touch Proxy settings and select Manual.
86 | WLAN Configuration
Figure 63: Proxy Settings
4 In the Proxy hostname text box, enter the address of the proxy server.
5 In the Proxy port text box, enter the port number for the proxy server.
Note: When entering proxy addresses the Bypass proxy for field, do not use spaces or carriage returns
between addresses.
6 In the Bypass proxy for text box, enter addresses for web sites that do not require to go through the proxy server.
Use a comma “,” between addresses.
7 Touch Connect.
8
Touch
.
Configuring the Device to Use a Static IP Address
By default, the device is configured to use Dynamic Host Configuration Protocol (DHCP) to assign an Internet protocol (IP) address when connecting to a wireless network. To configure the device to connect to a network using a static IP address:
Procedure:
1 In the network dialog box, touch a network.
2 Touch Show advanced options checkbox.
3 Touch IP settings and select Static.
Figure 64: Static IP Settings
4 In the IP address text box, enter an IP address for the device.
5 If required, in the Gateway text box, enter a gateway address for the device.
6 If required, in the Network prefix length text box, enter a the prefix length.
7 If required, in the DNS 1 text box, enter a Domain Name System (DNS) address.
8 If required, in the DNS 2 text box, enter a DNS address.
9 Touch Connect.
10
Touch
.
Advanced Wi-Fi Settings
Note: Advanced Wi-Fi settings are for the device not for a specific wireless network.
WLAN Configuration | 87
Use the Advanced settings to configure additional Wi-Fi settings. Touch advanced settings.
General
- Network notification - When enabled, notifies the user when an open network is available.
- Keep Wi-Fi on during sleep - Opens a menu to set whether and when the Wi-Fi radio turns off.
+ Always On - The radio stays on when the device enters suspend mode. + Only when plugged in - The radio stays on while the device is connected to external power. + Never On - The radio turns off when the device enters suspend mode (default).
- Install Certificates – Touch to install certificates (KitKat only).
- MAC address - Displays the Media Access Control (MAC) address of the device when connecting to Wi-Fi
networks.
Regulatory
- Country selection - Allows user to select the country of operation. If Auto is selected, the MC40 will acquire
the country information from the Access Points and displays the acquired country name.
- Region code - Displays the current region code.
Band and Channel Selection
- Wi-Fi frequency band - Use to select the frequency band. Options: Auto (default), 5 GHz only or 2.4 GHz
only.
- Available channels (2.4 GHz) - Use to select specific channels. Touch to display the Available channels
menu. Select specific channels. Touch OK.
- Available channels (5 GHz) - Use to select specific channels. Touch to display the Available channels menu.
Select specific channels. Touch OK.
or > Advanced to view the
Logging
- Advanced Logging - Provides support for capture of system logs to a file to help in debugging and
resolution of Wi-Fi related issues. Disabled by default. In the Advanced Logging dialog box, select Enable
Logging. If desired, change the log directory location. When enabled, the following log are captured:
Note:
All log files are saved in /storage/sdcard/fusionlogs on the MC40.
Fusion will ask the user whether he wants to clear out previous logs before starting logging.
tcpdump capture file and fusion-sysinfo.log will only be generated when advanced logging is stopped.
88 | WLAN Configuration
+ Android logcat output with time stamps and the kernel messages in the file: fusion-wlan.log. + tcpdump intermediate capture of packets between network stack and driver in the file: fusion-
pktcap.pcap
Fusion versions, Wi-Fi state machine logs and other framework information in the file: fusion-
+
sysinfo.log.
- Wireless logs - Use to capture Wi-Fi log files.
+ Fusion Logger - Touch to open the Fusion Logger application. This application maintains a history of
high level WLAN events which helps to understand the status of connectivity.
Figure 65: Fusion Logger Screen
+ Fusion Status - Touch to display live status of WLAN state. Also provides information of device and
connected profile. (KitKat only)
Figure 66: Fusion Status Screen
About
- Version - Displays the current Fusion information.
Enabling Logging
Note: Make sure that no other ADB command or any application that captures KMSG is running.
