Hi G Tek IGRS46D916 DataReader User Manual ch5

Hi-G-Tek Ltd DataReader ch5

Users Manual 2

Download: Hi G Tek IGRS46D916 DataReader User Manual ch5
Mirror Download [FCC.gov]Hi G Tek IGRS46D916 DataReader User Manual ch5
Document ID266311
Application IDx474lD5NmAOwGho+haCzJw==
Document DescriptionUsers Manual 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize185.75kB (2321849 bits)
Date Submitted2002-08-28 00:00:00
Date Available2002-08-26 00:00:00
Creation Date2002-06-05 12:49:24
Producing SoftwareCorel PDF Engine Version 9.397
Document Lastmod2002-06-16 13:30:20
Document Titlech5.cdr
Document CreatorCorelDRAW Version 9.397
Document Author: roni

Chapter 5
The
System
System
5.1.System description
5.1.1. General.
Hi-G-Tek DataSeals operate in sleep mode to conserve power. A
pre-determined periodically awakens them from sleep mode. This
allows them to monitor the surrounding airwaves for a Reader's
wake up signal.
Tw is the notation used throughout this manual for the wakeup cycle
time of the seal.
When the Reader initiates a session, it transmits a stream of data bits
of programmable length. The notation of the data stream length is Thw.
The seals use the SLOTTED ALOHA concept to communicate back to
a Reader. The length of an ALOHA time slot is notated as Ts. (Ts is
also notated as a window). This time slot is usually of fixed duration.
For the Verify, Addressed Verify and Tamper commands, Ts should
be defined externally in the command (see paragraph 5.6.3.2.).
Fig. 5.1 - RF Communication Channels
Reader Ineerrorgation
H atde
Readers
I terlace
Window
Random
Access
Window
Alert
Window
T iw
T hw
T cw
T aw
T rw
CompleteReaderSession
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
50
System
Ts can have one of the following values: 21, 41, 63, 81 msec.
The System has four communication channels
Reader Interrogation Header with time duration of Thw. Within
this time frame the Reader sends a data stream to the seals.
Readers Interlace Window with time duration of Tiw. This
window is to allow other Readers to transmit and to share one
Random Access Window.
Random Access Window with time duration of Tcw. During this
period seals responds in random access mode. Because the
access is random, collisions between seal messages are to be
expected.
Alert Window with time duration of Taw. The last channel is an
emergency channel allowing seals with high priority alert messages
to transmit the message to the Reader.
Trw is the notation used for the seals transmitting (Reader is receiving)
time frame.
A complete communication Reader Session is Thw + Trw.
To overcome collisions, the seals should retransmit their message
several times within the Random Access Window. The number of
retransmissions should be defined externally in the command and is
called Rr.
The seal may also retransmit in the Alert Window. This is notated as Rt.
Both Thw and Tw can be programmed.
The relationship between Thw and Tw should be kept constant.
Thw=Tw+ 135 msec
See paragraph 5.2.3. for information on how to calculate Thw
and Tw
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
51
System
When there are a certain number of seals in the Reader's receiving
zone, probability calculations show that more than one Seal
Transmission is required to obtain a complete result.
The following table demonstrates the number of retransmissions
required for different situations.
Table 5.1 Number of retries within the Random Access Window
Max
# of
Seals
10
12
14
16
18
20
25
30
35
Min #
of
Reader
Sessions
# Of seal slots (Ts)
30
40
50
60
70
80
90
100
110
120
130
140
150
160
170
180
190
200
210
220
230
240
250
10
10
10
10
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
52
System
Table 5.2. Minimum Requirements
Maximum #
Seals
Minimum #
Sessions
Minimum #
Windows
Optimum #
Retries
10
11
12
13
14
15
16
17
18
19
20
22
24
26
28
30
35
16
40
67
94
122
147
175
207
229
118
129
141
154
169
182
197
211
221
239
255
193
217
226
243
228
10
10
10
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
53
System
Table 5.3. below shows some examples of the Verify command using
different retransmissions and Reader Sessions. In this example,
Thw=3 sec; Ts=21 msec; Taw=105 msec.
Table 5.3.
Reducing the Reader Interrogation Header - Thw increases the
speed of the Verify session. Increasing the speed of the process is
in conflict with the battery lifetime of the seal. (Higher speed = lower
battery lifetime). When designing an application, careful attention
should be paid to optimizing the correct tradeoffs between system
response time, battery lifetime and number of seals.
Taw is calculated for 5 slots of Ts.
Table 5.4 demonstrates the impact of Thw on response time and
battery life. The scenario for the results in the table is a GATE
concept, whereby a seal is exposed to a reader for 6 minutes per
24 hours and: Ts=21 msec; Taw=105 msec.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
54
System
Table 5.4.
Number Thw Reader Number of
of
Session RetransmisSeals
time
sions
sec
Rr
0.67
0.5
Number
of
Reader
Sessions
Battery Total
Life
Verify
Years
duration
Sec
2.2
0.67
10
20
0.5
0.5
0.5
0.5
0.5
0.5
1.45
1.70
2.10
2.70
5.50
5.64
1.17
10
2.2
2.1
2.1
2.1
2.2
2.3
3.8
1.45
1.70
2.10
2.70
5.50
11.3
1.17
10
20
10
20
1.95
2.20
2.60
3.20
6.00
6.15
3.20
3.95
4.16
4.68
5.20
7.94
8.15
10
10
3.8
3.6
3.7
3.6
3.8
3.9
5.0
5.0
5.0
5.0
5.0
5.0
5.0
1.95
2.20
2.60
3.20
6.00
12.3
3.20
3.95
4.16
4.68
5.20
7.94
16.3
Table 5.5. demonstrates the impact of Thw on response time and
battery life for a YARD Management concept, where a seal is
constantly exposed to a reader 24 hours a day.
As mentioned previously, the reader in some cases should carry out
a number of Reader Sessions to achieve the required performance.
