Contents
Users Manual 2
Chapter 5 The System System 5.1.System description 5.1.1. General. Hi-G-Tek DataSeals operate in sleep mode to conserve power. A pre-determined periodically awakens them from sleep mode. This allows them to monitor the surrounding airwaves for a Reader's wake up signal. Tw is the notation used throughout this manual for the wakeup cycle time of the seal. When the Reader initiates a session, it transmits a stream of data bits of programmable length. The notation of the data stream length is Thw. The seals use the SLOTTED ALOHA concept to communicate back to a Reader. The length of an ALOHA time slot is notated as Ts. (Ts is also notated as a window). This time slot is usually of fixed duration. For the Verify, Addressed Verify and Tamper commands, Ts should be defined externally in the command (see paragraph 5.6.3.2.). Fig. 5.1 - RF Communication Channels Reader Ineerrorgation H atde Readers I terlace Window Random Access Window Alert Window T iw T hw T cw T aw T rw CompleteReaderSession Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 50 System Ts can have one of the following values: 21, 41, 63, 81 msec. The System has four communication channels Reader Interrogation Header with time duration of Thw. Within this time frame the Reader sends a data stream to the seals. Readers Interlace Window with time duration of Tiw. This window is to allow other Readers to transmit and to share one Random Access Window. Random Access Window with time duration of Tcw. During this period seals responds in random access mode. Because the access is random, collisions between seal messages are to be expected. Alert Window with time duration of Taw. The last channel is an emergency channel allowing seals with high priority alert messages to transmit the message to the Reader. Trw is the notation used for the seals transmitting (Reader is receiving) time frame. A complete communication Reader Session is Thw + Trw. To overcome collisions, the seals should retransmit their message several times within the Random Access Window. The number of retransmissions should be defined externally in the command and is called Rr. The seal may also retransmit in the Alert Window. This is notated as Rt. Both Thw and Tw can be programmed. The relationship between Thw and Tw should be kept constant. Thw=Tw+ 135 msec See paragraph 5.2.3. for information on how to calculate Thw and Tw Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 51 System When there are a certain number of seals in the Reader's receiving zone, probability calculations show that more than one Seal Transmission is required to obtain a complete result. The following table demonstrates the number of retransmissions required for different situations. Table 5.1 Number of retries within the Random Access Window Max # of Seals 10 12 14 16 18 20 25 30 35 Min # of Reader Sessions # Of seal slots (Ts) 30 40 50 60 70 80 90 100 110 120 130 140 150 160 170 180 190 200 210 220 230 240 250 10 10 10 10 Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 52 System Table 5.2. Minimum Requirements Maximum # Seals Minimum # Sessions Minimum # Windows Optimum # Retries 10 11 12 13 14 15 16 17 18 19 20 22 24 26 28 30 35 16 40 67 94 122 147 175 207 229 118 129 141 154 169 182 197 211 221 239 255 193 217 226 243 228 10 10 10 Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 53 System Table 5.3. below shows some examples of the Verify command using different retransmissions and Reader Sessions. In this example, Thw=3 sec; Ts=21 msec; Taw=105 msec. Table 5.3. Reducing the Reader Interrogation Header - Thw increases the speed of the Verify session. Increasing the speed of the process is in conflict with the battery lifetime of the seal. (Higher speed = lower battery lifetime). When designing an application, careful attention should be paid to optimizing the correct tradeoffs between system response time, battery lifetime and number of seals. Taw is calculated for 5 slots of Ts. Table 5.4 demonstrates the impact of Thw on response time and battery life. The scenario for the results in the table is a GATE concept, whereby a seal is exposed to a reader for 6 minutes per 24 hours and: Ts=21 msec; Taw=105 msec. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 54 System Table 5.4. Number Thw Reader Number of of Session RetransmisSeals time sions sec Rr 0.67 0.5 Number of Reader Sessions Battery Total Life Verify Years duration Sec 2.2 0.67 10 20 0.5 0.5 0.5 0.5 0.5 0.5 1.45 1.70 2.10 2.70 5.50 5.64 1.17 10 2.2 2.1 2.1 2.1 2.2 2.3 3.8 1.45 1.70 2.10 2.70 5.50 11.3 1.17 10 20 10 20 1.95 2.20 2.60 3.20 6.00 6.15 3.20 3.95 4.16 4.68 5.20 7.94 8.15 10 10 3.8 3.6 3.7 3.6 3.8 3.9 5.0 5.0 5.0 5.0 5.0 5.0 5.0 1.95 2.20 2.60 3.20 6.00 12.3 3.20 3.95 4.16 4.68 5.20 7.94 16.3 Table 5.5. demonstrates the impact of Thw on response time and battery life for a YARD Management concept, where a seal is constantly exposed to a reader 24 hours a day. As mentioned previously, the reader in some cases should carry out a number of Reader Sessions to achieve the required performance. A group of Reader Sessions is a System Session. The frequency in which the system performs System Sessions is a System Cycle Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 55 System System Session System Session Reader Reader Reader Reader Session 1 Session 2 Session 1 Session 2 System Cycle The following table uses: System Cycle = 15 min; Ts=21 msec; Taw=105 msec Table 5.5 Number of Seals Thw Reader Session time sec Number of Retransmissions Rr Number of Windows Number of Reader Sessions Battery Life Years Total Verify duration sec 10 20 10 20 10 20 1.15 1.95 2.16 2.79 3.21 5.94 6.15 2.15 2.95 3.16 3.79 4.21 6.94 7.15 3.15 3.95 4.16 4.79 5.21 7.94 8.15 10 10 10 40 50 80 100 230 240 40 50 80 100 230 240 40 50 80 100 230 240 3.78 3.63 3.23 3.23 3.0 2.82 2.47 5.0 5.0 4.54 4.54 4.11 3.77 3.16 5.0 5.0 5.0 5.0 4.7 4.24 3.48 1.15 1.95 2.16 2.79 3.21 5.94 12.29 2.15 2.95 3.16 3.79 4.21 6.94 14.29 3.15 3.95 4.16 4.79 5.21 7.94 16.29 Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 56 System 5.2. System Parameters. 5.2.1. Seal Parameters. Table 5.6. describes the seal parameters. These parameters are accessible via either the Low Frequency or the High Frequency channels using the READ and WRITE PARAMETERS commands. Table 5.6: Seal Parameters Parameter Name 1 Tag/Seal Status (Short Status) 2 Date & Time 3 Seal Stamp 4 # of Events 5 Version of firmware 6 Long Status 7 Tw 8 Tp 9 ADI 10 Department 11 Tbrs 12 User Data Size 13 Alert Bursts Counter Cbrs. 14 Alert Repetition Rate for Deep Sleep mode -Tds 15 Alert Bursts Counter for Deep Sleep mode - Cds Parameter Parameter Read/Write Verify Parameter command Code Syntax Access Length bit Access order 00hex TS 15* 1 Byte 01 hex D&T 14* 5 Bytes 17 hex 03 hex 06 hex STMP #EV VER 5* 12* 9* 2 Bytes 1 Byte 2 Byte 07 hex LTS 4 Bytes 31 hex 32 hex 13 hex 16 hex 34 hex 42 hex TW Tp ADI DEP Tbrs UDS R/W R/W R/W R/W R/W n.a n.a n.a n.a n.a 2 Bytes 2 bytes 4 Bytes 1 Byte 2 Bytes 2 Bytes 76 hex Cbrs R/W n.a 1 Byte 77 hex Tds R/W n.a 1 Byte 78 hex Cds R/W n.a 1 Byte * The above parameters are visible for Global=1 (See paragraph 5.8.3) Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 