Datalogic 0016 Kyman-Net User Manual pre Kyman NET Master

Datalogic SpA Kyman-Net pre Kyman NET Master

Contents

User Manual

     Kyman-NET™  USER'S MANUAL
            DATALOGIC S.p.A. Via Candini 2 40012 - Lippo di Calderara di Reno Bologna - Italy   Kyman-NET™ - User's Manual  Ed.: 06/2006              ALL RIGHTS RESERVED Datalogic reserves the right to make modifications and improvements without prior notification.  Datalogic shall not be liable for technical or editorial errors or omissions contained herein, nor for incidental or consequential damages resulting from the use of this material.  Product names mentioned herein are for identification purposes only and may be trademarks and or registered trademarks of their respective companies.  © Datalogic S.p.A. 2004-2006
 iii  CONTENTS   DATALOGIC END USER LICENSE AGREEMENT..................................... v REFERENCES ........................................................................................... vii Conventions.................................................................................................vii Reference Documentation ...........................................................................vii Services and Support...................................................................................vii SAFETY REGULATIONS.......................................................................... viii General Safety Rules.................................................................................. viii Laser Safety..................................................................................................ix Radio Compliance....................................................................................... xiii Information for the User .............................................................................. xiii FCC COmpliance........................................................................................xiv WEEE Compliance .....................................................................................xiv GENERAL VIEW ........................................................................................ xv 1 INTRODUCTION .......................................................................................... 1 1.1 Kyman-NET™ Description............................................................................ 1 1.2 Available Models........................................................................................... 2 1.3 Package Contents......................................................................................... 2 1.3.1 Using the Belt Clip ........................................................................................ 3 1.4 Accessories................................................................................................... 5 2 CONNECTIONS ........................................................................................... 6 2.1 Connection to the Host Computer................................................................. 6 2.1.1 RS232/USB Direct Connection ..................................................................... 6 2.1.2 WLAN Connection ........................................................................................ 7 2.1.3 WPAN Connections ...................................................................................... 8 2.1.4 WWAN Connections ..................................................................................... 9 2.2 Connection Cables...................................................................................... 12 3 USE AND FUNCTIONING.......................................................................... 14 3.1 Startup ........................................................................................................ 14 3.2 Using the Stylus.......................................................................................... 15 3.3 Data Capture............................................................................................... 16 3.3.1 Laser Data Capture..................................................................................... 16 3.3.2 Imager Data Capture .................................................................................. 17 3.3.3 RFID Data Capture ..................................................................................... 18 3.4 Description of the Keys ............................................................................... 19 3.4.1 Alphanumeric Keyboard (53-key Model)..................................................... 19 3.4.2 Numeric Keyboard (36-key Model) ............................................................. 22
 iv   3.5 Status Indicators ......................................................................................... 25 3.5.1 LED Status.................................................................................................. 25 3.5.2 Status Bar ................................................................................................... 26 3.6 Data Capture Configuration ........................................................................ 27 3.6.1 Configure .................................................................................................... 27 3.6.2 Capture ....................................................................................................... 31 3.7 Control Panel .............................................................................................. 32 3.7.1 Buttons........................................................................................................ 33 3.7.2 Registry....................................................................................................... 33 3.7.3 Files Admin ................................................................................................. 34 3.7.4 Wireless Communications........................................................................... 36 3.7.5 Volume Settings.......................................................................................... 37 3.8 Windows Connections ................................................................................ 40 3.8.1 Microsoft® ActiveSync® ............................................................................. 40 3.8.2 Bluetooth® Manager Device Setup............................................................. 42 3.9 Backup Directory File Management ............................................................ 45 4 MAINTENANCE ......................................................................................... 46 4.1 Charging the Battery Pack .......................................................................... 46 4.2 Replacing the Battery Pack......................................................................... 47 4.3 Compact Flash and Secure Storage Cards................................................. 49 4.4 Cleaning the Mobile Computer.................................................................... 49 5 TECHNICAL FEATURES........................................................................... 50 5.1 Technical Data ............................................................................................ 50 5.2 Reading Diagrams ...................................................................................... 54 6 TEST CODES............................................................................................. 56 GLOSSARY................................................................................................ 59 INDEX......................................................................................................... 61
 v  DATALOGIC END USER LICENSE AGREEMENT   BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR BY USING DATALOGIC EQUIPMENT THAT INCLUDES THIS SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, THEN DO NOT DOWNLOAD, INSTALL, USE THE SOFTWARE NOR DATALOGIC EQUIPMENT.  The following terms and conditions govern your use of the Software except to the extent that a particular program (a) is the subject of a separate written agreement with Datalogic or (b) includes a separate “click-on” license agreement as part of the installation and/or download process. Should a conflict arise between the provisions of the foregoing documents, the order of precedence shall be (1) the written agreement, (2) the click-on agreement, and (3) this agreement (“Agreement”).  1. License. Subject to the terms and conditions of and except as otherwise provided in this Agreement, Datalogic S.p.A. (“Datalogic”) and its suppliers grant to Customer (“Customer”) a nonexclusive and nontransferable license to use the specific program modules, feature set(s) or feature(s) in object code form only as well as associated media, printed materials and “online” or electronic documentation (the “Software”) for which Customer has paid, if required, the license fees. The Software is licensed not sold. The license shall be subject to each of the following limitations: •  Unless otherwise expressly provided in the documentation, Customer shall use the Software solely as embedded in, for execution on, or (where the applicable documentation permits installation on non-Datalogic equipment) for communication with Datalogic equipment owned or leased by Customer; •  Customer’s use of the Software shall be limited to use on a single hardware chassis, on a single central processing unit, as applicable, or use on such greater number of chassis or central processing units as Customer may have paid Datalogic the required license fee; and •  Customer’s use of the Software shall also be limited, as applicable and set forth in Customer’s purchase order or in Datalogic’s product catalog, user documentation, or web site, to a maximum number of (a) seats (i.e. users with access to the installed Software), (b) concurrent users, sessions, ports, and/or issued and outstanding IP addresses, and/or (c) central processing unit cycles or instructions per second. Customer’s use of the Software shall also be limited by any other restrictions set forth in Customer’s purchase order or in Datalogic’s product catalog, user documentation or web site for the Software.  2. General Limitations. Except as otherwise expressly provided under this Agreement, Customer shall have no right, and Customer specifically agrees not to (i) transfer, assign or sublicense its license rights to any other person, or use the Software on unauthorized or secondhand Datalogic equipment, and any such attempted transfer, assignment or sublicense shall be void; (ii) correct errors to or otherwise modify or adapt the Software or create derivative works based upon the Software, or to permit third parties to do the same; or (iii) decompile, decrypt, reverse engineer, disassemble or otherwise reduce the Software to human-readable form to gain access to trade secrets or confidential information in the Software. To the extent required by law, at Customer's request, Datalogic shall provide Customer with the interface information needed to achieve interoperability between the Software and another independently created program, upon payment of Datalogic's applicable fee. Customer shall observe strict obligations of confidentiality with respect to such information.  3. Upgrades and Additional Copies. For purposes of this Agreement, “Software” shall include (and the terms and conditions of this Agreement shall apply to) any upgrades, updates, bug fixes or modified versions (collectively, “Upgrades”) or backup copies of the Software licensed or provided to Customer by Datalogic or an authorized distributor for which Customer has paid the applicable license fees. Notwithstanding any other provision of this Agreement: (1) customer has no license or right to use any such additional copies or upgrades unless customer, at the time of acquiring such copy or upgrade, already holds a valid license to the original Software and has paid the applicable fee for the upgrade, if required; (2) use of upgrades is limited to Datalogic equipment for which customer is the original end user, purchaser or lessee or who otherwise holds a valid license to use the Software which is being upgraded; and (3) use of additional copies is limited to backup purposes only.  4. Proprietary Notices. Customer agrees to maintain and reproduce all copyright and other proprietary notices on all copies, in any form, of the Software in the same form and manner that such copyright and other proprietary notices are included on the Software. Except as expressly authorized in this Agreement, Customer shall not make any copies or duplicates or any Software without the prior written permission of Datalogic. Customer may make such backup copies of the Software as may be necessary for Customer’s lawful use, provided Customer affixes to such copies all copyright, confidentiality, and proprietary notices that appear on the original.  5. Protection of Information. Customer agrees that aspects of the Software and associated documentation, including the specific design and structure of individual programs, constitute trade secrets and/or copyrighted material of Datalogic. Customer shall not disclose, provide, or otherwise make available such trade secrets or copyrighted material in any form to any third party without the prior written consent of Datalogic. Customer shall implement reasonable security measures to protect such trade secrets and copyrighted material. Software and documentation shall remain solely property of Datalogic.
