Hi G Tek IGRS40916 DataSeal User Manual ch7

Hi-G-Tek Ltd DataSeal ch7

Users Manual 4

EvaluationSoftwareChapter 7
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 100Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1687  Evaluation SoftwareCheck to see if there has been any prior installation of the software.If a previous installation was detected, it must be removed before installing the new version. This may be done by clicking theUNINSTALL.EXE file on the CD-ROM.7.2. Communication Setup - Readers Administration.The Readers Administrationscreen may be accessed by clicking on the Readers  menubutton on the top of the screen. and then on Readers Administration. Alternatively, click on the Readers Administration icon or type Ctrl+R.  7.2.1.  Defining the readers connected.Reader ID and Reader Addressare used to add/remove readers.The readers may be connected  using either RS232 or RS485.  The Reader ID is located on the back of the Reader, in barcodeRS232 communication  allows the connection of a single reader to a PC. As only one user is connected, there is no necessity to define a specific reader address.05384437797.1. Software installation. To install the software, insert the CD-ROM disk into  your system's CD-ROM drive. Click on the install icon and follow setup instructions that appear on the seen7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 169and numeric format. To add a Reader, insert the Reader ID and click on the ADD button. To remove a Reader, use the mouse to mark it and click on the REMOVE button.RS485 communication allows several readers to be connected to a single PC. Prior to configuration, the User must decide on the placement of the readers and in accordance with the layout decide upon a specific Reader Address for each reader. 0538443779 57.2.2. Setting up the communication channel. In the Readers/Channel (CommPort) Administration box, click on the Com. Port drop down list to define your communication port. Click on the Baud Rate drop down menu list to the right of the Com. Port drop down list to define Baud Rate. Once youhave made your selection, click on the Set Comm Port button.NOTE: The Baud Rate is determined by the PC's capabilities; theReader itself can work at any of the Baud Rates defined in the drop down list.7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1707Evaluation Software7.3. Readers SetupTo start the Reader Setup, press on the ”Reader Setup” icon (Item 1 in Figure 7.1)  or select “Readers” and “Reader Setup as shown in Figure No. 7.2.                                                             0538443779 51Fig. 7.1Fig. 7.2Two groups of parameters are operated from that screen: MCU Setup and RF Modem Setup.  7.3.1. MCU Setup7.3.2. RF Modem SetupFirmware Version, LoaderVersion, and Reader ID are Read-Only parameters of the MCU Setup screen(Figure 7.1.) Reader Addressis the only parameter that can be modified. Fig. 7.3The first parameter, FirmwareVersion is a Read-Only parameter. All other parameters can be modified at any time.                               After writing the new parameters, for both the MCU and RF Modem, click on the “Apply” button.To get the existing parameters in the DataReader, select the appropriate Reader in the“Reader” box (Item 1 in Figure7.3). Click on the “Refresh”button if the parameters are notupdated automatically1
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1717Evaluation Software7.4. Built-In TestIn order to perform the test, click on “Readers” and then “Built-In” Test as shown in Figure 7.4.The “Test” window will open (Figure No. 7.5). Fig. 7.4Fig. 7.5Begin the process by selectingthe DataReader to be tested atthe box marked as Item 1 in Figure 7.5.To get the results of the last test, press on the “Get Current Reader Status” bar. To run a new test,press on the “Execute Built-InTest” bar and the new results will be displayed.132The “Voltage Values” displayed (Item 2 in Figure 7.5) are the actual values measured in the DataReader:  The first value (2.544) represents the MCU, the second (0) represents the RF Modem 1(not installed) and the third value (2.56) represents RF Modem 2. A detailed explanation of the abbreviations in this window (Item 3 in Figure 7.5)  is provided hereunder:
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1727Evaluation Software7.5. Login-Password Setup, Password ChangeWhen the program is started for the first time after  installation of the Evaluation Software, it will open at the lowestlevel of authorization.  A password is not required at thistime. Fig. 7.6To allow only authorized access using a password, click on  “Tools” as shown in Figure 7.6. The “Options” (Figure 7.7) will open.Fig. 7.7The  “Options” window is used forchanging the User, Administrator or Distributor passwords. Following Setup of the Evaluation software, the passwords are:For User:  userFor Administrator:  adminIn order to change the password for any of the three levels of authorization, key the appropriate information in the boxes and press on the “Change Password”button. If you wish to change the password of a certain user (User or Administrator), you must login as that user.132 Fig. 7.8If you wish to access the Evaluation Software without going through the ”Login” window (Figure 7.8), check the box titled “Always login using this user type of Password” (Item 1 in Figure 7.7).