57 System Table 5.7 rsio rtB le rD fo te sA rtB le rfD te Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 58 System Table 5.8a - Short Status Bit # Status Note SET/TAMP (1)(2) LB warning (2) This bit is set to 1 by the SET command and reset to 0 when a tamper event is detected. When low voltage battery is detected this bit is set to 1. This is a warning. There is enough time to replace the seal. Indication whether the seal wire loop is open or closed. Indication flag of suspended sleep mode of operation. Indication whether the seal wire loop electrical characteristics were changed relative to SET. Indication of deep sleep mode of operation. S/T This flag is a logical OR of errors in the following bytes. GE Open/Close (1)(2) Suspended SET Seal Wire changed (1)(2) Sleep (3) General error (2)(4)(5) Spare LBW O/C SS WRC SL SPR NOTES: (1) These events are defined as TAMPER events. (2) These flags will cause an alert, synchronized and unsynchronized. (3) Sleep will generate an unsynchronized burst only if this mode is activated. (4) This flag may be reset by an external RESET STATUS RF command of the flags that caused the error. (5) This flag is set once one of the flags marked with * in the LONG STATUS is set. This flag will be reset if the appropriate originator flag is reset. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 59 System Table 5.8b - Long Status Byte Bit # Byte Bit # 7* 6* 5* 4* 3* 0* Status SET/TAMP (1)(2) Note This bit is set to 1 at SET command and reset to 0 when a tamper event is detected. LB warning (2)(4) When low voltage battery is detected this bit is set to 1. This is a warning. There is enough time to replace the seal. Open/Close Indication whether the seal wire (1)(2) loop is open or closed. Suspended SET Suspended set mode of operation indication flag. Seal Wire Indication whether the seal wire changed (1)(2) loop electrical characteristics where changed relative to SET. Sleep (3) Deep sleep mode of operation indication flag. General error This flag is a logical OR of errors in (2) (5) the following bytes. Spare Status Note Life Counter 0 Flag indicating that the seal has ended its lifetime. RTC error Flag indicating that a problem with the Date & Time generator has occurred. LB error This bit is set to 1 when severe low voltage battery is detected. The seal is about to stop working and should be replaced immediately. DB corrupted & Database is protected; when an restored (4) error is detected and restored this bit will be set to 1. DB corrupted When the database cannot be restored after corruption, this bit will be set to 1. Lock (6) For production use. New Battery (4) In use for devices with replaceable batteries only. Hardware error Indication of a hardware error detected. S/T LBW O/C SS WRC SL GE SPR LCO RTC LBE DBE DBC LCK NB HRE Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 60 System Byte Bit # 7* 6* 5* Byte Bit # Status Illegal ORG_ID (4) Note Indication of an attempt to contact the seal using unauthorized equipment. Command Failed Seal’s failure to execute a command will set this flag to 1. Unrecognized Seal’s failure to recognize a command command will set this flag to 1. Spare Unsync Burst Indication of Unsync Burst Mode of Mode operation. Spare Spare Spare Status Note Buffer full In the commands: Read/Write Data or Reader/Write Parameters or Read Events. If the message is too long this flag will be set to 1. Scroll When events in the seal’s memory reach the upper portion, this flag is set to 1 H.F Disable Enables or disables the high frequency channel using the Reset Status command. ORG_ID in Burst This flag can enable or disable the Mode. ORG_ID field in a seal’s message in Burst Mode. Set and Reset is done by an appropriate RF Command (see paragraph 5.6.3.2.15) Spare Spare Spare Spare OID CMF UNC SPR BMU SPR SPR SPR BF SRL HFD ORGB SPR SPR SPR SPR NOTES: (1) These events are defined as TAMPER events. (2) These events will cause an alert, synchronized and unsynchronized. (3) Sleep will generate an UNSYNCHRONIZED burst only if this mode is activated. (4) These flags may be reset by an external RESET STATUS RF command. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 61 System (5) This flag is set once one of the flags marked with * in the LONG STATUS is set. This flag will be reset only if the appropriate originator flag is reset. (6) For production use only. * These flags will set the General Error flag. Table 5. 9: Seal Parameters: Defaults and Extreme Values. Parameter Name Default value Minimum Maximum Unit Value Value Parameter Length 1 Byte Tag/Seal Status Date & Time Seal Stamp # Of Events Version of firmware Long Status Tw 5 Bytes 2 Byte 1 Byte 2 Byte 4 bytes 3000 400 10000 ADI 00000000 Department 00 Tp 10000 400 10000 12 Tbrs 4096 1024 10240 13 Alert Bursts Counter- 10 50 32 40 50 10 11 0.977 2 Bytes ms 4 Bytes 1 Byte 0.977 2 bytes ms 0.977 2 bytes ms 1 byte Cbrs. 14 Alert Repetition Rate for Deep Sleep mode- 250 ms 1 byte Tds 15 Alert Bursts Counter for Deep Sleep mode-Cds 1 byte Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 62 System 5.2.2. Reader Parameters. Table 5.10 describes the Reader parameters. These parameters are accessible via the serial communication port. Table 5.10. Reader Parameters Parameter Name 1 Version of MCU_firmware 2 Version of S2_firmware 3 RSSI2 4 Reader ID 5 ADI ch2 6 Department ch2 7 Thw ch2 8 Reader Address 9 Transmitter Power ch2 10 System ch2 11 Mode ch2 12 Thp ch2 Parameter Parameter Read/Write Parameter Code Syntax Access Length 01 hex MVER 2 Bytes 40 hex SVER2 2 Bytes 47 hex 02 hex 41 hex 42 hex RSSI2 RID ADI2 DEP2 R/W R/W 1 Byte 4 Bytes 4 Bytes 1 Byte 45 hex 03 hex Thw2 RADD R/W R/W 2 Bytes 2 Bytes 48 hex TRPOR2 R/W 1 Byte 43 hex 44 hex 46 hex SYS2 MODE2 THP2 R/W R/W R/W 1 Byte 1 Byte 2 Bytess The Reader supports two channels. The RF Modem's default position is channel 2. The channel must be specified in the commands. NOTE: Channel 1 is intended for future use. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 63 System Table 5.11. Description of Reader Parameters Parameter Name Version of MCU_firmware Version of S2_firmware RSSI ch2 Reader ID ADI ch2 Department ch2 Thw ch2 Reader Address 9 Transmitter Power ch2 10 System ch2 11 Mode ch2 12 Thp ch2 Description Provides the MCU’s firmware version number. Provide Slave’s firmware version number in channel 2. Provide RSSI level in channel 2. This is the Reader’s ID. See table 5 See table 5 Length of the Reader Interrogation Header This parameter should match Tw. The address of the reader on the RS485 pary line Sets output transmission power. The MSB of the SYSTEM defines whether the FOOTPRINT is ON or OFF, see paragraph 5.2.6 Bits 6&7 define the Reader’s mode of operation. See paragraph 5.5. Length of the Reader Interrogation Header for the Hard Wakeup command. This parameter should match Tp of the Seal. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 64 System MCU is the main board of the DataReader. S2 is the slave daughterboard in channel two in the DataReader. Table 5.12.: Reader Parameters: Default Value and Extreme Values. Parameter Name Version of MCU_firmware Version of S1_firmware RSSI ch2 Reader ID ADI ch2 Department ch2 Thw ch2 Reader Address Transmitter Power ch2 System ch2 Mode ch2 Hard Wakeup 10 11 12 Default value [unit] Minimum Maximum Unit Value Value Parameter length 2 Byte 2 Byte 00000000 00 1 Byte 4 Byte 4 Byte 1 Byte 997 0000 390 9766 65 100 00 00 3256 390 9766 3.072ms 2 Byte 2 Byte 1 Byte 1 Byte 1 Byte 3.072ms 2 Byte Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 65 System 5.2.3. Calculating Thw. Thw is one of the system's most important parameters. It determines both: system response time and the seal's battery lifetime.. The default value of Thw is 997 decimal where the units are 3.072 msec. The meaning in terms of time is: 997 X 3.072 = 3067 msec. Increasing Thw increases the seal battery's lifetime. On the other hand, larger Thw values increase the system's response time. This is illustrated in table 5.4 Example: Calculation of Thw for approximately 2 sec. 2000/3.072=651.042. We will select 652 as the integer. The final value of Thw is: 652 x 3.072=2003 msec. 5.2.4 Calculating Tw. The difference between Thw and Tw should be a minimum of 135 msec, where Thw > Tw. A greater difference will shorten the seal battery's lifetime As Tw gets smaller the battery consumption gets higher. A Tw unit is 0.997 msec. The default value of Tw is 3000 decimal. The meaning in terms of time is: 3000 X 0.997 = 2929 msec. The difference between Thw and Tw for the default values is: 3067 - 2929 = 138 msec. As can be seen, it is higher than the minimum 135 msec required. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 66 System Example: Calculate the appropriate Tw for a Thw=2003 msec. 1. Calculation of the approximate value for Tw: 2003 135=1868 msec 2. Calculation of the decimal value for Tw: 1868/0.997=1873.62 3. Find the integer value for Tw: The integer value is 1873, lower than 1873.62 calculated in step 2, but not too small. 4. Verify the calculations. Thw - Tw = 2003 - (1873 X 0.997)=135.6 msec>135 msec! Readers Interlace Window is the window that other Readers can use in order to transmit a message during interlace mode of operation. By using this mode, all the Readers share a common set of Random Access and Alert windows. This mode is useful if system analysis shows that system response time will be improved. Since the Readers share the same response windows, the Reader Interrogation Header and the Thw of each Reader must be identical, as should be the Thw of each Reader. For k Readers, the Tiw will be: Tiwj=TiwX(k-j) where j=1,,,k 5.2.5 Calculating Thp. Calculating Thp is identical to calculating Thw. To calculate Thp refer to the appropriate Tp. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 67 System 5.3. Parameter's Format. Most of the parameters have a simple binary value. Some of them have a specific format. 5.3.1. Date & Time The date and time are represented in Greenwich Mean Time (GMT). Bits and Bytes assignment: Byte# / Bit# Month %4 Month / 4 Minutes / 10 Hours/10 Days/10 Years / 10 Seconds / 10 3 2 1 Minutes % 10 Hours % 10 Days % 10 Years % 10 Seconds % 10 Minutes range is: 0 - 59. Hours range is: 0 - 23. Day range is: 1 - 31. Month's range is: 1 - 12. Year's range is: 00 - 99. Seconds range is: 0 - 59. The seconds field is relevant only for read & write parameters. NOTE: The character "%" denotes the operation of getting the remainder. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 68 System 5.3.2. Seal Serial Number (or TF & ID). The Seal Number is composed of 4 alpha characters and 8 decimal digits. For example: QWER85723456 The ID is converted from two seperate fields. The Decimal conversion is from 28 binary value into an 8 digit value. The alpha characters are converted by using the following conversion table. Each character is 5 bits: 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Binary 00001 00010 00011 00100 00101 00110 00111 01000 01001 01010 01011 01100 01101 01110 01111 10000 10001 10010 10011 10100 10101 10110 10111 11000 11001 11010 Text * All other values are illegal. The Seal Number is composed from the TF & ID fields in the communication protocol. See Commands for further details. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 69 System 5.3.3. ORG_ID & DEPARTMENT. ORG_ID is a 3-byte value. DEPARTMENT is the least significant byte of the ORG_ID parameter. DEPARTMENT values range from zero to 255 (or 0xFF). ORG_ID* is composed of the 2 most significant bytes of the ORG_ID parameter. ORG_I D ORG_I D* DEPARTMENT LSbyte MSbyte 5.3.4 SYSTEM SYSTEM is a parameter that defines the system characteristics. Only bit 7 is in use. Default value of bit 7 is 0. When bit 7 is set to the value of 1, the FOOTPRINT option comes into use. This option allows some of the commands to leave the RD_ID as a footprint in the seal's memory for later tractability (see paragraph 5.4.4). 5.3.5 MODE. CRNC UNSYNC ABMSG N.A N.A N.A N.A N.A CRNC Carrier Sense: In some applications carrier sense should be used before bursting into the air. The Reader uses this flag to decide whether it is required or not. CRNC=0 determines the regular mode: no carrier sense. CRNC=1 determines the Reader's ability to sense the carrier. The Reader executes the RF command only after determining that the air is free. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 70 System UNSYNC In unsynchronized commands such as Unsynchronized Alert, the Reader's receiver must be ON all the time looking for incoming messages from the seals. The Reader will set the required mode depending on the flag's value. UNSYNC=0 Synchronized mode only. UNSYNC=1 Unsynchronized mode in use, receiver should be set to on. ABMSG Burst Messages. This flag indicates whether the alert messages will be sent following a GET Burst Message or if the Reader will burst independently with Alert Messages. BRMSG=0 determines the independent messages burst mode. BRMSG=1 indicates the GET Burst Message mode. 5.4 Seal Modes of Operation. The seal can function in several modes of operation, in accordance with the application. 5.4.1. Normal Mode. In the normal mode of operation, the seal is in standby mode most of the time. When a DataTerminal starts communication, the transmitted message wakes the seal up. As explained previously, the method used to establish communication with the DataReader is different than that used for the DataTerminal. Using a pre-determined cycle, the seal wakes and performs a channel monitoring process, searching for the presence of a DataReader. The frequency of this cycle is notated as Tw. In Normal mode, any event detected by the seal will be logged in the EVENT Memory. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 71 System 5.4.2. Sleep Mode. It is recommended to use the Sleep mode when a seal is not in use in order to conserve energy. In this mode, the seal enters an extreme power-saving mode. To exit this mode, interrogate the seal using the DataTerminal or use the Hard Wakeup via the DataReader. When the seal is in Sleep mode no EVENTS will be recorded until a new SET is performed. As opposed to the Normal mode, Sleep mode is not an operative mode. 5.4.3. Alert Burst Mode. The seal should report any detected TAMPER event. The report can be in the STATUS register of a VERIFY cycle. This approach is good as long as the system's VERIFY cycle time meets the required system response time. In applications in which the System Cycle is very long and the TAMPER event is reported with a long delay, it is possible to use the Unsynchronized Alert Burst mode. This mode allows the seal to transmit a burst with a tamper message without waiting for a Reader Session. 