 vi   6. Limited Warranty. If Customer obtained the Software directly from Datalogic, then Datalogic warrants that during the Warranty Period (as defined below): (i) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (ii) the Software will substantially conform to its published specifications. The “Warranty Period” means a period beginning on the date of Customer’s receipt of the Software and ending on the later of (a) ninety (90) days from the date of initial shipment of the Software by Datalogic, or (b) the end of the minimum period required by the law of the applicable jurisdiction. The limited warranties extend only to Customer as the original licensee. Customer's sole and exclusive remedy and the entire liability of Datalogic and its suppliers under these limited warranties will be, at Datalogic’s sole option, repair or replacement of the Software if reported (or, upon request, returned) to Datalogic. Except as expressly granted in this Agreement, the Software is provided AS IS and with all faults. Datalogic does not warrant that the Software is error free or that Customer will be able to operate the Software without problems or interruptions. In addition, due to the continual development of new techniques for intruding upon and attacking networks, Datalogic does not warrant that the Software or any equipment, system or network on which the Software is used will be free of vulnerability to intrusion or attack. This warranty does not apply if the Software (a) is licensed for beta, evaluation, testing or demonstration purposes for which Datalogic does not receive a license fee, (b) has been altered, except by Datalogic, (c) has not been installed, operated, repaired, or maintained in accordance with instructions supplied by Datalogic, (d) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident, or (e) is used in ultra hazardous activities. If Customer obtained the Software from a Datalogic reseller, the terms of any warranty shall be as provided by such distributor, and Datalogic provides Customer no warranty with respect to such Software. The Software may contain support for programs written in Java. Java technology is not fault tolerant and is not designed, manufactured, or intended for use or resale as online control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines, or weapons systems, in which the failure of Java technology could lead directly to death, personal injury, or severe physical or environmental damage. Microsoft Inc. has contractually obligated Datalogic to make this disclaimer.  7. Disclaimer of Warranties. Except as specified in this warranty, all expressed or implied conditions, representations, and warranties including, without limitation, any implied warranty or condition of merchantability, fitness for a particular purpose, non-infringement, satisfactory quality or arising from a course of dealing, usage, or trade practice, are hereby excluded to the extent allowed by applicable law. To the extent that an implied warranty cannot be excluded, such warranty is limited in duration to the warranty period.  8. Disclaimer of Liabilities. In no event will Datalogic or its suppliers be liable for any lost revenue, profit, or data, or for special, indirect, consequential, incidental, or punitive damages however caused and arising out of the use of or inability to use the Software even if Datalogic has been advised of the possibility of such damages. In no event shall Datalogic or its suppliers' liability to customer, whether in contract, tort (including negligence), or otherwise, exceed the price paid by customer. The foregoing limitations shall apply even if the above-stated warranty fails of its essential purpose.  9. Term and Termination. This Agreement is effective until terminated. Customer may terminate this Agreement at any time by destroying all copies of Software including any documentation. Customer’s license rights under this Agreement will terminate immediately without notice from Datalogic if Customer fails to comply with any provision of this Agreement.  Upon termination, Customer must destroy all copies of Software in its possession or control.  10. Customer Records. Customer grants to Datalogic and its independent accountants the right to examine Customer’s books, records and accounts during Customer’s normal business hours to verify compliance with this Agreement. In the event such audit discloses non-compliance with this Agreement, Customer shall promptly pay to Datalogic the appropriate license fees.  11. General Provisions. This Agreement shall be governed by and construed in accordance with the laws of Italy. All disputes arising out of or in connection with this Agreement will be subject to the exclusive jurisdiction of the competent Court of the place where Datalogic has its registered office. If any portion hereof is found to be void or unenforceable, the remaining provisions of this Agreement shall remain in full force and effect. Except as expressly provided herein, this Agreement constitutes the entire agreement between the parties with respect to the license of the Software and supercedes any conflicting or additional terms contained in the purchase order.
 vii  REFERENCES   CONVENTIONS  This manual uses the following conventions:  “User” refers to anyone using a Kyman-NET™ mobile computer. “Mobile computer” and "Kyman-NET™" refer to Kyman-NET™ mobile computer. “You” refers to the System Administrator or Technical Support person using this manual to install, configure, operate, maintain or troubleshoot a Kyman-NET™ mobile computer.   REFERENCE DOCUMENTATION  For further information regarding Kyman-NET™ refer to the SDK Help on-Line.   SERVICES AND SUPPORT  Datalogic provides several services as well as technical support through its website. Log on to www.datalogic.com and click on the links indicated for further information including: -  PRODUCTS Search through the links to arrive at your product page where you can download specific Manuals and Software & Utilities -  SERVICES & SUPPORT - Datalogic Services Warranty Extensions and Maintenance Agreements - Authorised Repair Centres -  CONTACT US E-mail form and listing of Datalogic Subsidiaries
 viii   SAFETY REGULATIONS    NOTE Read this manual carefully before performing any type of connection to the Kyman-NET™ mobile computer. The user is responsible for any damages caused by incorrect use of the equipment or by inobservance of the indication supplied in this manual.   GENERAL SAFETY RULES  −  Use only the components supplied by the manufacturer for the specific Kyman-NET™ being used. −  Do not attempt to disassemble the Kyman-NET™ mobile computer, as it does not contain parts that can be repaired by the user. Any tampering will invalidate the warranty. −  When replacing the battery pack or at the end of the operative life of the Kyman-NET™ mobile computer, disposal must be performed in compliance with the laws in force. −  Do not submerge the Kyman-NET™ in liquid products. −  For GSM models, when using the device for telephone calls, it is advised to use a headset. −  Avoid significant and rapid temperature variations, which can produce condensation inside the Kyman-NET™ and reduce its performance.
 ix  LASER SAFETY  The laser light is visible to the human eye and is emitted from the window indicated in the figure. This information applies to both laser models and the Kyman-NET™ Imager Aiming System.        I D F E La luce laser è visibile all'occhio umano e viene emessa dalla finestra indicata nella figura. Die Laserstrahlung ist für das menschliche Auge sichtbar und wird am Strahlaustrittsfenster ausgesendet (siehe Bild).Le rayon laser est visible à l'oeil nu et il est émis par la fenêtre désignée sur l'illustration dans la figure. La luz láser es visible al ojo humano y es emitida por la ventana indicada en la figura. LUCE LASER NON FISSARE IL FASCIO APPARECCHIO LASER DI CLASSE 2  MINIMA POTENZA DI USCITA: LUNGHEZZA D'ONDA EMESSA: CONFORME A EN 60825-1 (2001) LASERSTRAHLUNG NICHT IN DER STRAHL BLINKEN PRODUKT DER LASERKLASSE 2 MAXIMALE AUSGANGLEISTUNG: WELLENLÄNGE: ENTSPR. EN 60825-1 (2001) RAYON LASER EVITER DE REGARDER LE RAYON  APPAREIL LASER DE CLASSE 2 PUISSANCE DE SORTIE: LONGUER D'ONDE EMISE: CONFORME A EN 60825-1 (2001) RAYO LÁSER NO MIRAR FIJO EL RAYO APARATO LÁSER DE CLASE 2 MÁXIMA POTENCIA DE SALIDA: LONGITUD DE ONDA EMITIDA: CONFORME A EN 60825-1 (2001)      LASER LIGHT - DO NOT STARE INTO BEAM CLASS 2 LASER PRODUCT MAX. OUTPUT RADIATION 1.4 mW EMITTED WAVELENGTH 630~680 nm EN60825-1:2001 This product complies with21 CFR Subchapter JAVOID EXPOSURELASER LIGHT IS EMITTED FROMTHIS APERTURE CAUTION-CLASS 2 LASER LIGHT WHEN OPEN - DO NOT STARE INTO BEAM   Laser output window
 x   ENGLISH The following information is provided to comply with the rules imposed by international authorities and refers to the correct use of your mobile computer. STANDARD LASER SAFETY REGULATIONS This product conforms to the applicable requirements of both CDRH 21 CFR 1040 and EN 60825-1 at the date of manufacture. For installation, use and maintenance, it is not necessary to open the device.   CAUTION Use of controls or adjustments or performance of procedures other than those specified herein may result in exposure to hazardous visible laser light.  The product utilizes a low-power laser diode. Although staring directly at the laser beam momentarily causes no known biological damage, avoid staring at the beam as one would with any very strong light source, such as the sun. Avoid that the laser beam hits the eye of an observer, even through reflective surfaces such as mirrors, etc.   ITALIANO Le seguenti informazioni vengono fornite dietro direttive delle autorità internazionali e si riferiscono all’uso corretto del terminale. NORMATIVE STANDARD PER LA SICUREZZA LASER Questo prodotto risulta conforme alle normative vigenti sulla sicurezza laser alla data di produzione: CDRH 21 CFR 1040 e EN 60825-1. Non si rende mai necessario aprire l’apparecchio per motivi di installazione, utilizzo o manutenzione.   ATTENZIONEL'utilizzo di procedure o regolazioni differenti da quelle descritte nella documentazione può provocare un'esposizione pericolosa a luce laser visibile.  Il prodotto utilizza un diodo laser a bassa potenza. Sebbene non siano noti danni riportati dall’occhio umano in seguito ad una esposizione di breve durata, evitare di fissare il raggio laser così come si eviterebbe qualsiasi altra sorgente di luminosità intensa, ad esempio il sole. Evitare inoltre di dirigere il raggio laser negli occhi di un osservatore, anche attraverso superfici riflettenti come gli specchi.
 xi  DEUTSCH Die folgenden Informationen stimmen mit den Sicherheitshinweisen überein, die von internationalen Behörden auferlegt wurden, und sie beziehen sich auf den korrekten Gebrauch vom Terminal. NORM FÜR DIE LASERSICHERHEIT Dies Produkt entspricht am Tag der Herstellung den gültigen EN 60825-1 und CDRH 21 CFR 1040 Normen für die Lasersicherheit. Es ist nicht notwendig, das Gerät wegen Betrieb oder Installations-, und Wartungs-arbeiten zu öffnen.   ACHTUNG Jegliche Änderungen am Gerät sowie Vorgehensweisen, die nicht in dieser Betriebsanleitung beschrieben werden, können ein gefährliches Laserlicht verursachen.  Der Produkt benutzt eine Laserdiode. Obwohl zur Zeit keine Augenschäden von kurzen Einstrahlungen bekannt sind, sollten Sie es vermeiden für längere Zeit in den Laserstrahl zu schauen, genauso wenig wie in starke Lichtquellen (z.B. die Sonne). Vermeiden Sie es, den Laserstrahl weder gegen die Augen eines Beobachters, noch gegen reflektierende Oberflächen zu richten.   FRANÇAIS Les informations suivantes sont fournies selon les règles fixées par les autorités internationales et se refèrent à une correcte utilisation du terminal. NORMES DE SECURITE LASER Ce produit est conforme aux normes de sécurité laser en vigueur à sa date de fabrication: CDRH 21 CFR 1040 et EN 60825-1. Il n’est pas nécessaire d’ouvrir l’appareil pour l’installation, l’utilisation ou l’entretien.   ATTENTION L'utilisation de procédures ou réglages différents de ceux donnés ici peut entrainer une dangereuse exposition à lumière laser visible.  Le produit utilise une diode laser. Aucun dommage aux yeux humains n’a été constaté à la suite d’une exposition au rayon laser. Eviter de regarder fixement le rayon, comme toute autre source lumineuse intense telle que le soleil. Eviter aussi de diriger le rayon vers les yeux d’un observateur, même à travers des surfaces réfléchissantes (miroirs, par exemple).