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1737Evaluation SoftwareIf you wish the “Login” window to come up each time the Evaluation Software is activated Password Protection) clear the checkbox titled ”Always Login Using this user type and password”.  If this box is checked, the “Login “ window will not come up when opening the Evaluation Software. You will, however, always login as the user typeyou selected. If the lower checkbox (Item 2 in Figure 7.7 ) is checked, the “Login” window will come up with the selected user type as a default.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1747Evaluation Software7.6. Download DataReader Software Utility7.6.1.  MCU  Software UpdateThe DataReader's MCUSoftware update procedureis initiated from the ”Hi-G-Tek DataSeal Evaluation Software” screen.          Fig. 7.9Select “Tools” in the main menu and “Update Reader's Software” and mark “MCU” as shown in Figure 7.9When the “MCU Download”window comes up, select the DataReader to get the software update. The update can be performed to one DataReader,chained in the system at a time.Fig. 7.10Fig. 7.11If only one reader is connected you may choose the “All Readers (Address=0)” as shown in Figure 7.10.. If more than onereader is chained, the address of the specific reader needs to be selected. Press on the “Browse” button and mark the file containingthe software update. When the target reader and the file to bedownloaded are presented in the window (as shown in Figure 7.10), press on  the “Start” button to execute the download process.  Note: In the event that communication between the PC and the DataReader is not established within 10 seconds a message will come up as shown in Figure 7.11.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1757Evaluation Software7.6.2.  RF Modem Software UpdateThe DataReader's RF ModemSoftware update procedureis initiated from the ”Hi-G-Tek DataSeal Evaluation Software”screen.Select “Tools” in the mainmenu and “Update Reader's Software” and mark “RF Modem”as shown in Figure 7.12.Fig. 7.12Fig. 7.13When the “Device Download Utility” window comes up, select the DataReader which will get the software update. The update can be performed to one DataReader chained in the system at a time.If only one reader is connected you may choose the “All Readers (Address=0)” as shown in Figure 7.10. If more than onereader is chained, the address ofthe specific reader needs to be selected (as shown in figure 7.13).  Press on the “Browse” button and mark the file containing the software update. Press on the “Browse” button and mark the file containing the software update. Select “Device” in the DataReader           targeted for update: The RF Modem is at location 2.When the target reader, the file to be downloaded and the location of the RF Modem are presented in the window (as shown in Figure 7.13), press on the “Start” button to execute the download process.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1767.7. Performing Verify and Set CyclesAccess the Verify and Set menu by clicking on the Seals menu button on the top of the screen, and then on Verify and Set. Alternatively, click on the Verify and Set icon or type Ctrl+I.  7.7.1   Selecting the Reader.A specific Reader must beselected prior to the initialization of a COMMAND session.   To select a Reader, click on the Reader drop-down list and select the appropriate Reader from the list.  7Evaluation Software7.7.2   Broadcast Sessions.In Broadcast Verify mode, thereader sends interrogationmessages to all the seals.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1777.7.2.1  Setting Sessions ParametersTime Calibration Message;this parameter is not currentlyin use, and should be set to 0.Parameter size=1 byte.Tcm -Tiw - Time Interlace Window; thisparameter sets the time between the BMM (Broadcast Master Message) and thefirst reply slot. Minimum value=0, maximum value=16000. Parameter size=2 bytes.All numbers are represented as decimal digit values. The Tcm and Na parameters are not in use, and their value is 0. An explanationof the parameters follows below.Ts  - 7Evaluation SoftwareNa -   Number Assigned; Currently not in use. Value should be 0.Parameter size=1 byte.Number Random; Number of random slots. Only a numberfrom the statistical table may be entered. Parameter size=1 byte.Nt -  Number Tamper; Number of reply slots for the tamper message. Only a number from the statistical table may beentered.Rr -  Random Retry; The number of times the seal will senda transmission. To be set at the User's discretion. Only anumber from the statistical table may be entered.Nr -Time slot; Size of reply slot.Unit size=1.024 ms. This parameter has 4 values which variate according to the amount of data received. These values are 21, 41, 63, 82. Other values will cause a deviation. Parameter size=1 byte.