A group of Reader Sessions is a System Session. The frequency
in which the system performs System Sessions is a System Cycle
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
55
System
System Session
System Session
Reader
Reader
Reader
Reader
Session 1
Session 2
Session 1
Session 2
System Cycle
The following table uses: System Cycle = 15 min; Ts=21 msec;
Taw=105 msec
Table 5.5
Number
of
Seals
Thw
Reader
Session
time
sec
Number of
Retransmissions
Rr
Number
of
Windows
Number
of
Reader
Sessions
Battery
Life
Years
Total
Verify
duration
sec
10
20
10
20
10
20
1.15
1.95
2.16
2.79
3.21
5.94
6.15
2.15
2.95
3.16
3.79
4.21
6.94
7.15
3.15
3.95
4.16
4.79
5.21
7.94
8.15
10
10
10
40
50
80
100
230
240
40
50
80
100
230
240
40
50
80
100
230
240
3.78
3.63
3.23
3.23
3.0
2.82
2.47
5.0
5.0
4.54
4.54
4.11
3.77
3.16
5.0
5.0
5.0
5.0
4.7
4.24
3.48
1.15
1.95
2.16
2.79
3.21
5.94
12.29
2.15
2.95
3.16
3.79
4.21
6.94
14.29
3.15
3.95
4.16
4.79
5.21
7.94
16.29
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
56
System
5.2. System Parameters.
5.2.1. Seal Parameters.
Table 5.6. describes the seal parameters. These parameters are
accessible via either the Low Frequency or the High Frequency
channels using the READ and WRITE PARAMETERS commands.
Table 5.6: Seal Parameters
Parameter
Name
1 Tag/Seal
Status
(Short
Status)
2 Date &
Time
3 Seal Stamp
4 # of Events
5 Version of
firmware
6 Long
Status
7 Tw
8 Tp
9 ADI
10 Department
11 Tbrs
12 User Data
Size
13 Alert Bursts
Counter Cbrs.
14 Alert
Repetition
Rate for
Deep
Sleep
mode -Tds
15 Alert Bursts
Counter for
Deep
Sleep
mode - Cds
Parameter Parameter Read/Write Verify
Parameter
command
Code
Syntax
Access
Length
bit
Access
order
00hex
TS
15*
1 Byte
01 hex
D&T
14*
5 Bytes
17 hex
03 hex
06 hex
STMP
#EV
VER
5*
12*
9*
2 Bytes
1 Byte
2 Byte
07 hex
LTS
4 Bytes
31 hex
32 hex
13 hex
16 hex
34 hex
42 hex
TW
Tp
ADI
DEP
Tbrs
UDS
R/W
R/W
R/W
R/W
R/W
n.a
n.a
n.a
n.a
n.a
2 Bytes
2 bytes
4 Bytes
1 Byte
2 Bytes
2 Bytes
76 hex
Cbrs
R/W
n.a
1 Byte
77 hex
Tds
R/W
n.a
1 Byte
78 hex
Cds
R/W
n.a
1 Byte
* The above parameters are visible for Global=1 (See paragraph 5.8.3)
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
57
System
Table 5.7
rsio
rtB
le
rD
fo
te
sA
rtB
le
rfD
te
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
58
System
Table 5.8a - Short Status
Bit #
Status
Note
SET/TAMP
(1)(2)
LB warning
(2)
This bit is set to 1 by the SET command and
reset to 0 when a tamper event is detected.
When low voltage battery is detected this bit
is set to 1. This is a warning. There is
enough time to replace the seal.
Indication whether the seal wire loop is open
or closed.
Indication flag of suspended sleep mode of
operation.
Indication whether the seal wire loop
electrical characteristics were changed
relative to SET.
Indication of deep sleep mode of operation.
S/T
This flag is a logical OR of errors in the
following bytes.
GE
Open/Close
(1)(2)
Suspended
SET
Seal Wire
changed
(1)(2)
Sleep (3)
General
error
(2)(4)(5)
Spare
LBW
O/C
SS
WRC
SL
SPR
NOTES:
(1) These events are defined as TAMPER events.
(2) These flags will cause an alert, synchronized and unsynchronized.
(3) Sleep will generate an unsynchronized burst only if this mode is
activated.
(4) This flag may be reset by an external RESET STATUS RF
command of the flags that caused the error.
(5) This flag is set once one of the flags marked with * in the LONG
STATUS is set. This flag will be reset if the appropriate originator
flag is reset.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
59
System
Table 5.8b - Long Status
Byte Bit #
Byte Bit #
7*
6*
5*
4*
3*
0*
Status
SET/TAMP (1)(2)
Note
This bit is set to 1 at SET command
and reset to 0 when a tamper event
is detected.
LB warning (2)(4) When low voltage battery is
detected this bit is set to 1. This is a
warning. There is enough time to
replace the seal.
Open/Close
Indication whether the seal wire
(1)(2)
loop is open or closed.
Suspended SET Suspended set mode of operation
indication flag.
Seal Wire
Indication whether the seal wire
changed (1)(2)
loop electrical characteristics where
changed relative to SET.
Sleep (3)
Deep sleep mode of operation
indication flag.
General error
This flag is a logical OR of errors in
(2) (5)
the following bytes.
Spare
Status
Note
Life Counter 0
Flag indicating that the seal has
ended its lifetime.
RTC error
Flag indicating that a problem with
the Date & Time generator has
occurred.
LB error
This bit is set to 1 when severe low
voltage battery is detected. The
seal is about to stop working and
should be replaced immediately.
DB corrupted &
Database is protected; when an
restored (4)
error is detected and restored this
bit will be set to 1.
DB corrupted
When the database cannot be
restored after corruption, this bit will
be set to 1.
Lock (6)
For production use.
New Battery (4)
In use for devices with replaceable
batteries only.
Hardware error
Indication of a hardware error
detected.
S/T
LBW
O/C
SS
WRC
SL
GE
SPR
LCO
RTC
LBE
DBE
DBC
LCK
NB
HRE
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
60
System
Byte Bit #
7*
6*
5*
Byte Bit #
Status
Illegal ORG_ID
(4)
Note
Indication of an attempt to contact
the seal using unauthorized
equipment.
Command Failed Seal’s failure to execute a
command will set this flag to 1.
Unrecognized
Seal’s failure to recognize a
command
command will set this flag to 1.
Spare
Unsync Burst
Indication of Unsync Burst Mode of
Mode
operation.
Spare
Spare
Spare
Status
Note
Buffer full
In the commands: Read/Write Data
or Reader/Write Parameters or
Read Events. If the message is too
long this flag will be set to 1.
Scroll
When events in the seal’s memory
reach the upper portion, this flag is
set to 1
H.F Disable
Enables or disables the high
frequency channel using the Reset
Status command.
ORG_ID in Burst This flag can enable or disable the
Mode.
ORG_ID field in a seal’s message
in Burst Mode. Set and Reset is
done by an appropriate RF
Command (see paragraph
5.6.3.2.15)
Spare
Spare
Spare
Spare
OID
CMF
UNC
SPR
BMU
SPR
SPR
SPR
BF
SRL
HFD
ORGB
SPR
SPR
SPR
SPR
NOTES:
(1) These events are defined as TAMPER events.
(2) These events will cause an alert, synchronized and unsynchronized.