 xii   ESPAÑOL Las informaciones siguientes son presentadas en conformidad con las disposiciones de las autoridades internacionales y se refieren al uso correcto del terminal. NORMATIVAS ESTÁNDAR PARA LA SEGURIDAD LÁSER  Este aparato resulta conforme a las normativas vigentes de seguridad láser a la fecha de producción: CDRH 21 CFR 1040 y EN 60825-1. No es necesario abrir el aparato para la instalación, la utilización o la manutención.   ATENCIÓN La utilización de procedimientos o regulaciones diferentes de aquellas describidas en la documentción puede causar una exposición peligrosa a la luz láser visible.  El aparato utiliza un diodo láser a baja potencia. No son notorios daños a los ojos humanos a consecuencia de una exposición de corta duración. Eviten de mirar fijo el rayo láser así como evitarían cualquiera otra fuente de luminosidad intensa, por ejemplo el sol. Además, eviten de dirigir el rayo láser hacia los ojos de un observador, también a través de superficies reflectantes como los espejos.   LED Illuminator  The use of an illuminator in the Kyman-NET™ Imager is a Class 1 LED product:   ILLUMINATORE LED CLASSE 1 AUSLEUCHTER LED KLASSE 1 ILLUMINATEUR A LED DE CLASSE 1 ILUMINADOR LED DE CLASE 1
 xiii  RADIO COMPLIANCE  In radio systems configured with mobile computers and access points, the frequencies to be used must be allowed by the spectrum authorities of the specific country in which the installation takes place. Be absolutely sure that the system frequencies are correctly set to be compliant with the spectrum requirements of the country.  The Radio modules used in this product automatically adapt to the frequencies set by the system and do not require any parameter settings.  The following shows the correspondence between the Kyman-NET™ models and the Radio modules:   Kyman-NET™ 5XX-XXX 802.11b (Wi-Fi) radio card   Kyman-NET™ X1X-XXX GSM/GPRS Tri-band (900, 1800, 1900 MHz) module   Kyman-NET™ 51X-XXX 802.11b (Wi-Fi) radio card + GSM/GPRS Tri-band (900, 1800, 1900 MHz) module   INFORMATION FOR THE USER  ENGLISH Contact the competent authority responsible for the management of radio frequency devices of your country to verify the eventual necessity of a user license. Refer to the web site http://europa.eu.int/comm/enterprise/rtte/spectr.htm for further information.  ITALIANO Prendi contatto con l'autorità competente per la gestione degli apparati a radio frequenza del tuo paese, per verificarne l'eventuale necessità della licenza d'uso. Inoltre puoi trovare ulteriori informazioni al sito: http://europa.eu.int/comm/enterprise/rtte/spectr.htm.  FRANÇAIS Contactez l'autorité compétente en la gestion des appareils à radio fréquence de votre pays pour vérifier la nécessité du permis d'usage. Pour tout renseignement vous pouvez vous adresser au site web: http://europa.eu.int/comm/enterprise/rtte/spectr.htm.  DEUTSCH Um die Notwendigkeit der Verwendungslizenz zu prüfen, wenden Sie sich an die Behörde, die auf der Radiofrequenzgerätsführung Ihres Lands bewandert ist. Weitere Informationen sind verfügbar auf dem Web Site: http://europa.eu.int/comm/enterprise/rtte/spectr.htm.
 xiv   ESPAÑOL Contacta con la autoridad competente para la gestión de los dispositivos de radio frecuencia de tu país, para verificar si es necesario la licencia de uso. Además se puede encontrar mas información en el sitio web: http://europa.eu.int/comm/enterprise/rtte/spectr.htm.       FCC COMPLIANCE  This device must be opened by qualified personnel only.  Modifications or changes to this equipment without the expressed written approval of Datalogic could void the authority to use the equipment.  This device complies with PART 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference which may cause undesired operation.  All Wi-Fi models contain FCC ID H9PLA4137.  ALL GSM/GPRS models contain FCC ID QIPMC55.    WEEE COMPLIANCE
 xv  GENERAL VIEW             A) Backlit display B)  User programmable LED C) Speaker D)  Good read LED E)  Charging status and battery low warning LED F) Scan key G) Keyboard H) Microphone I)  Laser safety label J) Product label K)  Adjustable elastic strap with stylus holders L) Battery pack         M)  Data capture/Laser Output window N) Communication/Charger/Headset connector IJKLB  D A C  EFGH M N
 xvi
INTRODUCTION 1  1 1 INTRODUCTION   1.1 KYMAN-NET™ DESCRIPTION   The Datalogic Kyman-NET™ rugged mobile computer is one of the key elements of Datalogic’s mobile@work™ product family for logistic solutions.  Kyman-NET™, thanks to the lightest weight of its category combined with one of the best ergonomics ever seen on the market, reduces the operators fatigue with no compromises in terms of reliability and robustness. Its sturdy outer casing with overmold protection has been designed to resist harsh environments, multiple drops, strong shocks, repetitive tumbles as well as sub-zero temperatures.  Datalogic’s Kyman-NET™ key features include fully integrated automatic data capture (1D bar code, 1D bar code & RFID HF-ISO tags, 1D & 2D bar codes & images), allowing codes to be read from near contact to several meters distance and simultaneous wireless communication capabilities (Bluetooth®, Wi-Fi, GSM/GPRS).  Kyman-NET™ system architecture is based on the “de-facto standard” combination of Intel X-Scale series processors coupled with the Windows CE operating system and it is ready to satisfy the most demanding customer needs (i.e. allowing to expand its memory thanks to a Secure Digital standard slot).  Kyman-NET™ provides 2 intuitive keyboard layouts, numeric/alphanumeric with backlight, able to fulfill 100% traditional text based applications (i.e. terminal emulation, through the DL-TCL-NET™ software client) as well as the most modern Web-based solutions (i.e. exploiting the Microsoft Internet Explorer through the DL Locked Web Browser™ application). Kyman-NET™ provides mobile professionals with the most relevant features needed to operate in demanding environments: reliability, ruggedness, drop resistance, long lasting batteries, flexible communication and efficient data capture.
KYMAN-NET™ 2   1 1.2 AVAILABLE MODELS  The brand new Kyman-NET™ is available in different models depending on the options it is equipped with. All options are listed below: •  data capture options: laser, imager, RfId, laser + RfId, laser extra-long range •  communication options: Wi-Fi 802.11b, GSM/GPRS, Bluetooth® •  data entry options: alphanumeric keyboard, numeric keyboard  For further details about the Kyman-NET™ models refer to the web site: http://www.datalogic.com.   1.3 PACKAGE CONTENTS  The Kyman-NET™ package contains: −  1 Kyman-NET™ mobile computer −  1 CD-ROM Datalogic-NET SDK (Windows CE.NET SDK for Datalogic mobile computers) −  2 styluses −  1 user’s manual −  1 rechargeable battery pack −  1 adjustable elastic strap with stylus holder −  1 belt clip −  1 belt clip pivot  Any other packages will contain the accessories necessary for the Kyman-NET™ connection to the host computer and to the network: the cradle, power supply, and one or more connection cables.  Remove all the components from their packaging; check their integrity and congruity with the packing documents.   CAUTION Keep the original packaging for use when sending products to the technical assistance center. Damage caused by improper packaging is not covered under the warranty.
INTRODUCTION 3  1  NOTE Rechargeable battery packs are not initially charged. Therefore the first operation to perform is to charge them. See paragraph 4.1.   1.3.1  Using the Belt Clip  To use the belt clip, proceed as follows:  1.  Remove the elastic strap and unscrew the strap pivot.     2.  Release the belt clip pivot by pressing the belt clip unlock button.
KYMAN-NET™ 4   1 3.  Screw the belt clip pivot on the terminal by using the fixing screw.          4.  Insert the terminal in the belt clip by sliding the belt clip pivot into the belt clip until it clicks into place.     5.  To release the terminal, press the belt clip unlock button.
INTRODUCTION 5  1 1.4 ACCESSORIES    Cradles 94A151101 Kyman-NET™ Single Cradle Desk (includes slot for spare battery pack recharge; RS232 and USB communications) 94A151107 Kyman-NET™ Vehicle Cradle    Charger 94A151102 Kyman-NET™ Multi-Battery Pack Charger (4 slots)    Batteries 94ACC1302 Kyman-NET™ Standard Battery Pack (Li-Ion battery pack 2200 mAh@7.4 V)    Power Supply 94ACC4595 FPS18 Power Supply without cord for Kyman-NET™ Single Cradle Desk, for Kyman-NET™ Multi-Battery Charger and for WIN-NET Serial/USB PWR Cables 94ACC1150 Power cord EU 3-pin    Cables 94A051008 WIN-NET SERIAL CABLE (HRS 3500-16P-CV) cable for RS232 direct connection between the mobile computer and the PC 94A051009 WIN-NET USB CABLE (HRS 3500-16P-CV) cable for USB direct connection between the mobile computer and the PC 94A051014 WIN-NET SERIAL PWR CABLE (HRS 3500-16P-CV) cable for RS232 and power connections 94A051015 WIN-NET USB PWR CABLE (HRS 3500-16P-CV) cable for USB and power connections 94A051012 WIN-NET VEHICLE PWR CAB (HRS 3500-16P-CV) cable for car/truck cigarette lighter power adapter    Various 94ACC1304 Kyman-NET™ Belt Holster 94ACC1303 Kyman-NET™ Functional Case 94ACC1301 Stylus Pen (20 pcs) 94ACC1300 JET™ & Kyman-NET™ Backstrap Kit (1+1 pcs)
KYMAN-NET™ 6   2 2 CONNECTIONS   2.1  CONNECTION TO THE HOST COMPUTER   2.1.1  RS232/USB Direct Connection  You can use a cable to connect the Kyman-NET™ to a host computer to transfer data.    Key: A  Host computer  C  RS232 cable or USB cable B Kyman-NET™       Key: A  Host computer  C  RS232 cable or USB cable B Kyman-NET™  D Power Supply*  * Recommended Power Supply: FPS18 AC/DC Power Supply (94ACC4595).   CAUTION USB communication may not be completely guaranteed while batteries are simultaneously in charge. Avoid the power supply connection when the USB link is active.