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 178Retry Tamper; The number of times the seal will send a tamper message. To be set at the User's discretion. Only anumber from the statistical table may be entered.Nr, Nt, Rr & Rt Statistical Table Rr&RtNr&NtRt -7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1797.7.2.2   ADI DefinitionADI is the Seal Group Identification. Each seal can have an internal IDnumber. ADI defines the seals bygroup. All numbers on this screenare registered in decimal value. The ADI ranges from a minimum value of 0 to a maximum value of 64000.If the number entered in the ADI text box is "0", all seals respond.If a specific number is entered, theseals respond according to theirgrouping. See paragraph TBD.7.7.2.4  Single Session.Single Interrogation is one readersession of all seals answeringto a specific definition. This meansthat several results may be obtained.Click on the Single Interrogationbutton for a single reader session. Results of the session appear in a table to the left of the button (See section 4.2.6.)The Reader Session button, located directly beneath the ADI window box, defines actual session time. The system automatically defines session timeafter the User clicks on either theSingle or Cyclical Interrogationbuttons.7.7.2.3.  Reader Session7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1807.7.2.5  Multiple SessionsMultiple Sessions mode differs fromSingle Sessions mode in that the User can define the number of cycles of interrogation (up to infinite).The User can also define the waiting period between each session. The cyclical interogation can bestopped at any time by clicking onthe Stop Cycle button. Results of theinterrogation appear in a tableto the left of the button (See section 4.2.6.) Number of Cycles: Clicking on theBroadcast Verify Cyclical Interrogation button when there is a positive number in the Number of Cycles window box will cause the system to perform that number of sessions. When Number of Cycles is defined as -1, clicking on the Cyclical Interrogation button will cause the system to perform an unlimited number of sessions. System Pause: This option allows the User to define a pause between reader sessions.  Loop Through All Readers: When this option is selected, the System Pause acts as a delay between the various readers. NOTE: When the Loop Through All Readers option is selected, thevalue in the No. of Cycles window box must be greater than the number of readers defined.Session # and Reset: The Session # window box shows the sequential number of the next session. Clicking on the Reset button resets this counter. 7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1817.7.2.6  Reading the ResultsResults of the single and cyclical interrogations appear in tables tothe left of the interrogation buttons. The information in the tableincludes the seal ID, the number of events detected, seal stamp,seal short status, the session number which is the number of the session in cyclical interrogation mode and the reader number, the number of the reader being interrogated. Results are accumulated and can be stored to disk or printed by clicking on the FILE menu button located on the upper left portion of the screen. 7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 182NOTE:  To sort the interrogation results by Seal ID number, click on the Seal ID column header . To sort by session number, click onthe Session column header.  Generally, items marked in red indicate errors. Items in red appearing in the Seal Short Status field indicate warnings or errorstatus, while those appearing in gray are normal.7.7.3  Addressed Verify SessionsThe Addressed Verify Sessionsdiffer from the Broadcast Verifysessions in that the reader sends interrogation messages to a specified seal. All parameter definitions described in section 4.2. are relevant here as well.To initiate an Address Verify Session, enter Reader and Seal IDdata in the relevant windows in the upper portion of the screen and click on the required mode of interrogation (single or cyclical). To enter Seal ID automatically, click on the required seal ID that appears in the result table of a broadcast session.7.7.3.1  Single Session7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 183For a single interrogation, click on the Single interrogation button.Results are displayed in the table to the left of the button (1) andin the Seal Status table (2) to the right of the button. Items appearingin red in the Seal Status table indicate error status. Items appearingin black indicate normal status.12Multiple Sessions mode differs from Single Sessions mode in that the User can define the number of cycles of interrogation (up toinfinite). Results are displayed in the table to the left of the button (1) and in the Seal Status table (2) to the right of the button. Items appearing in red in the Seal Status table indicate error status. Items appearing in black indicate normal status.7.7.3.2. Multiple Sessions 17Evaluation Software2