Procedure:
WLAN Configuration | 89
1
Touch
2 Touch Developer options.
3 Touch USB debugging checkbox.
4
Touch .
5 Touch Wi-Fi.
6
Touch
7 Touch Advanced.
8 Touch Advanced logging.
Figure 67: Advanced Logging Dialog Box (Jelly Bean)
Figure 68: Advanced Logging Dialog Box (KitKat)
or .
or .
9 On Jelly Bean devices, touch Start Logging.
10 On KitKat devices, touch Enable Logging.
11 After logging is complete:, unckeck Advanced Logging.
On Jelly Bean devices, touch Stop Logging.
On KitKat devices, touch Enable Logging
The MC40 saves the log file fusion-wlan.log to On Device Storage root directory (Jelly Bean) or On Device Storage fusionlogs directory (KitKat).
12 Connect MC40 to host computer.
13 Copy the log file from the location listed above.
14 Disconnect the MC40 from the host computer.
90 | WLAN Configuration
Additional Wi-Fi Advanced Features
Some additional Wi-Fi settings cannot be accessed from the User Interface. They can be configured by using Wi-Fi (CSP). Refer to EMDK documentation for the details on the Wi-Fi settings configuration using the Wi-Fi CSP.
Auto Time Config - Using this feature, the device can sync up its time with Zebra WLAN infrastructure. This feature works only when the device is connected to Zebra WLAN infrastructure and the feature is enabled on the WLAN infrastructure side. Default: disabled.
PMKID Caching - Allows the device to skip 802.1x authentication during roaming if it had previously connected to that AP with a full 802.1x authentication. Defaut: disabled. Note: disable OKC when enabling PMKID Caching.
Opportunistic Key Caching - Use this feature to skip 802.1x authentication during roaming. The device will go for full 802.1x authentication for the first time it connects to the network. For subsequent roaming, the device skips 802.1x authentication. Default: enabled.
Cisco Centralized Key Management - Allows the device to skip 802.1x and key-handshake phases during roaming. This feature is available only when the device is connected to a Cisco infrastructure that supports Cisco Centralized Key Management (CCKM). Default: enabled.
Fast Transition - Fast Transition (FT) is the fast roaming standard, 802.11r. With this feature, the device can skip
802.1x and key-handshake phases during roam. Default: enabled.
Fast Transition Resource Information Container - Allows the device to request TSPEC as part of re­association frame exchange. This helps to avoid sending a separate resource request after roaming is completed. Default: disabled.
Power Save - The device can be configured to work in different power save modes: This feature is only available on KitKat devices.
1 Active 2 Power save using WMM-PS - This is the default power save mode. Device uses WMM-PS power save
3 Power save using PS-Poll - In this method, the device will use PS-Poll frames to retrieve buffered frames
4 Null Data Power Save - In Null Data Power Save (NDP), the device will stay awake for 100 ms after the last
FIPS - The device supports FIPS 140-2 Level 1. In this mode, the device will not support TKIP and WEP encryption modes. When Wi-Fi is enabled, the stack will run predefined tests to make sure that the encryption engine is working correctly and the firmware and firmware loader modules are correct.
802.11k - Using 802.11k, the device can discover neighbor APs and adds support for different types of radio resource measurements. Default: enabled. KitKat only.
Band Preference - The device can be configured to prefer one band over another. By default, device prefers 5 GHz frequency band over 2.4 GHz. KitKat only.
Subnet Roaming - When the device roams between different sub networks, if it detects that it is roaming to a different subnet, the device will request a fresh IP address. Default: disabled.
- Keeps the WLAN radio always in active mode (i.e. power save mode disabled).
method if the AP is configured to use this. If the AP is not supporting WMM-PS, the device will use PS-Poll power save method.
from the AP.
frame is sent or received. The device will send a Null Data packet with power management bit cleared to retrieve buffered frames from the AP.
Zebra Mobility Extensions
Zebra Mobility Extensions make use of 802.11 specifications and Zebra proprietary extensions to achieve the highest level of performance, efficiency and reliability. The MC40 with Android KitKat adds support for the following Zebra Mobility Extensions. These features are not available on Jelly Bean.