CONNECTIONS 7  2 2.1.2 WLAN Connection  Kyman-NET™ Wi-Fi models can communicate with the host using the on-board radio frequency module and an Access Point connected to the host computer.      Key: A) Kyman-NET™ B) Access point    NOTE In order to avoid wasting power, the Wi-Fi module is off by default. If you need to have the Wi-Fi module working, the module must be powered on using the Wireless Communications applet (see par. 3.7.4). To start configuring your WLAN connection, tap the Wi-Fi icon at the bottom of the screen.
KYMAN-NET™ 8   2 2.1.3 WPAN Connections  Kyman-NET™ mobile computers can communicate with a Bluetooth® device, such as a printer, within a range of 10 m, using the on-board Bluetooth® module.      Key: A) Kyman-NET™ B) Bluetooth® printer    NOTE In order to avoid wasting power, the Bluetooth® module is off by default. If you need to have Bluetooth® working, the module must be powered on using the Wireless Communications applet (see par. 3.7.4), and perform the Discovery procedure (see par. 3.8.2).  BA
CONNECTIONS 9  2 2.1.4 WWAN Connections  Kyman-NET™ GSM/GPRS models enhance your connectivity solutions giving you an opening to an international wireless infrastructure that is the standard in Europe and Asia.  GSM (Global System for Mobile communications), is a digital mobile phone system based on TDMA; it utilizes the 900, 1800 and 1900 MHz bands.  GPRS supports IP (Internet Protocol) and allows accessing Internet and Intranet services, such as sending and receiving e-mail or Web browsing.  In order to use a WWAN Connection you have to install a SIM Card (see instructions on the following page).   NOTE In order to avoid wasting power, the GSM/GPRS module is off by default. If you need to have GSM/GPRS working, the module must be powered on using the Wireless Communications applet (see par. 3.7.4.)
KYMAN-NET™ 10   2 Installing the SIM Card       To correctly insert the SIM Card, proceed as follows: 1-  Turn off the Kyman-NET™ mobile computer. 2-  Pull the battery latch down as indicated in the figure below and remove the battery pack.     SIM Protection Cover Battery Contacts
CONNECTIONS 11  2 3-  Open the Sim Card slot by unscrewing the two protection cover screws (A, B).           4-  Position the SIM Card with its contacts downwards, place the protection cover on the slot and close it with the two fixing screws.   Removing the SIM Card  To remove the SIM card, follow the steps above to access the SIM area, and remove it from its slot. SIM Card Slot A  B
KYMAN-NET™ 12   2 2.2 CONNECTION CABLES  The following cables are listed with their order number.    RS232 Direct Connection: 94A051008 WIN-NET SERIAL CABLE (HRS 3500-16P-CV)  RXTX 510 13 36 2RTS11 DSR5 8DTRGND9  4Kyman-NET™ side 16-pin 716CTS8 HOST/PC side 9-pin (female)7       USB Direct Connection:  94A051009 WIN-NET USB CABLE (HRS 3500-16P-CV)  Kyman-NET™ side 16-pin  HOST/PC side 9-pin (female)41D-  32D+ V+ GND15 16 13 14
CONNECTIONS 13  2   RS232 Direct Connection: 94A051014 WIN-NET SERIAL PWR CABLE (HRS 3500-16P-CV)  RXTX 36 25 1CTSKyman-NET™ side 16-pin  HOST/PC side 9-pin (female) 687 8 9 10 51 2 3 4 13 TX RXRTS CDDSR DSRDTR CTSGNDVALIMGNDGNDGND POWER CONNECTOR      USB Direct Connection: 94A051015 WIN-NET USB PWR CABLE (HRS 3500-16P-CV)  HOUSING1D(+) 23D(-)V+ SHIELD 16 15 HOUSING 14 4 13 3 2 1 4POWERGNDVALIM      Power Supply Polarity: GNDVEXT
KYMAN-NET™ 14   3 3  USE AND FUNCTIONING   The use of the Kyman-NET™ depends on the application software loaded. However there are several parameters that can be set and utilities that can be used to perform some basic functions such as data capture, communications, file management, etc.   3.1 STARTUP  The Kyman-NET™ turns on when the battery pack or the external supply is inserted.  After the battery pack is installed, use the [ON/OFF] key to turn the mobile computer on and off.  As soon as the mobile computer is on, the Windows CE .NET desktop configuration will appear on the screen. Wait a few seconds before starting any activity so that the mobile computer completes its startup procedure.      Use the stylus as suggested in paragraph 3.2 to select icons and options.
USE AND FUNCTIONING 15  3 The mobile computer goes into power-off (low power with display and keyboard backlight off), when it is no longer used for more than a programmable timeout, which is defined in the POWER applet of the Control Panel. In this mode it can be awakened (resuming operation) by the [ON/OFF] key.   NOTE The mobile computer can also be awakened or turned off by the application program.   3.2  USING THE STYLUS  The stylus selects items and enters information. The stylus functions like a mouse.  Tap:  Touch the screen once with the stylus to open items and select options. Drag:  Hold the stylus on the screen and drag across the screen to select text and images. Drag in a list to select multiple items. Tap-and-hold: Tap and hold the stylus on an item to see a list of actions available for that item. On the pop-up menu that appears, tap the action you want to perform.  The stylus is factory aligned; however, it is possible to align the cursor on the screen with the tip of the stylus. Enter the STYLUS applet of the Control Panel and tap the center of each target that appears on the screen with the tip of the stylus.
KYMAN-NET™ 16   3 3.3 DATA CAPTURE  To configure and enable data capture parameters refer to par. 3.6.   3.3.1  Laser Data Capture  To scan barcodes, point the Kyman-NET™ laser model onto the code from a distance within the reading range while pressing the SCAN key. See the reading diagrams in par. 5.2 for the reading range of your model.  The lighted band emitted by the laser must completely intercept the barcode as shown in the figure below. If enabled, the emission of an acoustic signal will indicate that the scan has taken place correctly.
USE AND FUNCTIONING 17  3 3.3.2  Imager Data Capture  To read a 1D or 2D code, simply point the Kyman-NET™ Imager model onto the code from a distance within the reading range (See par. 5.1, section Kyman-NET™ Imager Optical Features) and press the SCAN key.     The Kyman-NET™ Imager uses an intelligent aiming system pattern similar to those on cameras, which indicates the field of view which should be positioned over the code:    Aiming System   If the aiming system pattern is centered over the entire symbology as shown in the following figure, either wait for the timeout or release the Scan key to capture the image.
KYMAN-NET™ 18   3 A red beam illuminates the code, which is captured and decoded. You will get a good read.  Linear barcode  2D Matrix symbol ÌBX3ÉÎ  Relative Size and Location of Aiming System Pattern  The field of view changes its size as you move the reader closer or farther away from the code. The field of view indicated by the aiming system pattern will be smaller when the Kyman-NET™ Imager is closer to the code and larger when it is farther from the code.  Symbologies with smaller bars or elements (mil size) should be read closer to the unit. Symbologies with larger bars or elements (mil size) should be read farther from the unit. (See par. 5.1 for further details).   3.3.3  RFID Data Capture  To read or write a tag, place the Kyman-NET™ so that the RFID emission window is in front of and almost in contact with the tag, then press the SCAN key or the application defined key.
USE AND FUNCTIONING 19  3 3.4  DESCRIPTION OF THE KEYS  The Kyman-NET™ provides two different keyboards, an alphanumeric keyboard and a numeric keyboard, having a total of respectively 53 and 36 keys.  3.4.1  Alphanumeric Keyboard (53-key Model)   The following image shows the Alhanumeric keyboard.
KYMAN-NET™ 20   3 Main Keys Function  KEY FUNCTION  It starts data capture.  They let you move forwards, backwards, upwards or downwards within text fields, scroll through a Menu list or browse among folder files.  After a yellow modifier key press, they let you scroll the pages up and down.  After a blue modifier key press, the blue arrows allow moving forwards or backwards within the Internet Explorer browser pages.  Yellow modifier: when pressed before a standard key, it enables the function printed in yellow above the key.  Blue modifier: when pressed before a standard key, it enables the function printed in blue above the key.  After a yellow modifier key press, subsequent key presses allow the selection of seldom used characters. The selected character is entered after a short timeout or if a different key is pressed.  It powers the Kyman-NET ON or OFF.  After a blue modifier key press, it allows returning to the Home page.  After a blue modifier key press, it allows ending a page downloading.  After a blue modifier key press, it performs a page refresh.
USE AND FUNCTIONING 21  3 Special Function Icons  ICON FUNCTION  After a yellow modifier key press, it opens the Start menu.  After a yellow modifier key press, it opens the file manager.  After a yellow modifier key press, it switches ON/OFF the keyboard backlight.  After a yellow modifier key press, it locks and unlocks the keyboard.    Hardware and Software Reset        By pressing these keys simultaneously, a system hardware reset is performed.      By pressing these keys simultaneously, a system software reset is performed.    CAUTION Before performing a hardware or software reset, it is recommended to: -  execute a system backup to keep persistent your more important files and applications. See par. 3.9; -  save the registry to non-volatile memory to guarantee the persistence of the Windows configuration. See par. 3.7.2.
KYMAN-NET™ 22   3 3.4.2  Numeric Keyboard (36-key Model)       Main Keys Function  KEY FUNCTION  It starts data capture.  They let you move forwards, backwards, upwards or downwards within text fields, scroll through a Menu list or browse among folder files.