(3) Sleep will generate an UNSYNCHRONIZED burst only if this mode
is activated.
(4) These flags may be reset by an external RESET STATUS RF
command.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
61
System
(5) This flag is set once one of the flags marked with * in the
LONG STATUS is set. This flag will be reset only if the appropriate
originator flag is reset.
(6) For production use only.
* These flags will set the General Error flag.
Table 5. 9: Seal Parameters: Defaults and Extreme Values.
Parameter
Name
Default
value
Minimum Maximum Unit
Value
Value
Parameter
Length
1 Byte
Tag/Seal
Status
Date &
Time
Seal Stamp
# Of Events
Version of
firmware
Long
Status
Tw
5 Bytes
2 Byte
1 Byte
2 Byte
4 bytes
3000
400
10000
ADI
00000000 Department 00
Tp
10000
400
10000
12
Tbrs
4096
1024
10240
13
Alert Bursts
Counter-
10
50
32
40
50
10
11
0.977 2 Bytes
ms
4 Bytes
1 Byte
0.977 2 bytes
ms
0.977 2 bytes
ms
1 byte
Cbrs.
14
Alert
Repetition
Rate for Deep
Sleep mode-
250
ms
1 byte
Tds
15
Alert Bursts
Counter for
Deep Sleep
mode-Cds
1 byte
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
62
System
5.2.2. Reader Parameters.
Table 5.10 describes the Reader parameters. These parameters are
accessible via the serial communication port.
Table 5.10. Reader Parameters
Parameter
Name
1 Version of
MCU_firmware
2 Version of
S2_firmware
3 RSSI2
4 Reader ID
5 ADI ch2
6 Department
ch2
7 Thw ch2
8 Reader
Address
9 Transmitter
Power ch2
10 System ch2
11 Mode ch2
12 Thp ch2
Parameter Parameter Read/Write Parameter
Code
Syntax
Access
Length
01 hex
MVER
2 Bytes
40 hex
SVER2
2 Bytes
47 hex
02 hex
41 hex
42 hex
RSSI2
RID
ADI2
DEP2
R/W
R/W
1 Byte
4 Bytes
4 Bytes
1 Byte
45 hex
03 hex
Thw2
RADD
R/W
R/W
2 Bytes
2 Bytes
48 hex
TRPOR2
R/W
1 Byte
43 hex
44 hex
46 hex
SYS2
MODE2
THP2
R/W
R/W
R/W
1 Byte
1 Byte
2 Bytess
The Reader supports two channels. The RF Modem's
default position is channel 2. The channel must be specified
in the commands.
NOTE:
Channel 1 is intended for future use.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
63
System
Table 5.11. Description of Reader Parameters
Parameter
Name
Version of
MCU_firmware
Version of
S2_firmware
RSSI ch2
Reader ID
ADI ch2
Department
ch2
Thw ch2
Reader
Address
9 Transmitter
Power ch2
10 System ch2
11 Mode ch2
12 Thp ch2
Description
Provides the MCU’s firmware version
number.
Provide Slave’s firmware version
number in channel 2.
Provide RSSI level in channel 2.
This is the Reader’s ID.
See table 5
See table 5
Length of the Reader Interrogation
Header This parameter should match
Tw.
The address of the reader on the RS485 pary line
Sets output transmission power.
The MSB of the SYSTEM defines
whether the FOOTPRINT is ON or OFF,
see paragraph 5.2.6
Bits 6&7 define the Reader’s mode of
operation. See paragraph 5.5.
Length of the Reader Interrogation
Header for the Hard Wakeup command.
This parameter should match Tp of the
Seal.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
64
System
MCU is the main board of the DataReader.
S2 is the slave daughterboard in channel two in the DataReader.
Table 5.12.: Reader Parameters: Default Value and Extreme Values.
Parameter
Name
Version of
MCU_firmware
Version of
S1_firmware
RSSI ch2
Reader ID
ADI ch2
Department
ch2
Thw ch2
Reader
Address
Transmitter
Power ch2
System ch2
Mode ch2
Hard Wakeup
10
11
12
Default
value
[unit]
Minimum Maximum Unit
Value
Value
Parameter
length
2 Byte
2 Byte
00000000
00
1 Byte
4 Byte
4 Byte
1 Byte
997
0000
390
9766
65
100
00
00
3256
390
9766
3.072ms 2 Byte
2 Byte
1 Byte
1 Byte
1 Byte
3.072ms 2 Byte
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
65
System
5.2.3. Calculating Thw.
Thw is one of the system's most important parameters. It determines
both: system response time and the seal's battery lifetime..
The default value of Thw is 997 decimal where the units are
3.072 msec.
The meaning in terms of time is: 997 X 3.072 = 3067 msec.
Increasing Thw increases the seal battery's lifetime. On the other hand,
larger Thw values increase the system's response time. This is
illustrated in table 5.4
Example: Calculation of Thw for approximately 2 sec.
2000/3.072=651.042.
We will select 652 as the integer.
The final value of Thw is: 652 x 3.072=2003 msec.
5.2.4 Calculating Tw.
The difference between Thw and Tw should be a minimum of 135
msec, where Thw > Tw. A greater difference will shorten the seal
battery's lifetime
As Tw gets smaller the battery consumption gets higher.
A Tw unit is 0.997 msec.
The default value of Tw is 3000 decimal.
The meaning in terms of time is: 3000 X 0.997 = 2929 msec.
The difference between Thw and Tw for the default values is:
3067 - 2929 = 138 msec.
As can be seen, it is higher than the minimum 135 msec required.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
66
System
Example:
Calculate the appropriate Tw for a Thw=2003 msec.
1. Calculation of the approximate value for Tw: 2003 135=1868 msec
2. Calculation of the decimal value for Tw: 1868/0.997=1873.62
3. Find the integer value for Tw: The integer value is 1873, lower
than 1873.62 calculated in step 2, but not too small.
4. Verify the calculations.
Thw - Tw = 2003 - (1873 X 0.997)=135.6 msec>135 msec!
Readers Interlace Window is the window that other Readers can use
in order to transmit a message during interlace mode of operation.
By using this mode, all the Readers share a common set of Random
Access and Alert windows. This mode is useful if system analysis
shows that system response time will be improved.
Since the Readers share the same response windows, the Reader
Interrogation Header and the Thw of each Reader must be identical,
as should be the Thw of each Reader.
For k Readers, the Tiw will be:
Tiwj=TiwX(k-j)
where j=1,,,k
5.2.5 Calculating Thp.
Calculating Thp is identical to calculating Thw. To calculate Thp
refer to the appropriate Tp.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
67
System
5.3. Parameter's Format.
Most of the parameters have a simple binary value.