5.4.4. Events Footprint Mode. A command issued by a Reader may be registered as an event in the Events Memory by the seal. This mode should be configured at the Reader before issuing the command. This mode is useful for tractability purposes. It is possible to track a specific Reader that performed the command by registering the Reader ID in the seal's Event Memory with each command. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 72 System 5.5. Reader Modes of Operation. The Reader can work in several modes of operation. This is defined by the MODE parameter, which is a bit oriented parameter. 5.5.1 Carrier Sense Collision. If set to 1, the Reader will be activated by the MSB's Carrier Sense Collision Avoidance ability. This mode of operation is useful if the Reader is activated individually, without synchronization with other Readers in the same area. 5.5.2 Unsynchronized Mode. When seals are operating in Unsynchronized Alert Burst mode, the Reader's receiver must be ON at all times. This is done by setting bit 6 of the MODE parameter. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 73 System 5.6. System Commands. The following paragraph is a general description of the system commands. For a deeper insight see the following: For low-level RS-485/232 users, see chapter 6. For high-level DLL users refer to the DLL help file. 5.6.1. LSC and Reader Messages. Table 5.12: LSC Commands and Acknowledge Table: Commands Set Wakeup Execute RF cmnd Command Code E0 h 20 h Get Results 15 h Get Status 16 h Get Burst Message 1C h Reset Reader Write Parameters 14 h 06 h Read Parameters BIT Sleep 07 h 09 h 08 h 11 Unsync Ack 0A h 12 Get Reader’s baud rate Set Reader baud rate Set Reader’s Address Acknowledge OK FF h Wakes the Readers if they are in sleep mode. Generates an appropriate command from the Reader to the tags. Allows the LSC to retrieve the results received by the Reader from the tags in the event of a tag-reader session. In the event of a self-contained command, the Reader will return to its current status. This command should be used to retrieve the alert messages received from the seals when using the alert burst mode. Alert messages originating from burst mode are not available through the regular Get Results command. Resets a Reader. ModifiesReader PARAMETERS. Not all parameters are accessible after the execution of a LOCK command. Reads Reader PARAMETERS. Built-in Execute test Places the Reader in Sleep mode of operation to save power. Reserved for unsynchronized responses, see table 5.2 Allows the LSC to get the Reader’s baud rate. FE h Allows the LSC to set the Reader’s baud rate. 12 h Sets Reader’s address for RS-485 usage 92 h Acknowledge Failed Save Command 94 h Acknowledgment of a message coming from a Reader and to get the next packet. Acknowledgment of an improper message coming from a Reader. Saves one of the above commands for later execution. This command is used to synchronize readers. 10 13 14 15 16 17 0F h Comments Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 74 System 18 Execute Saved command 17 h 19 Read Channel Definitions Write Channel Definitions 11 h Executes a command saved in the Reader. When it is used in broadcast mode, all the Readers execute the saved command simultaneously. Allows the Reader to read channel definitions. 10 h Allows the Reader to write channel definitions. 20 Table 5.13: Reader Message Table Message Wakeup response 2 Execute RF cmnd response 3 Get Results response 4 Get Status response 5 Get Burst Message 6 Reset Reader response 7 Write Parameters response 8 Read Parameters response 9 BIT response 10 Sleep response 11 Unsync Message 12 Get Reader’s baud rate response 13 Set Reader baud rate response Message Code Commen ts No response for WAKEUP string 20 h 15 h 16 h 1C h 14 h 06 h 07 h 09 h 08 h 0A h When a Reader is in unsync mode the Reader may send an unsynchronized message. Such a message results from an alert message coming from a seal. FF h FE h Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 75 System 14 Set Reader’s Address response 15 Save Command response 12 h 16 Execute Saved command response 17 Read Channel Definitions response 18 Wri te C hannel Definitions response 0F h Saves one of the above commands for later execution. This command is used to synchronize readers. This is a broadcast command. There is no response to this command. 11 h Allows the Reader to read the definitions of a channel. 10 h Allows the Reader to write the definitions of a channel. 5.6.2. Error Codes. Errors Unrecognized Command MCU Error HF Modem Error Result is not ready HF Modem is not responding MCU I/O Error HF Modem BIT Error Parameter is locked Illegal Parameter Code Error Co de 01 h 02 h 03 h 05 h 06 h 07 h 08 h 09 h 0A h 5.6.3. Detailed Commands. 5.6.3.1. Wakeup. 5.6.3.1.1. Command Transmission. Only a very short string needs to be sent by the LSC to wake a sleeping Reader. The string is detected by the hardware and wakes the Reader. This is a hardware-oriented command, therefore the format is different than all the other commands. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 76 System 5.6.3.2. Execute RF Command. 5.6.3.2.1. Command Transmission. This command enables communication sessions with seals. In the data field the LSC inserts the relevant information allowing the reader to easily compile the final command string. LSC > Reader Where the CMND is the “execute RF command” opcode. Channel field is one of the following: Channel Channel 1 Channel 2 Code 01h 02h Data contains the details of the RF command together with the RF command opcode. 5.6.3.2.2. Verify. This command verifies the status of seals that are in the Reader's receiving zone. This is the most basic and the commonly used command in the DataSeal system. When executing the Verify command, the specific parameters for this command must be defined. The data field in the Execute RF Command will be: Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 77 System Where: Cnmd* Tcm The RF command's opcode. Duration of the calibration message window. Resolution is in units of 1024 msec. Tiw The duration of the readers interlace window. Resolution is in units of 1024 msec. Ts Duration of a slot for receiving responses from a tag or a seal. Resolution is in units of 1024 msec. Na Number of slots in the Fixed Assignment Receiving Window. Nr Number of slots in the Random Access Receiving Window. Nt Number of slots in the Alert Receiving Window. Rr Number of random retransmissions from a tag in the Random Access Receiving Window. Rt Number of random retransmissions from a tag in the Alert Receiving Window ASID A unique and random ID, assigned by the system to a specific assignment. Parameters Mask The seal's parameters bit mask which the tags and seals respond with. Nr+Nt should be lower or equal to 255 The Bit Mask should comply with table 5.14 on the following page. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 78 System Table 5.14: Parameter Mask * The length of Date & Time in Read and Write parameters is 4 bytes. See paragraph 5.3.1. 5.6.3.2.3. TAMPER. Tamper is a command intended solely for interrogation of tampered Seals. The command is identical to the Verify command except for the opcode, which is 11h. Only the Seals that have detected tamper status respond. The aim of this command is to provide high priority to tampered Seals in a crowded Seal environment. 5.6.3.2.4. SET. Cmnd* (98h) P#/PK TF TID CRC TF TID CRC TF TID CRC # of bytes SET is the first command used prior to consigning a secured cargo shipment. A SET command initiates the seal process. The SET command initiates the seal process, and must be performed when applying the seal to the cargo, prior to shipment. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 79 System The Set command can be used on a number of or seals. The maximum number of seals it can be used on is 8. Where: P# PK The high 4 bits of the first byte in the packet serial number. The low 4 bits of the first byte in the packet serial of packets in the BMM string. At present the packet option is not in use. The value should be 0x11. 5.6.3.2.5. Suspended SET. The Suspended Set command functions in the same way as the SET command. The only difference is that the SET command is executed immediately, while the Seal will execute the Suspended SET automatically only after the Seal wire has been plugged into the Seal. The opcode for this command is 99h. The response is the same response as the SET response but with 19h as the message type. 5.6.3.2.6. Soft SET. This command has the same structure as the SET command. The difference is at the Seal level. In this command the seal marks the command as an event, but doesn't reset the events memory. The opcode for this command is 9Ah. The response is the same response as the SET response but with 1Ah as the message type. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 80 System 5.6.3.2.7. Deep Sleep. The Deep Sleep command allows battery power to be conserved when seals are in storage and not in use. Data 5.6.3.2.8. Hard Wakeup. Hard Wakeup is the command that should be used to wake the seal from deep sleep mode. Data 5.6.3.2.9. Start Alert Burst Mode. Seals usually operate in synchronized mode. In this mode, the Seals respond to messages from the Reader. In applications where the frequency of Reader sessions is low, the system's response time is slow. This has a positive effect on power conservation and other system considerations. The seal can be programmed to send an independent asynchronous alert. In this case, the response time to an alert situation will be short. Start Alert Burst Mode command can be initiated in two separate modes: Broadcast mode or Addressed mode. Data Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 81 System Starting specific tags: Data 5.6.3.2.10. Stop Alert Burst Mode. The Start Alert Burst mode operation can be stopped by the Stop Alert command. The command can be initiated in two separate modes: Broadcast mode or Individual Seal mode Stopping all tags: Data Stopping specific tags: Data 5.6.3.2.11. Ack Alert Burst Mode. Data This is to acknowledge receipt of the alert message from specific seals. The seals will stop bursting until a new alert is detected. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 82 System 5.6.3.2.12. Read Data. Data Cmnd* (63h) TF TID BA Base address BL Block length # of bytes Where: This is the base address in the memory of the block of BA data. This is the data block length.BL 5.6.3.2.13. Write Data Data Cmnd* (68h) TF TID PK/P# BA Base address Data # of bytes PK/P# = 11h. At present the packets are fixed. 5.6.3.2.14. Reset Data. Data Cmnd* (AAh) TF TID CRCt TF8 TID8 CRC8 Seal #1 # of bytes Seal #8 Up to 8 seals can be reset in one cycle. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 83 System 5.6.3.2.15. Set/Reset Status. Data Only some of the flags can be set and reset. Bit mask marks the status bits to be reset. When the value is set to “0”, this means: “don't modify”. When the value is set to “1”, this means: “reset value to zero”. Each bit corresponds to the appropriate bit in the LTS. 5.6.3.2.16. Write Parameters Data TF&TID=00 is for a broadcast command. PK/P# = 11h. At present the packets are fixed. 5.6.3.2.17. Read Parameters. Data Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 84 System 5.6.3.2.18. Addressed Verify. Data Cmnd* (50h) TF TID Tcm Tiw ts Na Nr Nt Rr Rt ASID Parameters mask # of bytes The following parameters are not applicable to this command: Na, Nt, Rt. 5.6.3.2.19. Read Events. Data Cmnd* (61h) TF TID EV# # EV # of bytes Where is the start event sequential number.EV# is the number of events to be read from memory.#EV 5.6.3.3. Get Results. After transmission of a request to execute a command, the system should wait for a response. The Get Results command allows the retrieval of the response from the Reader. This command is carried out at the RS-485 level. Using the DLL eliminates the need for the use of this command, as the DLL takes care of the response. For details see the STAR CORE DLL help file. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 85 System 5.6.3.4. Get Status. 5.6.3.4.1. Command transmission. This command is used to retrieve the status of the READER. LSC > Reader CMND(0016h) # of bytes 5.6.3.4.2. Get Status Command Response. The following string is the general response. Reader > LSC MSGT(8016h) R_status # of bytes R_STATUS field is 4 bytes. Byte A Byte B Byte C Byte D Byte A represents the status of the main motherboard MCU. The other bytes represent the RF modem status. In a general Reader response, the R-Status reply contains bytes A&B only. In command GET Status the reply contains all the R-Status bytes. Byte A: UNLOCK 485 PCR PER VCCERR VBERR PMC Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology EDC 86 System Where: UNLOCK if 0 reader's parameters are locked. If 1 parameters are unlocked. 485 If 0 reader is using the RS-232 mode for communication. If 1 reader is using the RS-485 mode for communication. PCR If 0 parameters in the MCU's E2ROM are OK. If 1 parameters were corrupted and successfully restored. PER If 0 parameters in the MCU's E ROM are OK. If 1 parameters are corrupted. VCCERR if 0 internal power is OK. If 1 internal power is not OK. VBERR if 0 internal battery is OK. If 1 internal battery is not OK. PMC If 0 program memory in the MCU is OK. If 1 program memory is corrupted. EDC a flag indicating that a delayed command was triggered and is in process. Byte B: Ch1 Ch2 Ch3 Ch4 Ch1err Ch2err Ch3err Ch4err Where: Ch1 If 0 channel1 is not in use. If 1 channel1 is in use. Ch2 If 0 channel2 is not in use. If 1 channel2 is in use. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 87 System Ch3 If 0 channel 3 is not in use. If 1 channel 3 is in use. Ch4 If 0 channel 4 is not in use. If 1 channel 4 is in use. Ch1err If 0, channel is OK. If 1, channel is defective. Details are in byte C. If byte C flags are OK, there is a communication failure with this channel. Ch2err If 0, channel2 is OK. If 1, channel2 is defective. Details are in byte C. If byte C flags are OK, there is a communication failure with this channel. Ch3err If 0, channel3 is OK. If 1, channel3 is defective. Details are in byte D. If byte D flags are OK, there is a communication failure with this channel. Ch4err If 0, channel4 is OK. If 1, channel4 is defective. Details are in byte D. If byte D flags are OK, there is a communication failure with this channel. Bytes C&D: VCCERR PMC EMC For ch 1& ch3 EME VCCERR PMC EMC EME For ch2 & ch4 Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 88 System VCCERR if 0 power is OK. If 1, power is not OK. PMC if 0 program memory in the module is OK. If 1 program memory is corrupted. EMC if 0 E ROM is OK. If 1 E2ROM was corrupted and restored. EME if 0 E ROM is OK. If 1 E ROM was corrupted. 5.6.3.5. Get Burst Message Command 5.6.3.5.1. Command transmission. This command is used to retrieve the alert messages transmitted asynchronously by seals that are in alert burst mode. LSC > Reader STX #B R# CMND(001Ch ) Channel CRC ETX # of bytes Channel indicates the source channel for the results. The value is according to the table in paragraph 5.5.2.1. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 89 System 5.6.3.5.2. Get Burst Message Command Response. The following string is the general response. Reader > LSC STX Where: MSGT DATA #B R# MSGT (xx1Ch ) R_status DATA CRC channel PK P# Data* # of bytes # of bytes high byte of MSGT is according the scenario in use. The lower byte is 1C h. If the result is not ready the value of this field is 05 hex error code see Paragraph 5.4. If the result is ready the following applies. PK Total number of packets. P# Packet number sequence number. Data* ETX This string contains the Seal's records. This field should first be retrieved from all packets before being analyzed. Seals Records: Data*1 Data*2 -------------Data*PK-1 Data*PK Seal Seal Seal Seal Seal Seal record record record record record record #B Data** #B Data** #B Data** #B Data** #B Data** #B Data** Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 90 System Where: Data** TF #B Data** TID Message Type Resultant Data # of bytes is the number of bytes for a seal record (including the #B field). is the data received after executing the RF command led by TF, TID and Message Type. If no seal detected: Data*1 Seal record #B=0 5.6.3.6. Reset Reader. 5.6.3.6.1. Command transmission This command is used to performa software reset to a readerReader. LSC > Reader CMND(0014h) # of bytes Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 91 System 5.6.3.6.2. Reset Reader Command Response. The following string is the response. Reader > LSC MSGT(xx14h) R_status # of bytes 5.6.3.7. Write Parameters. 5.6.3.7.1. Command transmission. This command enables modification of a parameter's value in the Reader. It should be clear that not all the parameters are available for modification. Table 5.2 specifies which parameters may be modified. LSC > Reader PAR1code CMND(0006h) Data value PAR2 code value PARm code value # of bytes Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology # of bytes 92 System 5.6.3.7.2. Write Parameters Command Response. The following string is the response: Reader > LSC MSGT(xx06h) R_status # of bytes 5.6.3.8. Read Parameters. 5.6.3.8.1. Command transmission. This command is to enables the reading of a parameter's value from the Reader. LSC > Reader CMND(0007h) PAR1 code PAR2 code Data # of bytes PARm code # of bytes Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 93 System 5.6.3.8.2. Read Parameters Command Response. The following string is the response. Reader > LSC MSGT(xx07h) R_status value Data Value # of bytes value # of bytes 5.6.3.9. BIT 5.6.3.9.1. Command Transmission This command generates a set of built-in test procedures. LSC > Reader CMND(0009h) # of bytes 5.6.3.9.2. BIT Command Response. The following string is the response. Reader > LSC MSGT(xx09 h) R_status # of bytes Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 94 System 5.6.3.10. Sleep. 5.6.3.10.1. Command Transmission. This command places the Reader in sleep mode to conserve energy. The command is useful when the Reader is operating on battery power. The Reader will wake when it receives a Wakeup command. LSC > Reader CMND(0008h) # of bytes 5.6.3.10.2. Sleep Command Response The following string is the response: Reader > LSC MSGT(xx08h) R_status # of bytes 5.6.3.11. Unsynchronized Reader Message. 5.6.3.11.1. Message Transmission. If the Reader is in Alert Burst mode, a Burst Alert message may be transmitted. The following string will be received for each seal. Reader > LSC MSGT(800Ah) TF R_status TID Data Command code # of bytes Short status ORG_ID # of bytes ORG_ID is an option in the response, depending on the seal's configuration. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 95 System 5.6.3.11.2. Message Command Ack. This is an ack issued by the host computer to the Reader is a RS-232 application. 5.6.3.12. Get Reader's baud rate. 5.6.3.12.1. Command transmission This command forces the Reader to report its baud rate. LSC > Reader R# (0000) CMND (00f f h) R_ID # of bytes 5.6.3.12.2. Get Reader's Baud Rate Response. The following string is the response. Reader > LSC MSGT(80ff h) R_ID baudrate # of bytes Baud rate: 2400, 4800, 9600, 19200, 38400 5.6.3.13. Set Reader's Baud Rate. The baud rate is interpreted as a decimal number translated into a 32 bit binary number or vise-versa. 5.6.3.13.1. Command transmission. This command forces a new value for the Reader's baud rate. The actual baud rate update is done after the completion of this command and receipt of the response. LSC > Reader CMND (00f e h) R_ID baudrate # of bytes Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 96 System 5.6.3.13.2. Set Reader's Baud Rate Response. The following string is the response. Reader > LSC 5.6.3.14. Set Reader's Address. 5.6.3.14.1. Command Transmission. This command requests the Reader to set its address on the RS-485 party line. Reader ID is used to distinguish between Readers sharing the same communication lines. LSC > Reader 5.6.3.14.2. Set Reader's Address Response. The following string is the response. Reader > LSC The R# is with the new address. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 97 System .5.6.3.15. Acknowledge OK. This string is a one-way LSC string to acknowledge a positive message coming from the READER. In case of packets, this will acknowledge the last packet received. LSC > Reader 5.6.3.16. Acknowledge Failed. This string is a one-way string to acknowledge a message indicating a problem originating from the READER. LSC > Reader 5.6.3.17. Save Command. 5.6.3.17.1. Command Transmission. In an application where a delayed command execution is required, the command must first be defined. This is done by saving the command in the Reader. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 98 System LSC > Reader CMND(0008h 0Fh) phase data # of bytes CMND* Data* # of bytes Where: Phase CMND* Data* is the duration from the end of the “Execute saved command” and the time required to execute the saved command. The phase is in units of 1.024 msec. is the command code of the saved command for delayed execution. is the relevant data field for the CMND* Data set to 0 clears the saved command. 