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 184Number of Cycles: Clicking on the Addressed Verify and Set Interrogation button when there is a positive number in the Number of Cycles window box will cause the system to perform that number of sessions. When Number of Cycles is defined as -1, clicking on the Cyclical Interrogation button will cause the system to perform an unlimited number of sessions. System Pause: This option allows the User to define a pause between reader sessions.  Loop Through All Readers: When this option is selected, the System Pause acts as a delay between the various readers. NOTE: When the Loop Through All Readers option is selected, thevalue in the No. of Cycles window box must be greater than the number of readers interrogated.Session # and Reset: The Session # and Reset options are not operational in multiple session mode. The system will stop, however,If a number has been entered in the Number of Cycles field. The cyclical interogation can be stopped at any time by clicking onthe Stop Cycle button. Results of the interrogation are displayed in the Seal Status table at the right of the button, and in the table to the left of the button. 7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1857.7.3.3. Reading the ResultsAfter interrogation the following results are received: a) In the main information table:     Date and Time, Number of Events, Seal Stamp,     Reader Address and Seal Status.b) In the Seal Status Table to the right of the buttons. Status events    with detected errors are marked in red. Events marked in black     are normal.      RTC - Real time clock errorLBE - Low bat errorDBE - Data base errorDBC - Data base corruptedLCK - LockedNB - New batteryIOD - Illegal org IDCMF - Command failureS/T - Set or tamperLBW - Low battery warningO/C - Open/closeSS - Suspended setWRC - Wire changeSL - Deep sleep modeGE - General ErrorLCO - Life counter = 07Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 186UNC - Unrecognized CommandBMU - Burst Mode UnsynchronicBF - Buffer FullSRL - Scroll EventHFD - High frequency disabledORGB - Org ID disabled    7.7.4 SET SessionsA SET sesion is used to reset and arm a seal. A SET session can only be applied to a pre-defined seal. To initiate a SET Session,  ensure that Seal Wirehas been connected. Enter Reader and Seal ID data in the relevant windowsin the upper portion of the screen and click on the SET button. Any change in the seal status will dispay a TAMPmessage.  7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1877.8.  Performing General Commands Cycles.The main function of the General Commands Cycles is to get acquainted with the system. Access the General Commands  screen by clicking on ALL COMMANDS located in the Seal drop down menu. Alternatively, click on the ALL COMMANDS icon or type CNTRL+A.7.8.1.  Selecting a ReaderSelect a reader by clicking on the reader drop down list. Clickon the appropriate reader to select it.NOTE: Parameters appearing in the Command Data window may be changed by the User according to the data in the statistical table. 7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1887.8.3.  Defining Seals7.8.2.  Selecting a CommandSelect a command by clicking on the Command Code drop downlist, and then by clicking on the appropriate command. Parametersof the selected command appear in the Command Data window below. The number appearing in the fiels to the right of the Command Code field is the OPCODE>A seal is defined by typing seal ID in the Seals/Tags ID window. The Seal ID number can be found in numeric and barcode format on the seal.  7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1897.8.4.  Setting the System Session Duration7.8.5.  Setting the Command Parameters System session duration is automatically set by the system uponinitiation. This may be changed by the User in accordance withspecific requirements. Command parameters are initially determined by the system, andappear in HEX format in the Command Data window box after a Command Code has been selected. If necessary, parameters may be changed in accordance with the User's requirements.NOTE: Time settings differ according to parameters of the chosencommand. If the parameters are changed, the User should try to initiate a session using the default settings. If a Command Fail message is received, the time should be increased. For detailsregarding calculation of time setting, see paragraph 5.10.System pause is the pause between sessions when the system isin cyclic mode. This may also be set by the user.7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1907.8.6.  