Some of them have a specific format.
5.3.1. Date & Time
The date and time are represented in Greenwich Mean Time (GMT).
Bits and Bytes assignment:
Byte# / Bit#
Month %4
Month / 4
Minutes / 10
Hours/10
Days/10
Years / 10
Seconds / 10
3 2 1
Minutes % 10
Hours % 10
Days % 10
Years % 10
Seconds % 10
Minutes range is: 0 - 59.
Hours range is: 0 - 23.
Day range is: 1 - 31.
Month's range is: 1 - 12.
Year's range is: 00 - 99.
Seconds range is: 0 - 59. The seconds field is relevant only for read
& write parameters.
NOTE: The character "%" denotes the operation of getting the
remainder.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
68
System
5.3.2. Seal Serial Number (or TF & ID).
The Seal Number is composed of 4 alpha characters and 8 decimal
digits. For example: QWER85723456
The ID is converted from two seperate fields. The Decimal conversion
is from 28 binary value into an 8 digit value.
The alpha characters are converted by using the following conversion
table. Each character is 5 bits:
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Binary
00001
00010
00011
00100
00101
00110
00111
01000
01001
01010
01011
01100
01101
01110
01111
10000
10001
10010
10011
10100
10101
10110
10111
11000
11001
11010
Text
* All other values are illegal.
The Seal Number is composed from the TF & ID fields in the
communication protocol. See Commands for further details.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
69
System
5.3.3. ORG_ID & DEPARTMENT.
ORG_ID is a 3-byte value.
DEPARTMENT is the least significant byte of the ORG_ID parameter.
DEPARTMENT values range from zero to 255 (or 0xFF).
ORG_ID* is composed of the 2 most significant bytes of the ORG_ID
parameter.
ORG_I D
ORG_I D*
DEPARTMENT
LSbyte
MSbyte
5.3.4 SYSTEM
SYSTEM is a parameter that defines the system characteristics.
Only bit 7 is in use.
Default value of bit 7 is 0.
When bit 7 is set to the value of 1, the FOOTPRINT option comes
into use. This option allows some of the commands to leave the
RD_ID as a footprint in the seal's memory for later tractability
(see paragraph 5.4.4).
5.3.5 MODE.
CRNC
UNSYNC
ABMSG
N.A
N.A
N.A
N.A
N.A
CRNC Carrier Sense: In some applications carrier sense should be
used before bursting into the air. The Reader uses this flag
to decide whether it is required or not.
CRNC=0 determines the regular mode: no carrier sense.
CRNC=1 determines the Reader's ability to sense the carrier.
The Reader executes the RF command only after determining
that the air is free.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
70
System
UNSYNC
In unsynchronized commands such as Unsynchronized
Alert, the Reader's receiver must be ON all the time looking
for incoming messages from the seals.
The Reader will set the required mode depending on the
flag's value.
UNSYNC=0 Synchronized mode only.
UNSYNC=1 Unsynchronized mode in use, receiver should
be set to on.
ABMSG
Burst Messages. This flag indicates whether the alert
messages will be sent following a GET Burst Message or
if the Reader will burst independently with Alert Messages.
BRMSG=0 determines the independent messages burst
mode.
BRMSG=1 indicates the GET Burst Message mode.
5.4 Seal Modes of Operation.
The seal can function in several modes of operation, in accordance
with the application.
5.4.1. Normal Mode.
In the normal mode of operation, the seal is in standby mode most
of the time. When a DataTerminal starts communication, the
transmitted message wakes the seal up.
As explained previously, the method used to establish communication
with the DataReader is different than that used for the DataTerminal.
Using a pre-determined cycle, the seal wakes and performs a channel
monitoring process, searching for the presence of a DataReader. The
frequency of this cycle is notated as Tw. In Normal mode, any event
detected by the seal will be logged in the EVENT Memory.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
71
System
5.4.2. Sleep Mode.
It is recommended to use the Sleep mode when a seal is not in use
in order to conserve energy. In this mode, the seal enters an extreme
power-saving mode. To exit this mode, interrogate the seal using the
DataTerminal or use the Hard Wakeup via the DataReader.
When the seal is in Sleep mode no EVENTS will be recorded
until a new SET is performed.
As opposed to the Normal mode, Sleep mode is not an operative mode.
5.4.3. Alert Burst Mode.
The seal should report any detected TAMPER event. The report can
be in the STATUS register of a VERIFY cycle. This approach is good
as long as the system's VERIFY cycle time meets the required system
response time. In applications in which the System Cycle is very long
and the TAMPER event is reported with a long delay, it is possible to
use the Unsynchronized Alert Burst mode. This mode allows the
seal to transmit a burst with a tamper message without waiting for a
Reader Session.
5.4.4. Events Footprint Mode.
A command issued by a Reader may be registered as an event in the
Events Memory by the seal.
This mode should be configured at the Reader before issuing the
command. This mode is useful for tractability purposes. It is possible
to track a specific Reader that performed the command by registering
the Reader ID in the seal's Event Memory with each command.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
72
System
5.5. Reader Modes of Operation.
The Reader can work in several modes of operation. This is defined
by the MODE parameter, which is a bit oriented parameter.
5.5.1 Carrier Sense Collision.
If set to 1, the Reader will be activated by the MSB's Carrier Sense
Collision Avoidance ability. This mode of operation is useful if the
Reader is activated individually, without synchronization with other
Readers in the same area.
5.5.2 Unsynchronized Mode.
When seals are operating in Unsynchronized Alert Burst mode, the
Reader's receiver must be ON at all times. This is done by setting bit
6 of the MODE parameter.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
73
System
5.6. System Commands.
The following paragraph is a general description of the system
commands.
For a deeper insight see the following:
For low-level RS-485/232 users, see chapter 6.
For high-level DLL users refer to the DLL help file.
5.6.1. LSC and Reader Messages.
Table 5.12: LSC Commands and Acknowledge Table:
Commands Set
Wakeup
Execute RF cmnd
Command
Code
E0 h
20 h
Get Results
15 h
Get Status
16 h
Get Burst Message
1C h
Reset Reader
Write Parameters
14 h
06 h
Read Parameters
BIT
Sleep
07 h
09 h
08 h
11
Unsync Ack
0A h
12
Get Reader’s baud
rate
Set Reader baud
rate
Set Reader’s
Address
Acknowledge OK
FF h
Wakes the Readers if they are in sleep mode.
Generates an appropriate command from the
Reader to the tags.
Allows the LSC to retrieve the results
received by the Reader from the tags in the
event of a tag-reader session.