5.6.3.17.2. Save Command Response. The following string is the response. Reader > LSC MSGT(XX08h XX0Fh) R_status # of bytes Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 99 System 5.6.3.18. Execute Saved Command. 5.6.3.18.1. Command Transmission. This is a broadcast command sent to all Readers. There will be no response from any Reader to this command. LSC > Reader CMND(0017h) Reader ID [1] data 4*k # of bytes Reader ID [2] .......... Reader ID [k] # of bytes The data field details the Readers by their IDs 5.6.3.18.2. Execute Saved Command Response. The following string is the response. There is no response for this command. Reader > LSC STX #B R# MSGT(XX08h) R_status CRC ETX Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology # of bytes 100 System 5.6.3.19. Read Channel Definitions Command. 5.6.3.19.1. Command Transmission. This command allows reading the definitions of a device. LSC > Reader CMND(0011h) channel # of bytes Where: is the channel number that the device is Channel connected to. Channel can be 0 to indicate the MCU, or 1,2 etc for the other channels. 5.6.2.19.2. Read Channel Definitions Response. The following string is the response. Reader > LSC MSGT(XX11h) R_status file 82 # of bytes Where: File is the data file that defines the device. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 101 System File structure is: Name Size [bytes] Part number Serial number Hardware version Production date Production batch number Description Reserved 16 16 10 32 45 The file is in ASCII format. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 102 System 5.7. System Planning. When planning an application, attention should be paid to both system operation and topology. Application requirements and electromagnetic environment characteristics should also be taken into account. The system has 2 basic applications: Fixed Reader applications and Mobile Reader applications. The Fixed Reader applications are applications where the Readers are mounted in a fixed site. The Mobile applications are situations where the Reader is mounted on a vehicle for monitoring seals in transit. 5.7.1. Electromagnetic Environment. Radio frequency communications is the basic technology used by the system. While this is a very robust method for communicating with remote devices, several issues should be considered when planning a site: - Metal walls should not be used to shield the remote devices. - Communication distance between remote devices is not a constant. - Communication distance may vary according to one or more of the following: Line of sight between devices - existence and clearance. Proximity to metal objects. Indoor or Outdoor environment. Antenna orientation between the devices. It is recommended to map the site with actual devices for proper coverage. When planning the site layout, safe margins should be taken into account to ensure proper operation at all times. Possible environmental changes should also be considered. System utilities should be used to test and verify proper and reliable operation. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 103 System 5.7.2. System Layout. Two aspects should be considered when dealing with system layout: 1. Radio Frequency Communication Layout. 2. Line Communication RS-485 or RS-232 Layout. 5.7.2.1 Radio Frequency Communication Layout. When only one Reader is in use, the previously mentioned environmental considerations are all that need be taken into account. When more then one reader is in use, it should be understood that in the same area only one Reader can communicate with the seals at the same time. Interference will be caused by more than one Reader trying to communicate with the seals in the same period in time. The Readers should be synchronized using the application software. Several Readers may operate simultaneously provided that it has previously been confirmed that they will not interfere with each other. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 104 System 5.7.2.2. Cellular Layout. Cellular topology should be used to ensure efficient coverage of a large area. The following drawing illustrates the concept. Reader Zone Readers must be properly placed to ensure there are no dead zones within the defined area. Overlaps should be as shown in the above drawing. Reader Zone is the term used to describe the area of reliable communication covered by a Reader. The Reader Zone is a CELL. As the drawing illustrates, it is extremely important that the application software controls and synchronizes the Reader's operation in order to avoid air collisions. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 105 System 5.7.2.3. Reader Session Retransmissions. Probability calculations were used to estimate Reader Session retransmissions when creating System Sessions. However, it is advisable that suitable retransmissions be on hand at the application level to overcome unpredictable radio interference. The actual number of retransmissions can be either fixed or dynamic. These should be set in accordance with the application requirements and the empirically evaluated on-site electromagnetic characteristics. 5.7.2.4. Line Communication RS-485 Layout The connection of many Readers to a Local Site Controller (LSC) is done via the RS-485 protocol. Up to 32 Readers may be connected to one COMM Port, depending on the type of RS-485 to RS-232 converter used. Two topologies can be used: A long daisy chain connection, where all the readers are connected in one long line. A star-type connection, where the readers are split into groups and each group is connected directly to the converter. It is recommended that the second alternative be used wherever possible. A star-type connection provides redundancy in terms of connections. This alternative is also preferable from the power supply point of view, as only one power supply for the Readers is necessary. The power supply should be located near the converter. When the line is divided into segments, the voltage drop along the segments is smaller. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 106 System 5.8. System Segregation. When operating the system, several security and operational considerations should be taken into account: Ensure that no similar equipment belonging to another company can operate your system. Limit unauthorized access between different departments of the same company. Allow a Service Provider to supply common services to several companies. Allow access to seal subgroups within a company. 5.8.1 Company Segregation by ORG_ID. ORG_ID is a unique value assigned in production to each customer. Every device supplied to that company is programmed with the ORG_ID. All communication sessions are based on a positive verification of the ORG_ID for complete match between the devices. There is no way to modify the value of the ORG_ID and only devices that comply with this request will get full service. In the event a Reader tries to communicate with a seal without appropriate ORG_ID and GLOBAL settings, the Illegal ORG_ID flag in the LONG STATUS will be set. (For information regarding the GLOBAL setting, see paragraph 5.7.3.). 