WLAN Configuration | 91
Coverage Hole Detection - The MC40 KitKat includes enhancements to the IEEE 802.11k standard. These improvements will report gaps in signal coverage to the Zebra wireless LAN infrastructure. Network administrators can detect and mitigate coverage gaps present in the network for greater reliability. Default: enabled.
Aggregated Fast Transition - Aggregated FT improves on IEEE 802.11r, Over-the-DS fast roaming. In conjunction with Zebra wireless LAN infrastructure, the MC40 with Android KitKat will achieve more reliable and consistent fast roaming. Default: enabled.
Scan Assist - The MC40 with Android KitKat monitors neighbor access points and retrieves roaming related information from the Zebra wireless LAN infrastructure without doing scans. Using this Scan Assist feature, the MC40 KitKat improves roaming. Default: enabled.
Remove a Wi-Fi Network
To remove a remembered or connected network:
Procedure:
1
Touch
2
Touch
3
Touch
4 In the Wi-Fi networks list, touch and hold the name of the network.
5 In the menu, touch Forget network.
6
Touch
.
or .
Wi-Fi.
.
93 | Administrator Utilities
Chapter
6
Administrator Utilities
We provide a suite of utilities that allow an administrator to manage the following features:
Multi-user Login - The Multi-user Login feature allows an administrator to set up the device to be used by multiple users. The users have access to specific applications and features depending upon the user settings.
Application Lock - The Application Lock feature allows an administrator to restrict application access for specific
• applications by user or groups of users. The permitted applications are managed using groups of user accounts from Multi-user Login feature.
Secure Storage - Secure Storage Administrator application allows installation and deletion of encrypted keys and creation, mounting, un-mounting and deletion of the encrypted file systems.
The following applications help the administrator configure these features.
On-device applications - reside on the device.
- MultiUser Administrator
- AppLock Administrator
- Secure Storage Administrator.
Host computer application - reside on a host computer.
- Enterprise Administrator.
Required Software
These tools are available on the Support Central web site at http://www.zebra.com/support. Download the required files from the Support Central web site and follow the installation instruction provided.
On-device Application Installation
See Application Installation on page 135
for instruction on installing applications onto the device.
Multi-user/AppLock Configuration
To use the Multi-user Login and Application Lock features, the administrator must create user and group account information using the Enterprise Administrator application.
Note: The administrator can also create the account information manually. See Manual File Configuration
on page 105 for more information.
94 | Administrator Utilities
Enterprise Administrator Application
Note: .Net Compact Framework 4 or later is required to run the Enterprise Administrator. To download, go to www.microsoft.com.
Use the Enterprise Administrator application to setup user and group accounts and create the required (Password, Group and White List) files for using the Multi-user and Application Lock features.
On the host computer launch the Enterprise Administrator application.
Figure 69: Enterprise Administrator Window
Creating Users
Each person that uses the device has to have a user name and password. To create a user:
Procedure:
1 Click + above the Users list box.
Figure 70: User Manager Window
Administrator Utilities | 95
2 In the Username text box, enter a user name. The text is case sensitive and required.
3 In the Password text box, enter a password for the user. The text is case sensitive and required.
4 In the Retype Password text box, re-enter the user password.
5 Select the Admin checkbox to set the user to have administrator rights.
6 Select the Enabled checkbox to enable the user.
7 Click OK.
8 Repeat steps 1 through 7 for each additional user.
Adding Packages
Note: All system applications that are on the default image are available to all users.
Create a list of installed applications (packages) on the device that are available for use by all the users.
Procedure:
1 Click + next to Packages.
Note: To get a list of all the applications (packages) on the device see Determining Applications
Installed on the Device
Figure 71: Package Information Window
on page
106.
2 In the Package name text box, enter the name of an application.
3 Click OK.
96 | Administrator Utilities
4 Repeat steps 1 through 3 for each additional package.
Creating Groups
Create groups of users that have access to specific applications.