USE AND FUNCTIONING 23  3  After a yellow modifier key press, they let you scroll the pages up and down.  After a blue modifier key press, the blue arrows allow moving forwards or backwards within the Internet Explorer browser pages.  Yellow modifier: when pressed before a standard key, it enables the function printed in yellow above the key.  Blue modifier: when pressed before a standard key, it enables the function printed in blue above the key.  When pressed, it toggles the alphanumeric/numeric modes.  It locks and unlocks the keyboard.  It opens the Start menu.  It powers the Kyman-NET™ ON or OFF.  After a blue modifier key press, it allows returning to the Home page.  After a blue modifier key press, it allows ending a page downloading.  After a blue modifier key press, it performs a page refresh.     NOTE Once the Alpha mode has been entered, press the Alpha key again to exit this mode.
KYMAN-NET™ 24   3  Keys from 1 to 9 share the following behavior scheme:    A.  Function of the key when directly pressed B.  Function of the key when in Alpha mode. When in Alpha mode press the key until the desired letter is shown. The letter is entered if you wait for a short timeout or if you press a different key.   Special Function Icons  ICON FUNCTION  It opens the file manager.  It switches ON/OFF the keyboard backlight.   Hardware and Software Reset         By pressing these keys simultaneously, a system hardware reset is performed.      By pressing these keys simultaneously, a system software reset is performed.   CAUTION Before performing a hardware or software reset, it is recommended to: -  execute a system backup to keep persistent your more important files and applications. See par. 3.9; -  save the registry to non-volatile memory to guarantee the persistence of the Windows configuration. See par. 3.7.2.  A C
USE AND FUNCTIONING 25  3 3.5 STATUS INDICATORS   3.5.1 LED Status  The Kyman-NET™ provides three different LEDs signaling the mobile computer status.  LED STATUS General Purpose (left-side) Green/Red  This LED is available to the application program. Charging Status and Battery Low Warning Green constant  It is constant once the charging process has been completed. (right side)  Red blinking  When the mobile computer is powered by the battery (not by the cradle nor by the cable), this LED blinks red to signal that the battery is running down.   Red constant  It is constant while charging.   Orange blinking  It blinks when a charging error has occurred, for example when a mobile computer  without battery is connected to the external power or inserted into a powered cradle. Good Read (middle) Green  It is constant for a configurable time to signal that a successful read has occurred.
KYMAN-NET™ 26   3 3.5.2 Status Bar  The Status Bar provides information about the time, the battery level, the keyboard function, and the decoding status.    ICONS DESCRIPTION Time and Battery Icons    It displays the time.      They are representative of five different icons indicating the battery level. The icon is partially green when the power left is >20% and partially red colored when the power left is <20%.  It indicates that the battery is charging. Keyboard Status Icons  The green segment over any of the following icons icon is lit   when the Capslock is active.  It indicates that the blue FUNC key has been pressed and is going to affect the next key press.  It indicates that the yellow FUNC key has been pressed and is going to affect the next key press.  It indicates that the keyboard is in ALPHA mode.  It indicates that the keyboard is in Normal mode.  It indicates that the keyboard is in ALPHA mode and that the Capslock is active.  It indicates that the keyboard is locked. Decoding Status Icons     It indicates that the decoder is active (green), not active (grey).
USE AND FUNCTIONING 27  3  3.6  DATA CAPTURE CONFIGURATION  From the Taskbar, tap the "Data Capture" icon to open a drop–down menu. Data Capture can also be accessed from the Control Panel.      By selecting the Info  item from this drop-down menu you can access information about the Scanner and the Software; the Configure item opens the configuration applet (Data Capture Configuration Window), while Capture accesses the data capture applet (Data Capture Window), which enables code reading. The last menu item (Wedge) enables Wedge Emulation.   3.6.1 Configure  The Configuration applet contains the barcode scanning configuration parameters in a directory tree structure. The available barcode parameters are divided into two groups: Reader Parameters and Scan Parameters.  The Reader Parameters depend on the type of scanner module installed on the mobile computer and allow barcode configuration (i.e. enable/disable Code 39, check digit control, etc.).  The Scan Parameters are common to all scanner modules and allow control of the scanning device (i.e. beeper control, LED control, laser timeout, etc.).  Each Data Capture screen window corresponds to a branch of the tree, and the name of the current branch is displayed at the bottom of each screen window.
KYMAN-NET™ 28   3  Data Capture Configuration Window  The screen format shows two columns where the left column indicates branches or parameters. Branches have three dots in the right column (...). You can navigate through the tree structure using the stylus or keyboard arrows directly on the item field or from the menu.  Parameters have their corresponding current values in the right column. You can edit parameter values using the stylus or keyboard arrows directly on the item field or from the menu. To change a value for example, select the line of the value to be changed, choose Edit from the Parameter Menu then choose a new value from the values listed in the box (see following figures).      Selecting Data Capture Setup Parameters  Alternatively using the stylus, you can tap once directly on the value on the right column; continue tapping until the desired value is reached.  To activate a new configuration select the File ->Save Menu to send the new configuration to the barcode decoding software and save the new configuration. This will save the configuration to non-volatile memory preventing loss at the next system reset.
USE AND FUNCTIONING 29  3 Reader Parameters  The barcode reading parameters and values are dependent upon the type of scanner module mounted in your mobile computer. For a detailed list of parameters and of their configuration procedures, please refer to the SDK Help file on the CD.   Scan Parameters  The Scan Parameters are common to all scanner modules and allow control of the scanning device. The Scan parameters are described as follows:  ScanTimeout: the maximum time, in milliseconds, during which the scanner remains on without decoding any barcode.  BeepType: if set to dual tone, the good read beep is a sequence of high and low pitch sounds. If set to monotone, the beep is a single pitch sound.  BeepDuration: the time interval, in milliseconds, during which the beeper will sound when the scanner reads a code. To disable the beeper, set this value to 0.  BeepFrequency: determines the frequency in Hertz of the beeper.  GoodReadSound: is the filename of a .wav file played when the scanner reads a code.  LedDuration: the length of the good-read led pulse, in milliseconds.  LedPulses: the number of times the good-read led pulse is emitted when the scanner reads a code.  LedKeypad: determines the keyboard backlight after each good read.  ContinuousMode: disables the effect of the ScanTimeout parameter.  KeyboardEmulation: if enabled all scanned data are transformed into keyboard events and can therefore be displayed and saved to a file as if input from the PDA keyboard. If set to “Yes (Clipboard)”, it copies the scanned data to the system clipboard.  SoftTrigger: when enabled, the laser can be turned on/off by the application software.  ScanAlwaysOn: enables the scanner for barcode reading independently from the application software. If set to “Disabled after read”, it disables the reading after a reading attempt. In case the scan button is accidentally pressed, this selection prevents the driver from decoding new data while the application is still elaborating previous data.  NotPrintableChar: if set to “Remove”, all not printable characters included in the scanned data are deleted and the final barcode will include only printable characters.
KYMAN-NET™ 30   3 Default Settings  The following tables contain the default values for the major barcode setup parameters, according to the type of scan engine mounted on the mobile computer. For a complete list of parameters and of their configuration procedures, please refer to the SDK Help file on the CD.  SCAN PARAMETERS Laser Models (XXX-1XX, XXX-4XX) Imager Models (XXX-7XX) Laser Extra Long Range Models (XXX-6XX) ScanTimeout 5000  Not available 5000 BeepType  Dual tone  Dual tone  Dual tone BeepDuration 20  20  20 BeepFrequency 2000  2000  2000 GoodReadSound Beep.wav  Beep.wav  Beep.wav LedDuration  200 mS  200 mS  200 mS LedPulses 1  1  1 LedKeypad Disabled Disabled Disabled ContinuousMode Disabled  Disabled  Disabled KeyboardEmulation Disabled  Disabled  Disabled SoftTrigger Enabled Enabled Enabled ScanAlwaysOn Disabled  Disabled  Disabled NotPrintableChar Leave  Leave  Leave  BARCODE SYMBOLOGY SPECIFIC READER PARAMETERS Laser Models (XXX-1XX, XXX-4XX) Imager Models (XXX-7XX) Laser Extra Long Range Models (XXX-6XX) UPC A  Enabled Enabled UPC E  Enabled Enabled EAN 8  Enabled Enabled EAN 13  Enabled * Enabled UPC E1    Disabled EAN Bookland    Disabled UPC/EAN/JAN   Enabled  Code 39  Enabled Enabled Enabled Code 39 Full ASCII  Disabled Disabled Disabled Code 32  Disabled   Disabled Code 39 Trioptic    Disabled 2/5: Interleaved  Enabled Enabled Enabled 2/5: Industrial  Disabled   Disabled 2/5: Matrix  Disabled    Code 128   Enabled Enabled Enabled EAN 128   Enabled Disabled Enabled ISBT 128    Disabled Codabar  Enabled Enabled Disabled RSS   Disabled
USE AND FUNCTIONING 31  3 *  In the Imager models these codes may only be enabled or disabled as a group by the UPC/EAN/JAN family selection (see a few lines below in the same table).   BARCODE SYMBOLOGY SPECIFIC READER PARAMETERS Laser Models(XXX-1XX, XXX-4XX) Imager Models (XXX-7XX) Laser Extra Long Range Models (XXX-6XX) MSI  Enabled   Disabled Plessey  Disabled    Code 93  Disabled Enabled Disabled Code 11  Disabled    PDF - 417   Enabled  Data Matrix   Enabled  QR   Enabled  POSTNET    PLANET    Japan Post    Australia Post    KIX Code    Royal Mail Code (RM4SCC)   Disabled*   *  These codes may be enabled individually but are disabled as a group.   3.6.2 Capture  The Data Capture applet (Capture) enables code reading.   Data Capture Window
KYMAN-NET™ 32   3 Data Capture can also be enabled through the Configuration applet by selecting File ->Scanner from the main menu, or by enabling the parameter Scan Always On in the Scan Parameters branch.   Enabling the Data Capture   3.7   CONTROL PANEL  From the Desktop, double tap on the "Control Panel" icon to open the Windows CE .NET control panel main window. The Control Panel can also be launched from Start ->Settings ->Control Panel.  APPLET programs are displayed as icons; one icon corresponds to each APPLET.   Control Panel
USE AND FUNCTIONING 33  3 3.7.1 Buttons  The BUTTONS Applet allows assigning desired applications to be launched by the Act button or one of the function keys (F1, F2, F3, F4).     3.7.2 Registry  The REGISTRY ADMIN applet provides management of Windows CE .NET registry.  Select the REGISTRY ADMIN applet by double tapping the Registry Admin icon.  The Registry Administration Main window appears. Two functions are available: -  Save Registry allows permanently saving the Windows configuration (example: custom configuration of screen desktop background color, or network adapter configuration) to non-volatile memory (SAVE button). -  Restore Default Registry allows restoring the initial factory default configuration (Restore Default button). After restoring the factory default configuration, you must perform a software reset. Saving the registry to non-volatile memory guarantees the persistence of the Windows configuration in case of battery pack replacement.   Registry Administration Window
KYMAN-NET™ 34   3 3.7.3 Files Admin  The FILES ADMIN applet enables control of the permanence of files in the System Folder. Two functions are available on the Files Admin Main window by means of two buttons:   Files Admin Main Window  Save Session: with this button all files will be permanently saved in the \Windows directory in non-volatile memory. This function guarantees the steady maintenance of every file produced during the current working session - even of sub-directories and relevant files - with the exception of the files belonging to the FLASH image. These current working session files will be backed-up in the \Backup\Windows directory. At the next hardware reset, the files previously saved in the \Backup\Windows directory will be restored to the Windows directory (see par. 3.9).  Safe Setup: with this button, the installation of software programs will be saved to non-volatile memory (Backup directory). Before doing this, it will be checked that the Backup directory has enough space to save the files. If the directory space is not enough, an error message will be shown and the program will exit the Safe Setup function.  Two activating procedures are available for Safe Setup:  -  Select an installation file (for example, a .CAB cabinet file) from the Safe Setup mask.
