3M Traffic Safety Systems IDMAX012 RFID Reader User Manual Part B
3M Traffic Safety Systems RFID Reader Part B
Part B
5.3 System Info This display screen will show the hardware and firmware revisions of this particular IDentity MaX reader, The internal system date and time are also shown. ! t.‘ lm— mm.“ mm, www.’sirit‘;édml ’ l ' w ,—*t - 5.4 Read Triggers The Read trigger menu allows the user to set specific events that will initiate RFID transactions. There are five independent triggers that are given to the user to use. All trigger event parameters are configured using the pull down menus. Version 1.2 Page 21 , hwmvmflmmn _' , if ,, v 61 mm} nu, _ , , Wm " FFFGH—m Each trigger can have the input linked to a general purpose input or to the internal timer (tO). The minimum valid signal pulse width is set using the Trigger duration parameter. The resultant output will be routed to the general purpose output selected here, By enabling retrigger, all subsequent occurrences of this event can be monitored. 5.5 Transceiver The IDentity MaX reader is capable of reading a wide variety of UHF tag protocols;,. The "Transceiver" menu allows the user to specify which tag l protocols will be used. Version 1.2 Page 22 la- m w unm- u. no la»..- am; mm m... am. wwam-‘g lwlllw/umsmuw ll 5.6 Tag Filter The Tag Filler menu allows the user to filter incoming data to reduce the amount of redundant information being reported back to the user. W.tflfl in m ,_ W 1». W Lu» 9. ulna aw- Jul-vow sm- gleam-g , , ,, i'estl-immvuimw t W , .,,, , ,, , . A"), ll": www.sirif.’c'6m l l ‘ r’ ‘ l ‘ t ‘ .We eeeeeeeeeeo The duplicate filter will remove all subsequent instances of a particular tag after the initial read. This can greatly reduce the amount of data reported back to the user caused by a tag remaining in the read zone for a longer Version 1.2 Page 23 5.7 lune than average time. This will not suspend the actual tag read for the time out period, but rather will cease duplicate data reporting only, Validation is designed to discard all erroneous incoming data prior to reporting and processing. The validation count is the number of times a tag must be successfully read to be considered valid, The validation attempt is the number of tries the reader will make in order to obtain a validation count. Naturally, the value in validation attempts needs to be greater than validation count. The passback feature will allow the time stamp on all duplicate tag reads to be updated for each read, extending the timeout. If passback is enabled, a tag must leave the read zone for the duration of the duplication filter timeout period. Access Control The lDentity Max reader uses a translation table to reference all actions and ID associated with specific tags. Access control is used to determine the action(s) taken for any tag read. Wapflmww toads» vm-nfileEE'E am; . . . J/ vwwvysrrlmom sin-mi sooeweooooa flll'vbm The default translation ID is the value the reader will enter in the log and is set by the user to any 16 digit or less value. The default handler indicates the reporting action(s) the system will take if an unknown tag is read. See “Read Handler" for a full list of options available. Version 1.2 Page 24 5.8 The dealer and facility codes are programmed by Sirit during the manufacturing process and are unique to every Sirit customer, However, both Dealer code and the Dealer handler ID are not Implemented in this version of the lDentity MaX reader, Read Handler The read event handler allows the user to specify a variety of actions to be taken when a tag is read and looked up In the translation table. In the event that an unknown tag is read, the default event handler specified in the Access Control menu will be used. With this menu, the user will be able to turn on a warning lamp, send a warning using the host serial port, raise the gate, or all of these To configure the handler, select the desired action from the pull down menu. 5.9 e seine-mi ea General Purpose inputs (GPI) Each of the four inputs can be set to an active high, active low, or edge triggered event. Version 12 Page 25 n- m y- W M m “A - uzm «am-mm cum“) an d iminmummwuw 3 an 1mm : r , www.sirit,éomi j; ; ,, ‘ ‘ A EWM WWW" ac Aacfiaeeavb- kiw- 5.10 General Purpose Outputs (GPO) The four general purpose outputs have several parameters that can be configured for a variety of applications. Ht n w true 1741 no law-a umd0umm9~~0®4aI<3 , Jfi Jw-«Illmymmumlw 4_ J e um“ , “a wwwosiritfiOm i <’ * (' 3 ,~ : a ‘ E::::: firwfirmr—T—v G) Mam-1 a J W J fifiv, ,J,, _, i, JJ A.” we r firfimfu , Active state can be set to active low or active high and the there are three options for output drive state, Open drain, Push pull, and none. Version 1.2 Page 26 Each output waveform is specified with three parameters: Pulse width, pulse period and pulse repetition. The width is the time that the signal Is active. Period is the time from rising edge to rising edge (Active high state) or falling edge to falling edge (Active low state). Pulse repeat is the number of times the active signal is repeated. The relationship between the three is shown below: Pulse Period Pulse Width 1 2 3 4 Pulse Repetition 5,11 Ethernet The Ethernet menu allows the user to enable various network functions and view and modify all ip information, MM“,- . »|_=“°—"mmnnun um was 15m Tiwmwmmm ’ 11mm"? (lltomn. ' Version 12 Page 27 The first enable is the overall control of the Ethernet port. Disabling this function turns off all TCP/lP communication to the reader. The DHCP enable activates the dynamic ip assignment to the reader. A DHCP server must be present to issue the ip address. The POST enable controls the XML transactions to and from the reader. By disabling this function, the user will not be able to read nor configure the IDentity MaX reader using the Ethernet port and the web based user interface. This is a security feature so that unauthorized personnel are not able to reconfigure the reader on an open network, While the POST enable is inactive, the admin will be able to configure the reader using the USB port and the PC based user interface. The remaining fields show the current and default network configuration. To change any of the parameters, simply enter in the desired values and click “write" or “save". Note: Both current and default network parameters have been set to the following during this test phase Ip: 1721827231 Subnet mask: 255.255.255.0 Gateway: 172.1827254 5.12 Gate Control The Gate Control menu is used to select the gate type (normal or feedback), the control input should synchronization be used, and the control output. Ali parameters are changed using the respective pull down menus. Version 1.2 Page 28
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : No Page Count : 8 XMP Toolkit : XMP toolkit 2.9.1-13, framework 1.6 About : uuid:be6dda99-c9f7-4d37-9bc8-dbe7e194c0a0 Modify Date : 2006:06:30 10:35:57-04:00 Create Date : 2006:06:30 10:35:48-04:00 Metadata Date : 2006:06:30 10:35:57-04:00 Document ID : uuid:144822c3-5351-403c-bb6b-1bdbf30f49b4 Format : application/pdfEXIF Metadata provided by EXIF.tools