In the event of a self-contained command, the
Reader will return to its current status.
This command should be used to retrieve the
alert messages received from the seals when
using the alert burst mode. Alert messages
originating from burst mode are not available
through the regular Get Results command.
Resets a Reader.
ModifiesReader PARAMETERS. Not all
parameters are accessible after the execution
of a LOCK command.
Reads Reader PARAMETERS.
Built-in Execute test
Places the Reader in Sleep mode of
operation to save power.
Reserved for unsynchronized responses, see
table 5.2
Allows the LSC to get the Reader’s baud rate.
FE h
Allows the LSC to set the Reader’s baud rate.
12 h
Sets Reader’s address for RS-485 usage
92 h
Acknowledge
Failed
Save Command
94 h
Acknowledgment of a message coming from
a Reader and to get the next packet.
Acknowledgment of an improper message
coming from a Reader.
Saves one of the above commands for later
execution. This command is used to
synchronize readers.
10
13
14
15
16
17
0F h
Comments
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
74
System
18
Execute Saved
command
17 h
19
Read Channel
Definitions
Write Channel
Definitions
11 h
Executes a command saved in the Reader.
When it is used in broadcast mode, all the
Readers execute the saved command
simultaneously.
Allows the Reader to read channel definitions.
10 h
Allows the Reader to write channel definitions.
20
Table 5.13: Reader Message Table
Message
Wakeup
response
2 Execute RF
cmnd response
3 Get Results
response
4 Get Status
response
5 Get Burst
Message
6 Reset Reader
response
7 Write
Parameters
response
8 Read
Parameters
response
9 BIT response
10 Sleep response
11 Unsync
Message
12 Get Reader’s
baud rate
response
13 Set Reader
baud rate
response
Message
Code
Commen ts
No response for WAKEUP string
20 h
15 h
16 h
1C h
14 h
06 h
07 h
09 h
08 h
0A h
When a Reader is in unsync mode the
Reader may send an unsynchronized
message. Such a message results from an
alert message coming from a seal.
FF h
FE h
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
75
System
14 Set Reader’s
Address
response
15 Save Command
response
12 h
16 Execute Saved
command
response
17 Read Channel
Definitions
response
18 Wri te C hannel
Definitions
response
0F h
Saves one of the above commands for
later execution. This command is used to
synchronize readers.
This is a broadcast command. There is no
response to this command.
11 h
Allows the Reader to read the definitions
of a channel.
10 h
Allows the Reader to write the definitions
of a channel.
5.6.2. Error Codes.
Errors
Unrecognized Command
MCU Error
HF Modem Error
Result is not ready
HF Modem is not responding
MCU I/O Error
HF Modem BIT Error
Parameter is locked
Illegal Parameter Code
Error Co de
01 h
02 h
03 h
05 h
06 h
07 h
08 h
09 h
0A h
5.6.3. Detailed Commands.
5.6.3.1. Wakeup.
5.6.3.1.1. Command Transmission.
Only a very short string needs to be sent by the LSC to wake a
sleeping Reader. The string is detected by the hardware and wakes
the Reader. This is a hardware-oriented command, therefore the
format is different than all the other commands.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
76
System
5.6.3.2. Execute RF Command.
5.6.3.2.1. Command Transmission.
This command enables communication sessions with seals. In the
data field the LSC inserts the relevant information allowing the
reader to easily compile the final command string.
LSC > Reader
Where the CMND is the “execute RF command” opcode. Channel
field is one of the following:
Channel
Channel 1
Channel 2
Code
01h
02h
Data contains the details of the RF command together with the RF
command opcode.
5.6.3.2.2. Verify.
This command verifies the status of seals that are in the Reader's
receiving zone. This is the most basic and the commonly used
command in the DataSeal system. When executing the Verify
command, the specific parameters for this command must be
defined.
The data field in the Execute RF Command will be:
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
77
System
Where:
Cnmd*
Tcm
The RF command's opcode.
Duration of the calibration message window.
Resolution is in units of 1024 msec.
Tiw
The duration of the readers interlace
window. Resolution is in units of 1024 msec.
Ts
Duration of a slot for receiving responses
from a tag or a seal. Resolution is in units
of 1024 msec.
Na
Number of slots in the Fixed Assignment
Receiving Window.
Nr
Number of slots in the Random Access
Receiving Window.
Nt
Number of slots in the Alert Receiving
Window.
Rr
Number of random retransmissions from a
tag in the Random Access Receiving
Window.
Rt
Number of random retransmissions from a
tag in the Alert Receiving Window
ASID
A unique and random ID, assigned by the
system to a specific assignment.
Parameters Mask The seal's parameters bit mask which the
tags and seals respond with.
Nr+Nt should be lower or equal to 255
The Bit Mask should comply with table 5.14 on the following
page.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
78
System
Table 5.14: Parameter Mask
* The length of Date & Time in Read and Write parameters is 4
bytes. See paragraph 5.3.1.
5.6.3.2.3. TAMPER.
Tamper is a command intended solely for interrogation of
tampered Seals.
The command is identical to the Verify command except for
the opcode, which is 11h.
Only the Seals that have detected tamper status respond. The
aim of this command is to provide high priority to tampered Seals
in a crowded Seal environment.
5.6.3.2.4. SET.
Cmnd*
(98h)
P#/PK
TF
TID
CRC
TF
TID
CRC
TF
TID
CRC
# of bytes
SET is the first command used prior to consigning a secured
cargo shipment. A SET command initiates the seal process.
The SET command initiates the seal process, and must be
performed when applying the seal to the cargo, prior to shipment.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
79
System
The Set command can be used on a number of or seals. The
maximum number of seals it can be used on is 8.
Where:
P#
PK
The high 4 bits of the first byte in the packet serial
number.
The low 4 bits of the first byte in the packet serial
of packets in the BMM string.
At present the packet option is not in use. The value should be 0x11.
5.6.3.2.5. Suspended SET.
The Suspended Set command functions in the same way as the
SET command. The only difference is that the SET command is
executed immediately, while the Seal will execute the Suspended
SET automatically only after the Seal wire has been plugged into
the Seal. The opcode for this command is 99h. The response is the
same response as the SET response but with 19h as the message
type.
5.6.3.2.6. Soft SET.
This command has the same structure as the SET command. The
difference is at the Seal level. In this command the seal marks the
command as an event, but doesn't reset the events memory. The
opcode for this command is 9Ah. The response is the same
response as the SET response but with 1Ah as the message type.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
80
System
5.6.3.2.7. Deep Sleep.
The Deep Sleep command allows battery power to be conserved
when seals are in storage and not in use.