Single or Continuous SettingsSimilar to Single and Cyclic Interrogation, Command Executionand Cyclic Execution perform single and cyclic execution of thechosen command. Results appear in the box below the buttons.To stop a Cyclic Execution session, click on the Stop button.7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1917.8.7   Commands7.8.7.1.  Verify  CommandClicking on one of the commands in the Command Code drop down list  initializes that command's Command Screen. Followingis a description of the commands:The VERIFY command is used to seek all the seals located in the area that answer the following conditions: - ORG ID - ADI  - Department An explanation of the command parameters can be found in chapter 5.The significant parameters which accompany the command in the following example are: (A prior requisite is that the Tiw  has been reset)Number of windows: NR=32 hexSize of seal transmission window: Ts=29 hexNumber of seal re-transmissions: Rr=02 hexParameters required for reading are:Short StatusDate & TimeNumber of EventsVersion of FirmwareLong StatusSeal StampTable 5.4 in chapter 5 defines the Bit mask required for these parameters. Bit Mask=d360 hex.7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 192The initial response string always includes information regardingNumber of Bytes, Seal ID and Message Type. A seal may receive a number of identical responses depending on the number of re-transmissions (Rr) defined and the results of conflicts with otherseals.. Number of Bytes=19Seal ID=48481010102fMSGT=10Short Status=00 hexDate & Time=33099301 hexNumber of Events=01 hexVersion of Firmware=0203 hexLong Status=00000000 hexOrg_ID=123400Seal Stamp=701d hexExplanation of Results:NOTE: If the Global Parameter is activated, Reader access to some of the parameters will be blocked (see section 5.4).7Evaluation Software
193Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology7Evaluation Software7.8.7.2. Tamper  Command7.8.7.3. Addressed VerifyThe TAMPER command is used to find all seals in the Reader's range which indicate a TAMPER status. Command definition and method of execution are identical to those of the VERIFY command described in section 7.8.7.1. The ADDRESSED VERIFY command is a VERIFY command for a specific seal. In order to affect this command, the Seal ID must be entered into the required field. All other parameters are identical to those of the VERIFY command described in section 7.8.7.1.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1947.8.7.4. SETThe SET command is used to arm or set one or several seals.  Up to eight seals can be set in a single session. The SET command cannot be activated if the Seal Wire is notconnected to the sealInitiation of the SET command deletes all events stored in theEVENTS MEMORY. An additional explanation of this featurecan be found in the Hi-G-TEK DataTerminal user manual.Seal status will be indicated as closed (OK) or open (FAIL). An example of this can be seen in the RESPONSE window of theillustration below: The first row indicates an open seal and TAMPER status, and therefore a FAIL result, while the second row indicates a closed seal, status OK.7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1957.8.7.5. Soft SETSimilar to the SET command, the SOFT SET command is used to arm or set one or several seals. Up to eight seals can be set in a single session. The SOFT SET command cannot be activated if the Seal Wire is not connected to the seal.Seal status will be indicated as closed (OK) or open (FAIL). An example of this can be seen in the RESPONSE window of theillustration below: The first row indicates an open seal and TAMPER status, and therefore a FAIL result, while the second row indicates a closed seal, status OK.The main difference between the SOFT SET and SET commandsis that the SOFT SET command does not delete previous eventsstored in the EVENTS MEMORY. 7Evaluation Software
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1967Evaluation Software7.8.7.6. Suspended SETSimilar to the SET and SOFT SET commands, SUSPENDEDSET is used to arm or set one or several seals. Up to eight seals can be set in a single session. The SUSPENDED SET command can only be initiated if the SealWire has not beenconnected to the seal. Seal status will be indicated as closed (OK) or open + suspendedset. An example of this can be seen in the RESPONSE window ofthe illustration below: The first row indicates an open seal that has not been sealed with Seal Wire. The status shows the seal is open  + suspended set, waiting to be sealed. The second row indicates a closed seal, status OK.In the event of a FAIL status response, the message type response is "99".