USE AND FUNCTIONING 35  3  Safe Setup First Mask  Then select \Windows or a relevant sub-directory in the path box. Then, Safe Setup will recognize the new files and directories present in the \Windows directory, and will copy them to the \Backup\Windows directory. At the next hardware reset, these files will be restored (see par. 3.9).  -  Simply skip the first mask either by closing it or by pressing the ESC key. When it closes, a new mask will pop up: it will enable any type of installation (even remote ones like ActiveSync® installations). Make sure the installation directory is \Windows or one of its sub-directories. After installation, tap OK: Safe Setup will save the new files in the \Backup\Windows directory.    Safe Setup Second Mask
KYMAN-NET™ 36   3 3.7.4 Wireless Communications  The WIRELESS COMMUNICATIONS applet provides management of the Wi-Fi Card and of the Bluetooth® and GSM/GPRS modules.    Select the WIRELESS COMMUNICATIONS applet by double tapping the Wireless Communications icon. The following window will appear:    Wireless Communications Window    NOTE In order to avoid wasting power, all modules are off by default.
USE AND FUNCTIONING 37  3 3.7.5 Volume Settings   The Volume Settings applet allows managing the audio features and appears as follows:   Volume Settings Window  The window is divided into three tabs: -  Output tab: allows setting the volume for each audio profile; -  Input tab: allows setting the microphone recording volume; -  Cradle tab: allows selecting the cradle type and managing the vehicle cradle headset functioning.  The Status bar always displays the current audio profile, which is activated automatically (by the device) or manually (by the user). Available profiles are: -  Speaker: it is the typical profile reproducing audio through the mobile computer speaker; -  Cradle: it is automatically activated as soon as the mobile computer is inserted into the vehicle cradle. Audio is reproduced by the vehicle cradle loudspeaker. -  Headset: it is automatically activated as soon as a headset is directly connected to the mobile computer. In case the device is inserted into the vehicle cradle and the headset is connected to the cradle, this profile must be manually activated through the dedicated button (refer to “Cradle Tab” paragraph). When this profile is active, the speaker does not work; -  GSM: it is automatically activated each time a phone-call is started. It is not available when using the cradle loudspeaker (in this case  Current Profile = Cradle).
KYMAN-NET™ 38   3 Output Tab  It allows setting the volume for each audio profile:  The “Master Volume” slider allows setting the volume used by all audio profiles. In addition, it is possible to attenuate the volume for each single profile through the dedicated slider.    Input Tab  It allows setting the microphone recording volume:  The “Record Gain” slider allows setting the recording volume, while the “Enable Preamplifier” check box enables/disables the preamplifier (this option is not selectable when Current Profile = Cradle or GSM).    Cradle Tab  It allows selecting the cradle type and managing the vehicle cradle headset functioning:
USE AND FUNCTIONING 39  3 Two radio buttons allow selecting the type of cradle to be used.  Check the “Cradle desk, AC plug or none” radio button, if using a cradle different from the vehicle cradle or an AC adapter plug.  If using a vehicle cradle, check the related radio button.    NOTE By inserting the mobile computer into the cradle when the “Cradle vehicle” radio button is checked, the mobile computer speaker is deactivated and audio will be reproduced through the vehicle cradle speaker or headset.   By selecting the “Cradle Vehicle” check box, a further button will appear allowing to enable the headset profile when using the vehicle cradle. If pressed, the button displays the headset icon in gray until the device is inserted into the vehicle cradle. Once inserted, the headset icon turns to green and the device activates the headset profile (refer to the following figures). Actually, the headset is ready to reproduce audio as soon as it is connected to the cradle jack:        WARNING Do not use the vehicle cradle headset if the headset button is disabled, since it may cause hearing damage.
KYMAN-NET™ 40   3 3.8 WINDOWS CONNECTIONS  From the Desktop, double tap on the "Connections" folder to open the following window:   Windows Connections   3.8.1 Microsoft® ActiveSync®  Microsoft® ActiveSync® gives you the possibility to connect your desktop computer to your Kyman-NET™ and synchronize the information on them. Synchronization compares the data on the Kyman-NET™ with that on the desktop computer and updates both computers with the most recent information.  With ActiveSync®, it is possible to: - Back up and restore Kyman-NET™ data. - Copy files between Kyman-NET™ and desktop computer. - Synchronize files by selecting a synchronization mode.  It is possible to constantly synchronize while connected to a desktop computer or, alternatively, synchronization can be performed only when the synchronize command is chosen. You can select which information types are synchronized and control how much data is synchronized.   NOTE By default, ActiveSync® does not automatically synchronize all types of information. Use ActiveSync® options to turn synchronization on and off for specific information types.
USE AND FUNCTIONING 41  3 For example: Synchronize Microsoft Word and Microsoft Excel files between the Kyman-NET™ and the desktop computer. The files will automatically be converted to the correct format.  You can establish a connection by Serial cable, by USB cable or by network. Moreover, if you have a Kyman-NET™ Single Cradle Desk you can connect your Kyman-NET™ putting it into the cradle and using a standard A-B USB cable or a standard Serial null modem cable.   NOTE Visit the following Microsoft Web site for the latest in updates, technical information, and samples: http://www.microsoft.com/windowsmobile/resources/downloads   ActiveSync® Remote  After a Partnership between mobile computer and desktop computer is established, it is also possible to establish a remote connection via Wireless LAN: disconnect the actual connection via ActiveSync® by double tapping the ActiveSync® connection icon on the taskbar and press Disconnect, then go to the \Windows\Desktop\Connection folder and double tap the ActiveSync® remote icon. In the dialog box that will appear it will be possible to choose a method to connect to the desktop computer. Choose Network Connection and press the Connect button:   NOTE To set up your network connection you have to correctly set up your wireless connection. These settings depend on the wireless card that you have installed on your Kyman-NET™ and on your wireless network settings. For more information about these settings contact your network administrator.
KYMAN-NET™ 42   3 3.8.2  Bluetooth® Manager Device Setup  In order to enable a Bluetooth® device for communication with the Kyman-NET™ you must perform the discovery procedure and enable the device as follows: 1.  Place the Bluetooth® device within the range of the Kyman-NET™ (10 meters). 2.  From the “Connections” folder double tap on the “Bluetooth” applet to open the Bluetooth® Manager Device window:    3.  Tap on the “Me” button to enter the related window; then, tap on the “ON” button to activate the Bluetooth® module. The module activation may be also performed by using the WIRELESS COMMUNICATION applet as described in par. 3.7.4.    By tapping on the “HW Details” and “SW Details” buttons, information about the mobile computer Bluetooth® hardware and software will be displayed, while the
USE AND FUNCTIONING 43  3 “Enable Encryption” button starts encryption of the Bluetooth® communication data. If tapping on the “Close” button the Bluetooth® Manager Device window will be closed. 4.  Tap on the “Discovery” button to enter the related window; then, tap on the “Scan” button to run the Discovery procedure:    Once the Discovery procedure has been completed, select the desired Bluetooth® device from the list. It is also possible to digit (12 hexadecimal digits) the Bluetooth® address of the desired device by tapping on the “Add” button. The “Clear” button deletes all discovered devices from the list. 5.  Once the desired Bluetooth®  device has been selected, tap on the “Connection Wizard” button to enter the related window where selecting the connection type to be used for communication with the Bluetooth® device:    The “Serial Port” button starts communication through the Bluetooth® serial port COM 5 (typically used for connection with GPS devices).
KYMAN-NET™ 44   3 The “Printer” button starts communication with a printer through the Bluetooth® serial port COM 5. The “Kbd Emulation” button allows connection with a barcode reader using the keyboard emulation. The “ActiveSync” button starts communication with a PC equipped with a Bluetooth® antenna and the related ActiveSync. 6.  Hide the Bluetooth® Manager Device window by tapping on the   icon available on each window or close it through the “Close” button available in the “Me” window (see step 3 of this procedure).