Data
5.6.3.2.8. Hard Wakeup.
Hard Wakeup is the command that should be used to wake the
seal from deep sleep mode.
Data
5.6.3.2.9. Start Alert Burst Mode.
Seals usually operate in synchronized mode. In this mode, the
Seals respond to messages from the Reader. In applications where
the frequency of Reader sessions is low, the system's response time
is slow. This has a positive effect on power conservation and other
system considerations.
The seal can be programmed to send an independent asynchronous
alert. In this case, the response time to an alert situation will be short.
Start Alert Burst Mode command can be initiated in two separate
modes: Broadcast mode or Addressed mode.
Data
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
81
System
Starting specific tags:
Data
5.6.3.2.10. Stop Alert Burst Mode.
The Start Alert Burst mode operation can be stopped by the Stop
Alert command. The command can be initiated in two separate
modes: Broadcast mode or Individual Seal mode
Stopping all tags:
Data
Stopping specific tags:
Data
5.6.3.2.11. Ack Alert Burst Mode.
Data
This is to acknowledge receipt of the alert message from specific
seals. The seals will stop bursting until a new alert is detected.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
82
System
5.6.3.2.12. Read Data.
Data
Cmnd*
(63h)
TF
TID
BA
Base address
BL
Block length
# of bytes
Where:
This is the base address in the memory of the block of BA
data.
This is the data block length.BL
5.6.3.2.13. Write Data
Data
Cmnd*
(68h)
TF
TID
PK/P#
BA
Base address
Data
# of bytes
PK/P# = 11h. At present the packets are fixed.
5.6.3.2.14. Reset Data.
Data
Cmnd*
(AAh)
TF
TID
CRCt
TF8
TID8
CRC8
Seal #1
# of bytes
Seal #8
Up to 8 seals can be reset in one cycle.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
83
System
5.6.3.2.15. Set/Reset Status.
Data
Only some of the flags can be set and reset.
Bit mask marks the status bits to be reset.
When the value is set to “0”, this means: “don't modify”.
When the value is set to “1”, this means: “reset value to zero”.
Each bit corresponds to the appropriate bit in the LTS.
5.6.3.2.16. Write Parameters
Data
TF&TID=00 is for a broadcast command.
PK/P# = 11h. At present the packets are fixed.
5.6.3.2.17. Read Parameters.
Data
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
84
System
5.6.3.2.18. Addressed Verify.
Data
Cmnd*
(50h)
TF
TID
Tcm
Tiw
ts
Na
Nr
Nt
Rr
Rt
ASID
Parameters mask
# of bytes
The following parameters are not applicable to this command:
Na, Nt, Rt.
5.6.3.2.19. Read Events.
Data
Cmnd*
(61h)
TF
TID
EV#
# EV
# of bytes
Where
is the start event sequential number.EV#
is the number of events to be read from memory.#EV
5.6.3.3. Get Results.
After transmission of a request to execute a command, the system
should wait for a response. The Get Results command allows the
retrieval of the response from the Reader. This command is carried
out at the RS-485 level.
Using the DLL eliminates the need for the use of this command, as
the DLL takes care of the response. For details see the STAR CORE
DLL help file.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
85
System
5.6.3.4. Get Status.
5.6.3.4.1. Command transmission.
This command is used to retrieve the status of the READER.
LSC > Reader
CMND(0016h)
# of bytes
5.6.3.4.2. Get Status Command Response.
The following string is the general response.
Reader > LSC
MSGT(8016h)
R_status
# of bytes
R_STATUS field is 4 bytes.
Byte A
Byte B
Byte C
Byte D
Byte A represents the status of the main motherboard MCU.
The other bytes represent the RF modem status.
In a general Reader response, the R-Status reply contains bytes
A&B only. In command GET Status the reply contains all the
R-Status bytes.
Byte A:
UNLOCK
485
PCR
PER
VCCERR
VBERR
PMC
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
EDC
86
System
Where:
UNLOCK
if 0 reader's parameters are locked.
If 1 parameters are unlocked.
485
If 0 reader is using the RS-232 mode for
communication.
If 1 reader is using the RS-485 mode for
communication.
PCR
If 0 parameters in the MCU's E2ROM are OK.
If 1 parameters were corrupted and successfully
restored.
PER
If 0 parameters in the MCU's E ROM are OK.
If 1 parameters are corrupted.
VCCERR
if 0 internal power is OK.
If 1 internal power is not OK.
VBERR
if 0 internal battery is OK.
If 1 internal battery is not OK.
PMC
If 0 program memory in the MCU is OK.
If 1 program memory is corrupted.
EDC
a flag indicating that a delayed command was
triggered and is in process.
Byte B:
Ch1
Ch2
Ch3
Ch4
Ch1err
Ch2err
Ch3err
Ch4err
Where:
Ch1
If 0 channel1 is not in use.
If 1 channel1 is in use.
Ch2
If 0 channel2 is not in use.
If 1 channel2 is in use.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
87
System
Ch3
If 0 channel 3 is not in use.
If 1 channel 3 is in use.
Ch4
If 0 channel 4 is not in use.
If 1 channel 4 is in use.
Ch1err
If 0, channel is OK.
If 1, channel is defective. Details are in
byte C. If byte C flags are OK, there is a
communication failure with this channel.
Ch2err
If 0, channel2 is OK.
If 1, channel2 is defective. Details are in
byte C. If byte C flags are OK, there is a
communication failure with this channel.
Ch3err
If 0, channel3 is OK.
If 1, channel3 is defective. Details are in
byte D. If byte D flags are OK, there is a
communication failure with this channel.
Ch4err
If 0, channel4 is OK.
If 1, channel4 is defective. Details are in
byte D. If byte D flags are OK, there is a
communication failure with this channel.
Bytes C&D:
VCCERR
PMC
EMC
For ch 1& ch3
EME
VCCERR
PMC
EMC
EME
For ch2 & ch4
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
88
System
VCCERR
if 0 power is OK.
If 1, power is not OK.
PMC
if 0 program memory in the module is OK.
If 1 program memory is corrupted.
EMC
if 0 E ROM is OK.
If 1 E2ROM was corrupted and restored.
EME
if 0 E ROM is OK.
If 1 E ROM was corrupted.
5.6.3.5. Get Burst Message Command
5.6.3.5.1. Command transmission.
This command is used to retrieve the alert messages transmitted
asynchronously by seals that are in alert burst mode.
LSC > Reader
STX
#B
R#
CMND(001Ch )
Channel
CRC
ETX
# of bytes
Channel indicates the source channel for the results. The value is
according to the table in paragraph 5.5.2.1.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
89
System
5.6.3.5.2. Get Burst Message Command Response.
The following string is the general response.