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1977Evaluation Software7.8.7.7. Read DataThe hex and ASCII data in the Response window appears on the DataTerminal screen as follows:The READ DATA command allows the Reader to retrieve data from a single seal located in the User Data area. There are two separate storage areas in each seal, ranging fromaddress 00 to address 53. The first area, from address 00 to 53, is used to store data used by the DataTerminal. The data-rangecanalso be used by the HF system (both reading and writing).  Data stored from address 54 to 2K is defined as a free high frequency area. The illustration below demonstrates the reading of an 18 byte block, starting at address 5. This is shown in comparison to the same DataTerminal user data. The response is shown in both hex and ASCII formats. The largest block size that can be read in one session is 67 bytes.In the event of a FAIL status response, the message type response is "E3".CID: ......................................Cont: ...................................Dest: ...................................Point dataterminal at sealpress ok to confirmACEG78945618527321
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1987Evaluation Software7.8.7.8. Write DataThe WRITE DATA command allows the User to write text in the entiredata area. This command can only work with one seal at a time. There are two separate storage areas in each seal, ranging fromaddress 00 to address 53. The first area, from address 00 to 53, is used to store data used by the DataTerminal. The data-range can also be used by the HF system (reading and writing).  Data stored in address 54 to 2K is defined as a free high frequency area. Maximum block size for a single session is 67 bytes.In the event of a FAIL status response, the message type response is "E8".P#PK BaseAddressDataBlockRead Data commandcan only work with oneseal IDNumberof bytes MsgtSeal ID ShortStatus
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 1997Evaluation Software7.8.7.9. Read ParameterThe READ PARAMETER command enables the User to readparameters from a single seal (see table 5.4).
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 2007Evaluation Software7.8.7.10. Write ParameterThe WRITE PARAMETER command enables the User to update some of the seal parameters (see table 5.4). The screen below illustrates an update of the ADI parameter. In the event of a FAIL status response, the message type response is "E9".The RESET DATA command allows the User to reset all USER DATAfrom address 00 to address 2K. 7.8.7.11. Reset Data
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 2017Evaluation Software7.8.7.12. Deep SleepThis command sends the seal into DEEP SLEEP mode. Prior to initialization of the command, seal IDs must be defined. Thiscommand can work with up to eight seals.7.8.7.13. Hard WakeupThe purpose of this command is to bring seals in DEEP SLEEP mode back to regular operating mode. Only seals that are on the seal ID list and are in DEEP SLEEP mode will be affected. This command can work with up to eight seals at at time.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 2027Evaluation Software7.8.7.14. Start Alert BurstThe START ALERT BURST command transforms the seal from its current operating mode to a burst mode of operation. In Alert Burst operating mode, whenever a seal is opened a transmissiondetailing the opened seal ID is automatically sent.The START ALERT BURST command can work with up to eightseals. The number of transmissions and the pause between each transmission is predetermined (see table 5.4). The ACKcommand, detailed in section 7.8.7.18, can be used to stop a burst transmission.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 2037Evaluation Software7.8.7.15. Start Alert Burst (all)Similar to the START ALERT BURST command, the START transforms the seal from its current operating mode to a burst mode of operation. The differencebetween the two is that in the case of START ALERT BURST(ALL), all seals in the area will be transferred to this modeof operation.   ALERT BURST (ALL)No response is received in the RESPONSE window when thethe START ALERT BURST (ALL) command operates in Broadcast mode.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 2047Evaluation Software7.8.7.16. Stop Alert BurstThe STOP ALERT BURST command stops the seal from working in Alert Burst mode and returns it to the regular mode of operation.The STOP ALERT BURST (ALL) command differs from theSTOP ALERT BURST command only in that it applies to all the seals located in the Reader's vicinity. When the command is transmitted in Broadcast mode, no reply is received in the Response window.7.8.7.17. Stop Alert Burst (all)
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 2057Evaluation Software7.8.7.18. Ack AlertThe ACK ALERT command confirms to the seal that its messagehas been received. After receiving an ACK ALERT command theseal stops transmitting until a new TAMP EVENT is detected.The ACK ALERT command can work with up to eight seals at a time.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology 2067Evaluation Software7.8.7.19.  Read EventsThe READ EVENTS command is used to read all events storedin the EVENTS MEMORY. As is illustrated in the sample screen below, the Command Datafield contains two numbers. The first defines the first event to beread, the second number defines the total number of events to be read.The response is recorded in both hex and text formats. (See table 5.8. for a list of appropriate events.)The READ EVENTS command is compatible with two eventtypes: short events (8 bytes) and long events (16 bytes).  In thesample screen illustration below, events 1 and 5 are long events.All the rest are short events.

Navigation menu