5.8.2. Department Isolation. The inter-department relationship works on a similar concept to that described in section 5.7.1. It is possible to isolate equipment between departments by using the DEPARTMENT parameter. The default value of DEPARTMENT is zero. When set to default settings, all the devices can communicate without any limitations. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 107 5 System If a value has been inserted, only devices with the same DEPARTMENT value will establish communication and will get service. Different departments will have different DEPARTMENT values. Only a device with DEPARTMENT set to zero will get full access to all devices. Devices with DEPARTMENT value zero are considered supervisors. DEPARTMENT values are not factory pre-sets, and can be set by the customer. 5.8.3. Common Services To Several Companies By A Service Provider. The ORG_ID setting may comprise a barrier preventing access to all devices by a Service Provider. The GLOBAL parameter is designed to allow a Service Provider to service several customers. If programmed accordingly, the GLOBAL parameter will release the VERIFY command only to a Service Provider. When the GLOBAL parameter is in use, the seal will ignore the VERIFY command except for the parameters marked with * in table 5.2.1. The GLOBAL parameter is programmed during production. It should be defined and requested in advance. 5.8.4. How To Use Subgroups Of Seals In A Company. It may be convenient to the User to subgroup devices into small groups and then access them by group. The ADI parameter is used for this operation. The default value of ADI is zero. When set to default values, the ADI parameter is not in use and full access is available between all the devices. When ADI is programmed to a different value, only devices with the same ADI will communicate. The customer can program ADI on the fly. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 108 System 5.8.5: ORG_ID, DEPARTMENT, GLOBAL and ADI: Impact on seal's response The following logical statements can summarize seal response: 1. 2. 3. 4. Complete unmatched ORG_ID and GLOBAL is on: Seal will respond with limited VERIFY command only. Complete unmatched ORG_ID and GLOBAL is off: Seal will not respond. Complete match of ORG_ID and complete match of DEPARTMENT and complete match of ADI: Seal will respond without limitations. Complete match of ORG_ID and unmatched ADI: Seal will not respond. 5.9. Seal Memory. Seal memory is divided into 2 sections: EVENTS MEMORY and USER DATA. 5.9.1 Events Memory. This memory stores the events detected by a seal during normal operation. Memory size is 55 events. The memory has a FIFO type structure with 2 segments. The first segment can store 45 Events and is a simple FIFO buffer with the SET event at the beginning of the buffer. The second segment can store 10 Events and is a cyclic buffer with the last events detected. When this cyclic buffer is overrun, the SCROLL flag in the LONG STATUS is set. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 109 System First segment: SET 45 Events Second segment: 10 Events With the passing of time, the seal detects events that have been added to the seal. These additional events may be a result of an internal procedure or an external intervention. The following table summarizes Events handled by the seal: Table 5.15. Events Set Seal Tampered/ Wire changed (1) Low battery warning Seal open or cut (1) Seal close (1) Soft Set RTC Stopped Database corrupted Read Time Changed Suspended SET Event code 01h 02h 03h 04h 05h 07h 08h 09h 0Ah 0Bh 0Ch (1) These events are considered TAMPER Events. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 110 System 5.9.2. User Data USER DATA is the memory segment where free data for electronic manifests can be written and read. To use the USER DATA memory, the Write and Read Data commands should be used. Memory size is 2K. Special attention should be taken at the lower portion of the memory. The DataTerminal supports the lower portion of the USER DATA memory. The following instructions should be maintained to ensure full compatibility between the DataReader channel and the DataTerminal channel: Memory map of the lower portion. Address Address 0 Address 1 Address 2 Address 3 Address 4 Address 5 Address 52 1 Byte width UDT Time & Date Time & Date Time & Date Time & Date Data Data Version The value Version is the lower nibble of the address 0 and is the version of the USERDATA format. The value UDT is the upper nibble of the address 0 and is a number assigned the data base configuration by the User. Using this UDT, the system can perform an integrity check of the USERDATA in the system. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 111 System Time & Date is the last time and date when the data was written. Time and Date occupies 4 bytes and the format is: Date and Time parameter is a counter of 4 bytes with a resolution of 1 minute. The zero value starts from the date and time: 00:00:00 01.01.2000 The date and time is set to Greenwich Mean Time (GMT) in production and is stored under unlock mode. Bits and Bytes assignment: Address Minutes / 10 Month %4 Hours/10 Month / 4 Days/10 Years / 10 Minutes % 10 Hours % 10 Days % 10 Years % 10 Minutes range is: 0-59. Hours range is: 0- 23. Day range is: 1-31. Month's range is: 1-12. Year's range is: 00-99. Seconds range is: 0-59. Seconds field is relevant only for read & write parameters. From address 5 to 52 the data is according to the application design. 5.10. Calculating Reader Session Duration The total duration of a Reader Session can be calculated by using the following formula: Reader Duration=(Thw * 3 + Tbmm + 57) * 1.024 + Trw Tbmm and Trw are command dependent. Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 112 System 5.10.1. Calculating Tbmm: a) Verify & Tamper Command Tbmm = 10 msec b) Addressed Verify Command Tbmm = 13 msec c) SET, Suspended SET, Soft SET, Deep Sleep, Reset Data, Start Burst Mode, Stop Burst Mode and Acknowledge Burst Mode Commands. Tbmm = 4.5 + 4 * N msec Where N is the number of seals d) Read Data Command Tbmm = 9 msec e) Write Command Tbmm = (17 + Data Size)/2 msec 5.10.2. Calculating Trw: a) SET, SOFT SET and RESET DATA Commands Trw = Ts * N * 1.024 msec Where Ts is slot duration and N is the number of seals in a list. b) READ PARAMETERS, WRITE PARAMETERS, READ DATA and WRITE DATA Commands. Trw = 42 msec Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 113 System c) VERIFY, TAMPER and ADDRESSED VERIFY Commands. Trw = (Tiw + Ts * (Na + Nr + Nt)) * 1.024 msec Where Tiw, Ts, Na, Nr, N t are corresponding parameters of the command. d) READ EVENTS Command: Trw = ((Nmax + 1)/3) * 50 msec Where Nmax is the maximal number of events. e) START BURST MODE FOR ALL SEALS, STOP BURST Trw = 0 Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 114
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.2 Linearized : No Encryption : Standard V1.2 (40-bit) User Access : Print, Fill forms, Extract, Assemble, Print high-res Create Date : 2002:06:05 12:49:24 Modify Date : 2002:06:16 13:30:20+02:00 Producer : Corel PDF Engine Version 9.397 Author : roni Creator : CorelDRAW Version 9.397 Title : ch5.cdr Page Count : 66EXIF Metadata provided by EXIF.tools