Procedure:
1 Click + above the Groups list. The Group Manager window appears with a list of users and packages.
Figure 72: Group Manager Window
2 In the Group name text box, enter a name for the group. This field is required.
3 Select a user in the Available Users list box and then click the Add button to add the user to the Users in Group
list box or click the Add All button to add all the users in the Available Users list box to the Users in Group list box.
4 Select a package in the Available Packages list box and then click the Add button to add the package to the
Packages in Group list box or click the Add All button to add all the packages in the Available Packages list box to the Packages in Group list box.
5 Click OK.
6 Click Save.
Creating Remote Authentication
Use the Remote Authentication feature to set a remote server for authentication.
Procedure:
1 Click the Auth button. The Authentication window appears.
Figure 73: Authentication Window
2 Select the Remote radio button.
3 In the Server IP text box, enter the address of the remote server.
4 In the Port text box, enter the port number of the remote server.
5 Select the use SSL Encryption check box if SSL encryption is required.
6 Click OK.
Administrator Utilities | 97
Save Data
At any time, the administrator can save the current data. The application creates two files in the <user>\_APP_DATA folder: database and passwd.
Exporting File
In order to use the features on the device, export the required files and then copy them to the device. The following files are created by the Enterprise Administrator application:
Password File - Filename:
Group File - Filename: groups. Lists each group and users associated to each group.
White List Files - Filename: the filenames are the names of the group created in the Group file. Lists the user installed applications that the group is allowed to access.
Remote Server - Filename: server. Lists the remote server IP address and port number.
Procedure:
1 Click Export.
2 In the Browse For Folder window, select a folder and then click OK.
3 Click OK.
4 Click FileExportServer Information.
The server file is saved in the <user>\_APP_DATA folder.
5 Copy all the files to the root of the microSD card. See USB Communication on page 45 for information on
copying files to the device.
6 Copy all the files to the root of the On-device Storage. See USB Communication on page 45 for information on
copying files to the device.
passwd. Lists the user names, encrypted passwords, administrator and enable flags.
98 | Administrator Utilities
Importing User List
Procedure:
1 Click FileImportUser List.
2 Navigate to the location when the passwd file is stored.
3 Select the passwd file.
4 Click Open.
The user information is populated into the Users list.
Importing Group List
Procedure:
1 Click FileImportGroup List.
2 Navigate to the location when the group file is stored.
3 Select the group file.
4 Click Open.
The group and package information is populated into the Groups and Packages list.
Importing Package List
To import a package list (see Package List File
Procedure:
1 Click FileImportPackage List.
2 Navigate to the location when the package file is stored.
3 Select the package text file.
4 Click Open.
The package information is populated into the Packages list.
Editing a User
Procedure:
1 Select a user in the Users list.
2 Click Edit User.
3 Make changes and then click OK.
Deleting a User
Procedure:
1 Select a user in the Users list.
2 Click -. The user name is removed from the list.
on page 106
for instructions for creating a Package List file):
Editing a Group
Procedure:
1 Select a user in the Groups list.
2 Click Edit Group.
3 Make changes and then click OK.
Deleting a Group
Procedure:
1 Select a group in the Groups list.
2 Click -.
3 Click Yes. The group name is removed from the list.
Editing a Package
Procedure:
1 Select a package in the Packages list.
2 Click Edit Package.
3 Make changes and then click OK.
Deleting a Package
Procedure:
1 Select a package in the Packages list.
2 Click -. The package name is removed from the list.
Administrator Utilities | 99
MultiUser Administrator
Use the MultiUser Administrator application to allow an administrator to enable, disable and configure the Multiuser Login feature.
Importing a Password
When the MultiUser Administrator is used for the first time, the password file must be imported.
Procedure:
1
2
Touch
Touch
.
.
100 | Administrator Utilities
Figure 74: MultiUser Administrator Screen
3 Touch Load User List. The application reads the data from the passwd file and configures the Multi-user Login
feature.
4 Touch Enable Multiuser to enable the feature.
Figure 75: MultiUser Login Screen
5 In the Login text box, enter the username.
6 In the Password text box, enter the password.
7 Touch OK.
Loading...