Reader > LSC
STX
Where:
MSGT
DATA
#B
R#
MSGT (xx1Ch )
R_status
DATA
CRC
channel
PK
P#
Data*
# of bytes
# of bytes
high byte of MSGT is according the scenario in use.
The lower byte is 1C h.
If the result is not ready the value of this field is 05
hex error code see Paragraph 5.4.
If the result is ready the following applies.
PK
Total number of packets.
P#
Packet number sequence number.
Data*
ETX
This string contains the Seal's records. This field
should first be retrieved from all packets before
being analyzed.
Seals Records:
Data*1
Data*2
-------------Data*PK-1 Data*PK
Seal
Seal
Seal
Seal
Seal
Seal record
record
record
record
record
record
#B Data** #B Data** #B Data** #B Data** #B Data** #B Data**
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
90
System
Where:
Data**
TF
#B
Data**
TID
Message Type
Resultant Data
# of bytes
is the number of bytes for a seal record
(including the #B field).
is the data received after executing the RF command
led by TF, TID and Message Type.
If no seal detected:
Data*1
Seal record
#B=0
5.6.3.6. Reset Reader.
5.6.3.6.1. Command transmission
This command is used to performa software reset to a readerReader.
LSC > Reader
CMND(0014h)
# of bytes
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
91
System
5.6.3.6.2. Reset Reader Command Response.
The following string is the response.
Reader > LSC
MSGT(xx14h)
R_status
# of bytes
5.6.3.7. Write Parameters.
5.6.3.7.1. Command transmission.
This command enables modification of a parameter's value in the
Reader. It should be clear that not all the parameters are available
for modification. Table 5.2 specifies which parameters may be
modified.
LSC > Reader
PAR1code
CMND(0006h)
Data
value
PAR2 code
value
PARm code
value
# of bytes
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
# of bytes
92
System
5.6.3.7.2. Write Parameters Command Response.
The following string is the response:
Reader > LSC
MSGT(xx06h)
R_status
# of bytes
5.6.3.8. Read Parameters.
5.6.3.8.1. Command transmission.
This command is to enables the reading of a parameter's value from
the Reader.
LSC > Reader
CMND(0007h)
PAR1 code
PAR2 code
Data
# of bytes
PARm code
# of bytes
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
93
System
5.6.3.8.2. Read Parameters Command Response.
The following string is the response.
Reader > LSC
MSGT(xx07h)
R_status
value
Data
Value
# of bytes
value
# of bytes
5.6.3.9. BIT
5.6.3.9.1. Command Transmission
This command generates a set of built-in test procedures.
LSC > Reader
CMND(0009h)
# of bytes
5.6.3.9.2. BIT Command Response.
The following string is the response.
Reader > LSC
MSGT(xx09 h)
R_status
# of bytes
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
94
System
5.6.3.10. Sleep.
5.6.3.10.1. Command Transmission.
This command places the Reader in sleep mode to conserve energy.
The command is useful when the Reader is operating on battery
power. The Reader will wake when it receives a Wakeup command.
LSC > Reader
CMND(0008h)
# of bytes
5.6.3.10.2. Sleep Command Response
The following string is the response:
Reader > LSC
MSGT(xx08h)
R_status
# of bytes
5.6.3.11. Unsynchronized Reader Message.
5.6.3.11.1. Message Transmission.
If the Reader is in Alert Burst mode, a Burst Alert message may
be transmitted. The following string will be received for each seal.
Reader > LSC
MSGT(800Ah)
TF
R_status
TID
Data
Command code
# of bytes
Short status
ORG_ID
# of bytes
ORG_ID is an option in the response, depending on the seal's
configuration.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
95
System
5.6.3.11.2. Message Command Ack.
This is an ack issued by the host computer to the Reader is a
RS-232 application.
5.6.3.12. Get Reader's baud rate.
5.6.3.12.1. Command transmission
This command forces the Reader to report its baud rate.
LSC > Reader
R# (0000)
CMND (00f f h)
R_ID
# of bytes
5.6.3.12.2. Get Reader's Baud Rate Response.
The following string is the response.
Reader > LSC
MSGT(80ff h)
R_ID
baudrate
# of bytes
Baud rate: 2400, 4800, 9600, 19200, 38400
5.6.3.13. Set Reader's Baud Rate.
The baud rate is interpreted as a decimal number translated
into a 32 bit binary number or vise-versa.
5.6.3.13.1. Command transmission.
This command forces a new value for the Reader's baud rate.
The actual baud rate update is done after the completion of this
command and receipt of the response.
LSC > Reader
CMND (00f e h)
R_ID
baudrate
# of bytes
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
96
System
5.6.3.13.2. Set Reader's Baud Rate Response.
The following string is the response.
Reader > LSC
5.6.3.14. Set Reader's Address.
5.6.3.14.1. Command Transmission.
This command requests the Reader to set its address on the
RS-485 party line. Reader ID is used to distinguish between
Readers sharing the same communication lines.
LSC > Reader
5.6.3.14.2. Set Reader's Address Response.
The following string is the response.
Reader > LSC
The R# is with the new address.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
97
System
.5.6.3.15. Acknowledge OK.
This string is a one-way LSC string to acknowledge a positive
message coming from the READER. In case of packets, this will
acknowledge the last packet received.
LSC > Reader
5.6.3.16. Acknowledge Failed.
This string is a one-way string to acknowledge a message
indicating a problem originating from the READER.
LSC > Reader
5.6.3.17. Save Command.
5.6.3.17.1. Command Transmission.
In an application where a delayed command execution is required,
the command must first be defined. This is done by saving the
command in the Reader.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
98
System
LSC > Reader
CMND(0008h
0Fh)
phase
data
# of bytes
CMND*
Data*
# of bytes
Where:
Phase
CMND*
Data*
is the duration from the end of the “Execute
saved command” and the time required to
execute the saved command. The phase is
in units of 1.024 msec.
is the command code of the saved command for
delayed execution.
is the relevant data field for the CMND*
Data set to 0 clears the saved command.
5.6.3.17.2. Save Command Response.
The following string is the response.
Reader > LSC
MSGT(XX08h
XX0Fh)
R_status
# of bytes
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
99
System
5.6.3.18. Execute Saved Command.
5.6.3.18.1. Command Transmission.
This is a broadcast command sent to all Readers.
There will be no response from any Reader to this command.
LSC > Reader
CMND(0017h)
Reader ID [1]
data
4*k
# of bytes
Reader ID [2]
..........
Reader ID [k]
# of bytes
The data field details the Readers by their IDs
5.6.3.18.2. Execute Saved Command Response.
The following string is the response. There is no response for this
command.