USE AND FUNCTIONING 45  3 3.9  BACKUP DIRECTORY FILE MANAGEMENT  All of the Windows CE .NET system files reside in RAM (volatile memory) except for the Backup directory, which resides in FLASH (non-volatile memory). Therefore the contents of the Backup directory are persistent even if the mobile computer is re-booted or the battery pack is changed.  You can save your more important files that you don't want to lose due to mobile computer re-boot, in the Backup directory or create a sub-directory within Backup.  Even though the Windows Directory resides in RAM, it often contains files or sub-directories created by the user or by installation programs that you don't want to lose at re-boot. To keep these files persistent it is necessary to copy them to the directory \Backup\Windows. This directory doesn't exist originally (only Backup exists), and therefore it must be created. At the next hardware reset, before activating the shell, Windows CE .NET will copy the contents including all sub-directories of \Backup\Windows to \Windows.  Likewise, to maintain files that must be run at Windows CE .NET startup, (i.e. .exe, .lnk, .vb, .htm, etc.), it is necessary to copy them to the directory \Backup\Startup. This directory does not exist originally (only Backup exists), and therefore it must be created. The application programs will be run after any type of re-boot (both software and hardware reset).  As an alternative to the Safe Setup function, it is possible to copy the .cab files to the directory \Backup\Cabfiles (the Cabfiles sub-directory doesn't exists originally and must therefore be created) and perform a mobile computer cold boot to have the application installed. Once these files are copied to the directory \Backup\Cabfiles, the application will be run after each re-boot.  From the second cold boot on, a message may be displayed such as "<application name> is already installed. Re-install?". This message blocks the boot process. Press the [Enter] key to continue the system initialization.
KYMAN-NET™ 46   4 4 MAINTENANCE    NOTE Rechargeable battery packs are not initially charged. Therefore the first operation to perform is to charge them. See below.   4.1  CHARGING THE BATTERY PACK  The battery pack autonomy varies according to factors, such as the frequency of barcode scanning, RF usage, etc.  When the battery pack is low, the LED positioned at the right side of the display blinks orange.  It is possible to recharge the battery pack by using the FPS-18 AC/DC external power supply directly connected to the Kyman-NET™, see par. 2.1.1.  Alternatively, it is also possible to recharge the battery pack by using the  Kyman-NET™ Single Cradle Desk or the Kyman-NET™ Vehicle Cradle.  During the charging process the LED positioned at the right side of the display is red constant. Once the charging process has been completed this LED is green constant (see par. 3.5).  If the battery pack is removed from the mobile computer, it can be recharged by inserting it into the Kyman-NET™ Multi-Battery Pack Charger.    CAUTION If the battery pack is new or has not been recharged for a long time, it is necessary to perform two or three charging and discharging cycles (complete use) before it can reach its maximum charge capability. The maximum time required to recharge a completely run-down battery pack is about 3 hours if the mobile computer is idling.
MAINTENANCE 47  4 4.2  REPLACING THE BATTERY PACK  To correctly replace the battery pack, proceed as follows. 1.  Turn off the Kyman-NET™. 2.  Pull the battery latch down as indicated in the figure below.       3.  Remove the battery pack.     Battery Contacts
KYMAN-NET™ 48   4 4.  To correctly insert the new battery pack, first insert the bottom and then the upper part of the battery pack into the slot as indicated in the following figure:    5.  Press it back until the battery latch is automatically closed.    WARNING Do not incinerate, disassemble, short terminals or expose to high temperature. Risk of fire, explosion. Use specified charger only. Risk of explosion if the battery is replaced by an incorrect type. Dispose of the batteries as required by the relevant laws in force.   NOTE In order to guarantee an adequate operating autonomy, when replacing the battery pack the mobile computer checks the battery energy level. If the battery is not sufficiently charged, Kyman-NET™ does not turn on (when pressing the ON button). In this case, either substitute the battery pack with a charged one (sufficiently charged) or insert Kyman-NET™ into a powered cradle or plug it into the direct power supply.
MAINTENANCE 49  4 4.3  COMPACT FLASH AND SECURE STORAGE CARDS  The Kyman-NET™ supports both Compact Flash and Mini Secure Digital storage cards.  The Mini Secure Digital storage card slot accepts Mini storage cards only, while the CompactFlash card slot accepts either a storage card or the 802.11b radio card.  To install a Compact Flash or a Mini Secure Digital storage card, it is recommended to contact a Datalogic representative for technical assistance since to access both cards slots it is necessary to open the mobile computer by removing its screws and causes warranty loss.   CAUTION Opening the Kyman-NET™ may damage internal components.   4.4  CLEANING THE MOBILE COMPUTER  Periodically clean the Kyman-NET™ with a slightly dampened cloth.  Do not use alcohol, corrosive products or solvents.
KYMAN-NET™ 50   5 5 TECHNICAL FEATURES   5.1 TECHNICAL DATA  Kyman-NET™ Common Features  Electrical Features Power    DC supply  14 V ± 5%   Battery pack  2 cell Li-Ion 2200 mAh@ 7.4 V (nominal)   Internal backup battery   Rechargeable Li-Ion 30 mAh  Communication Features  Windows CE.NET COM Port Serial interface  RS232 USB 1.1 COM1 COM6 Wireless Features WLAN  IEEE 802.11b DSSS WPAN  Bluetooth® IEEE 802.15 WWAN  GSM/GPRS Tri-band (900, 1800, 1900 MHz) Radio with accessible SIM card interface Environmental Features Working temperature*  -20° to + 50 °C / -4° to +122 °F Storage temperature  -20° to +70 °C / -4° to +158 °F Humidity  90% non condensing for temperatures<40°C Protection IP64 ESD protection  4 KV contact discharge, 8 KV air discharge Drop resistance  1.5 m / 5 ft Hardware Features FLASH 64 MB RAM 64 MB Microprocessor  Intel XScale PXA 255 400 MHz Audio  Speaker, Microphone, Buzzer LED  Two-color Programmable LED Charging Status (two-color LED) Good Read LED Display  64K Color TFT LCD with 320 x 240 pixel resolution, with LED backlight and touch screen Keyboard  53 or 36 Plastic Top Backlit Keys Mechanical Features Dimensions (LxWxH)  24 x 9.2 x 5.5 cm / 9.4 x 3.6 x 2.2 in Weight (depending on model) 540 - 570 g / 19.0 - 20.1 oz (incl. battery) *  Batteries must be charged at a temperature ranging from 0° to +45 °C (+32° to +113 °F).
TECHNICAL FEATURES 51  5 Programming Features Operating system  Windows CE .NET 4.2 Laser Models (XXX-1XX)   Decoded barcodes 1D   UPC A, UPC E, EAN 8, EAN 13, Code 39, Code 39 Full ASCII, Code 32, Interleaved 2 of 5, Industrial 2 of 5, Matrix 2 of 5, Code 128, EAN 128, Codabar, MSI, Plessey, Code 93, Code 11 Imager Models (XXX-7XX)   Decoded barcodes 1D   UPC  A,  UPC  E, EAN 8, EAN 13, UPC/EAN/JAN, Interleaved 2 of 5, Code 39, Code 39 Full ASCII, Codabar, Code 128, EAN 128, Code 93, RSS Decoded barcodes 2D   PDF417, DataMatrix, QR, MacroPDF Postal codes   POSTNET, PLANET, Japan Post, Australia Post, KIX Code, Royal Mail Code (RM4SCC) Laser Extra Long Range Models (XXX-6XX)   Decoded barcodes 1D UPC A, UPC E, UPC E1, EAN 8, EAN 13, Code 128, EAN 128, Code 39, Code 39 Full ASCII, Code 32, Code 93, Interleaved 2 of 5, discrete 2 of 5, Codabar, MSI, RSS RFID Models (XXX-X2X)    Philips Mifare Classic 1k (block mode only), Philips Mifare Classic 4k (block mode only), Philips Mifare Ultralight (block mode only), Philips I-Code Sli ISO15693, Texas Tag-It ISO15693, Infineon ISO15693 Laser Miniature+RFID Models (XXX-42X)    UPC A, UPC E, EAN 8, EAN 13, Code 39, Code 39 Full ASCII, Code 32, Interleaved 2 of 5, Industrial 2 of 5, Matrix 2 of 5, Code 128, EAN 128, Codabar, MSI, Plessey, Code 93, Code 11  Philips Mifare Classic 1k (block mode only), Philips Mifare Classic 4k (block mode only), Philips Mifare Ultralight (block mode only), Philips I-Code Sli ISO15693, Texas Tag-It ISO15693, Infineon ISO15693
KYMAN-NET™ 52   5 Kyman-NET™ Laser Optical Features  Laser Optical Features  Kyman-NET™ XXX-1XX ModelsKyman-NET™ XXX-4XX ModelsKyman-NET™ XXX-6XX Models Maximum resolution  0.13 mm / 5 mils  0.13 mm / 5 mils  0.2 mm / 7.5 mils Skew angle  ± 55°  ± 65°  ± 60° Pitch angle  ± 65°  ± 55  ± 65° Scan rate - horizontal  35 ± 5 scan/sec  50 ± 6 scan/sec  40 ± 6 scan/sec Depth of field  See reading diagrams on the next page Light source laser scanner VLD, wavelength 630~680 nm Safety class  Class II EN 60825-1/CDHR   Kyman-NET™ Imager Optical Features (XXX-7XX models)  Imager Optical Features Max. resolution   1D Codes  0.10 mm / 4 mils 2D Codes  0.17 mm / 6.6 mils Skew angle  ± 40 ° Pitch angle  ± 35° Depth of field*   1D (linear): X-dimensionmm (mils) Symbol size cm (in) DOF cm (in) Code39  0.13 (5)  1.2 (0.47)  8.0 to 15.0 (3.15 to 5.90)   0.50 (20)  3.2 (1.26)  8.0 to 33.0 (3.15 to 12.99) EAN13  0.33 (13)  3.1 (1.22)  7.5 to 24.5 (2.95 to 9.65) 2D:  X-dimensionmm (mils) Symbol size cm (in) DOF cm (in) POSTNET  0.5 (20)  4.0 x 0.4 (1.57 x 0.16)  11.5 to 30.0 (4.53 to 11.81) PDF417  0.13 (5)  1.1 x 0.9 (0.43 x 0.35)  8.5 to 15.5 (3.35 to 6.10)   0.17 (6.6)  1.4 x 1.2 (0.55 x 0.47)  7.0 to 19.0 (2.76 to 7.48)   0.25 (10)  2.2 x 1.8 (0.86 x 0.71)  4.5 to 24.0 (1.77 to 9.45) QR  0.25 (10)  0.7 x 0.7 (0.28 x 0.28)  7.0 to 15.5 (2.76 to 6.10)   0.38 (15)  1.1 x 1.1 (0.43 x 0.43)  4.5 to 21.0 (1.77 to 8.27)
TECHNICAL FEATURES 53  5  Imager Optical Features DataMatrix  0.19 (7.5)  0.8 x 0.8 (0.31 x0.31)  9.0 to 13.0 (3.54 to 5.12)   0.25 (10)  0.8 x 0.8 (0.31 x 0.31)  7.5 to 16.5 (2.95 to 6.50)   0.38 (15)  1.0 x 1.0 (0.39 x 0.39)  6.0 to 22.0 (2.36 to 8.66) Sensor  640 x 480 pixel element, 2D CMOS array Illuminator LED array Wavelength 630~670 nm LED Safety class Class 1 to EN 60825-1 Aiming System  Visible Laser Diode Wavelength 650 nm Laser Safety class Class 2 EN 60825-1; Class II CDHR  *Reading distances are measured from the nose of the reader.
KYMAN-NET™ 54   5 5.2 READING DIAGRAMS  Kyman-NET™ HP Laser (XXX-1XX models)  Reading Zones (10° skew angle)100 200 400200 100 0 100 200 300 500 600 700 800 mm300 mm 300 1.00 mm(40 mils) 0.13 mm (5 mils) 0.19 mm(7.5 mils)0.25 mm(10 mils)EAN0.33 mm (13 mils) 0.38 mm(15 mils)0.50 mm(20 mils)   Kyman-NET™ RFID +Laser (XXX-4XX models) 100 200 400200 100 0 100 200 300 500 600 mmReading Zones (10° skew angle) 300 mm 300 0.13 mm (5 mils) 0.19 mm(7.5 mils)0.25 mm(10 mils)0.38 mm(15 mils)0.50 mm(20 mils)1.00 mm(40 mils) on Code 39
TECHNICAL FEATURES 55  5 Kyman-NET™ XLR (XXX-6XX models)  20 60  100  300 340120 40 0 40 120 cm 220 2600.50 mm (20 mils)1 mm (40 mils)380 cm Reading Zones (10° skew angle)140 18060 20 20 60
KYMAN-NET™ 56   6 6 TEST CODES   High Density Codes 0.25 mm (10 mils)      Code 39 !17162H!  17162           2/5 Interleaved Ë"8NduÌ   0123456784               Code 128 ÌtestwÎ  test          80%  EAN 13  x(0B2DE5*KKKKLM(            80%  EAN 8  (6450*TRMN(
TEST CODES  57  6 Medium Density Codes 0.38 mm (15 mils)      Code 39 !17162H!  17162            Interleaved 2/5 Ë"8NduÌ  0123456784            Code 128 ÌtestwÎ  test          100%  EAN 13  x(0B2DE5*KKKKLM(            100%  EAN 8  (6450*TRMN(
KYMAN-NET™ 58   6 Low Density Codes 0.50 mm (20 mils)      Code 39 !17162H!  17162         Interleaved 2/5 Ë"8NduÌ   0123456784         Code 128 ÌtestwÎ  test          120%  EAN 13  x(0B2DE5*KKKKLM(          120%  EAN 8  (6450*TRMN(
 59  GLOSSARY   Access Point A device that provides transparent access between Ethernet wired networks and IEEE 802.11 interoperable radio-equipped mobile units. Hand-held mobile computers, PDAs or other devices equipped with radio cards, communicate with wired networks using Access Points (AP). The mobile unit (mobile computer) may roam among the APs in the same subnet while maintaining a continuous, seamless connection to the wired network.  Barcode A pattern of variable-width bars and spaces which represents numeric or alphanumeric data in binary form. The general format of a barcode symbol consists of a leading margin, start character, data or message character, check character (if any), stop character, and trailing margin. Within this framework, each recognizable symbology uses its own unique format.  Baud Rate A measure for data transmission speed.  Bit Binary digit. One bit is the basic unit of binary information. Generally, eight consecutive bits compose one byte of data. The pattern of 0 and 1 values within the byte determines its meaning.  Bluetooth® A standard radio technology using a proprietary protocol. The onboard Bluetooth module in the mobile computer is compatible with the 1.1 protocol.  Byte On an addressable boundary, eight adjacent binary digits (0 and 1) combined in a pattern to represent a specific character or numeric value. Bits are numbered from the right, 0 through 7, with bit 0 the low-order bit. One byte in memory can be used to store one ASCII character.  Decode To recognize a bar code symbology (e.g.,  Codabar, Code 128, Code 3 of 9, UPC/EAN, etc.) and analyze the content of the bar code scanned.  EEPROM Electrically Erasable Programmable Read-Only Memory. An on-board non-volatile memory chip.
 60   Flash Disk Non-volatile memory for storing application and configuration files.  GPRS General Packet Radio Service. GPRS is a wireless packet-based communication service based on GSM. Its data transfer is rated between 56 Kbps to 114 Kbps. It makes very efficient use of available radio spectrum, and users pay only for the volume of data sent and received.  GSM Global System for Mobile communication. It is a standard for digital cellular communications, currently used in the 900 MHz and 1800 MHz bands.  Host A computer that serves other mobile computers in a network, providing services such as network control, database access, special programs, supervisory programs, or programming languages.  Liquid Crystal Display (LCD) A display that uses liquid crystal sealed between two glass plates. The crystals are excited by precise electrical charges, causing them to reflect light outside according to their bias. They use little electricity and react relatively quickly. They require external light to reflect their information to the user.  Light Emitting Diode (LED) A low power electronic light source commonly used as an indicator light. It uses less power than an incandescent light bulb but more than a Liquid Crystal Display (LCD).  RAM Random Access Memory. Data in RAM can be accessed in random order, and quickly written and read.  RF Radio Frequency  RFID (Radio frequency identification) A technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. RFID is coming into increasing use in industry as an alternative to the barcode identification.  RTC Real Time Clock.
 61  INDEX   A Accessories; 5 Alphanumeric Keyboard; 19 Available Models; 2 B Backup Directory File Management; 45 Bluetooth® Manager Device Setup; 42 Buttons; 33 C Charging the Batteries; 46 Cleaning the Mobile Computer; 49 Connection Cables; 12 RS232 Direct Connection; 12 RS232 Power Connection; 13 USB Direct Connection; 12 USB Power Connection; 13 Connections; 6 RS232/USB Direct Connection; 6 WLAN Connection; 7 WPAN Connections; 8 WWAN Connections; 9 Control Panel; 32 Conventions; vii D Data Capture; 16 Imager Data Capture; 17 Laser Data Capture; 16 RFID Data Capture; 18 Data Capture Configuration; 27 Default Settings; 30 Description of the Keys; 19 E End User License Agreement; v F Files Admin; 34 G General View; xv Glossary; 59 K Kyman-NET™ Description; 1 M Maintenance; 46 Microsoft® ActiveSync®; 40 N Numeric Keyboard; 22 P Package Contents; 2 R Reader Parameters; 29 Reading Diagrams; 54 Reference Documentation; vii References; vii Registry; 33 Replacing the Batteries; 47 S Safe Setup; 34 Safety Regulations; viii Laser Safety; ix
 62   Radio Compliance; xiii Save Session; 34 Scan Parameters; 29 Services and Support; vii SIM Card; 10 Startup; 14 Status Indicators; 25 T Technical Features; 50 Test Codes; 56 U Using the Stylus; 15 V Vocal Communication; 37 Volume Settings; 37 W Wireless Communication; 36
   05 DATALOGIC S.p.A., Via Candini, 2 40012 - Lippo di Calderara Bologna - Italy    dichiara che declares that the déclare que le bescheinigt, daß das Gerät declare que el   Kyman-NET XXX-XXX   e tutti i suoi modelli   and all its models   et tous ses modèles  und seine Modelle   y todos sus modelos   sono conformi alla Direttiva del Consiglio Europeo sottoelencata: are in conformity with the requirements of the European Council Directive listed below: sont conformes aux spécifications de la Directive de l'Union Européenne ci-dessous: der nachstehenden angeführten Direktive des Europäischen Rats entsprechen: cumple con los requisitos de la Directiva del Consejo Europeo, según la lista siguiente:  1999/5/EEC R&TTE    Questa dichiarazione è basata sulla conformità dei prodotti alle norme seguenti: This declaration is based upon compliance of the products to the following standards: Cette déclaration repose sur la conformité des produits aux normes suivantes: Diese Erklärung basiert darauf, daß das Produkt den folgenden Normen entspricht: Esta declaración se basa en el cumplimiento de los productos con las siguientes normas:    ETSI EN 301 489-17 v1.2.1, August 2002: ELECTROMAGNETIC COMPATIBILITY AND RADIO  SPECTRUM  MATTERS  (ERM); ELECTROMAGNETIC COMPATIBILTY (EMC)  STANDARD FOR RADIO EQUIPMENT AND SERVICES; PART  17: SPECIFIC CONDITIONS FOR 2,4 GHZ WIDEBAND TRANSMISSION SYSTEMS AND 5 GHZ HIGH PERFORMANCE RLAN EQUIPMENT   ETSI EN 300 328 v1.6.1, November 2004: ELECTROMAGNETIC COMPATIBILITY AND RADIO  SPECTRUM  MATTERS  (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ  ISM  BAND AND USING WIDE BAND MODULATION TECHNIQUES; HARMONIZED  EN  COVERING ESSENTIAL REQUIREMENTS UNDER ARTICLE 3.2 OF THE R&TTE DIRECTIVE   EN 60950-1, December 2001: INFORMATION TECHNOLOGY EQUIPMENT – SAFETY – PART 1: GENERAL REQUIREMENTS    Lippo di Calderara, 08/09/2005    Ruggero Cacioppo  Quality Assurance Laboratory Manager

Navigation menu