Reader > LSC
STX
#B
R#
MSGT(XX08h)
R_status
CRC
ETX
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
# of bytes
100
System
5.6.3.19. Read Channel Definitions Command.
5.6.3.19.1. Command Transmission.
This command allows reading the definitions of a device.
LSC > Reader
CMND(0011h)
channel
# of bytes
Where:
is the channel number that the device is Channel
connected to. Channel can be 0 to indicate
the MCU, or 1,2 etc for the other channels.
5.6.2.19.2. Read Channel Definitions Response.
The following string is the response.
Reader > LSC
MSGT(XX11h)
R_status
file
82
# of bytes
Where:
File
is the data file that defines the device.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
101
System
File structure is:
Name
Size
[bytes]
Part number
Serial number
Hardware version
Production date
Production batch number
Description
Reserved
16
16
10
32
45
The file is in ASCII format.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
102
System
5.7. System Planning.
When planning an application, attention should be paid to both
system operation and topology. Application requirements and
electromagnetic environment characteristics should also be taken
into account.
The system has 2 basic applications: Fixed Reader applications
and Mobile Reader applications.
The Fixed Reader applications are applications where the Readers
are mounted in a fixed site. The Mobile applications are situations
where the Reader is mounted on a vehicle for monitoring seals in
transit.
5.7.1. Electromagnetic Environment.
Radio frequency communications is the basic technology used by
the system. While this is a very robust method for communicating
with remote devices, several issues should be considered when
planning a site:
- Metal walls should not be used to shield the remote devices.
- Communication distance between remote devices is not a constant.
- Communication distance may vary according to one or more of
the following:
Line of sight between devices - existence and clearance.
Proximity to metal objects.
Indoor or Outdoor environment.
Antenna orientation between the devices.
It is recommended to map the site with actual devices for proper
coverage. When planning the site layout, safe margins should be
taken into account to ensure proper operation at all times. Possible
environmental changes should also be considered. System utilities
should be used to test and verify proper and reliable operation.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
103
System
5.7.2. System Layout.
Two aspects should be considered when dealing with system layout:
1. Radio Frequency Communication Layout.
2. Line Communication RS-485 or RS-232 Layout.
5.7.2.1 Radio Frequency Communication Layout.
When only one Reader is in use, the previously mentioned
environmental considerations are all that need be taken into
account.
When more then one reader is in use, it should be understood that
in the same area only one Reader can communicate with the seals
at the same time. Interference will be caused by more than one
Reader trying to communicate with the seals in the same period in
time. The Readers should be synchronized using the application
software. Several Readers may operate simultaneously provided
that it has previously been confirmed that they will not interfere with
each other.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
104
System
5.7.2.2. Cellular Layout.
Cellular topology should be used to ensure efficient coverage of a
large area. The following drawing illustrates the concept.
Reader Zone
Readers must be properly placed to ensure there are no dead zones
within the defined area. Overlaps should be as shown in the above
drawing.
Reader Zone is the term used to describe the area of reliable
communication covered by a Reader. The Reader Zone is a CELL.
As the drawing illustrates, it is extremely important that the
application software controls and synchronizes the Reader's
operation in order to avoid air collisions.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
105
System
5.7.2.3. Reader Session Retransmissions.
Probability calculations were used to estimate Reader Session
retransmissions when creating System Sessions. However, it is
advisable that suitable retransmissions be on hand at the
application level to overcome unpredictable radio interference.
The actual number of retransmissions can be either fixed or
dynamic. These should be set in accordance with the application
requirements and the empirically evaluated on-site electromagnetic
characteristics.
5.7.2.4. Line Communication RS-485 Layout
The connection of many Readers to a Local Site Controller (LSC)
is done via the RS-485 protocol. Up to 32 Readers may be
connected to one COMM Port, depending on the type of RS-485
to RS-232 converter used.
Two topologies can be used:
A long daisy chain connection, where all the readers are
connected in one long line.
A star-type connection, where the readers are split into groups
and each group is connected directly to the converter.
It is recommended that the second alternative be used wherever
possible. A star-type connection provides redundancy in terms of
connections. This alternative is also preferable from the power
supply point of view, as only one power supply for the Readers is
necessary. The power supply should be located near the converter.
When the line is divided into segments, the voltage drop along the
segments is smaller.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
106
System
5.8. System Segregation.
When operating the system, several security and operational
considerations should be taken into account:
Ensure that no similar equipment belonging to another company
can operate your system.
Limit unauthorized access between different departments of the
same company.
Allow a Service Provider to supply common services to several
companies.
Allow access to seal subgroups within a company.
5.8.1 Company Segregation by ORG_ID.
ORG_ID is a unique value assigned in production to each
customer. Every device supplied to that company is programmed
with the ORG_ID. All communication sessions are based on a
positive verification of the ORG_ID for complete match between
the devices. There is no way to modify the value of the ORG_ID
and only devices that comply with this request will get full service.
In the event a Reader tries to communicate with a seal without
appropriate ORG_ID and GLOBAL settings, the Illegal ORG_ID
flag in the LONG STATUS will be set. (For information regarding
the GLOBAL setting, see paragraph 5.7.3.).
5.8.2. Department Isolation.
The inter-department relationship works on a similar concept to
that described in section 5.7.1. It is possible to isolate equipment
between departments by using the DEPARTMENT parameter.
The default value of DEPARTMENT is zero. When set to default
settings, all the devices can communicate without any limitations.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
107
5
System
If a value has been inserted, only devices with the same
DEPARTMENT value will establish communication and will get
service. Different departments will have different DEPARTMENT
values. Only a device with DEPARTMENT set to zero will get full
access to all devices. Devices with DEPARTMENT value zero are
considered supervisors. DEPARTMENT values are not factory
pre-sets, and can be set by the customer.
5.8.3. Common Services To Several Companies By A Service Provider.
The ORG_ID setting may comprise a barrier preventing access to
all devices by a Service Provider. The GLOBAL parameter is
designed to allow a Service Provider to service several customers.
If programmed accordingly, the GLOBAL parameter will release the
VERIFY command only to a Service Provider. When the GLOBAL
parameter is in use, the seal will ignore the VERIFY command
except for the parameters marked with * in table 5.2.1. The
GLOBAL parameter is programmed during production. It should
be defined and requested in advance.
5.8.4. How To Use Subgroups Of Seals In A Company.
It may be convenient to the User to subgroup devices into small
groups and then access them by group. The ADI parameter is
used for this operation. The default value of ADI is zero. When
set to default values, the ADI parameter is not in use and full
access is available between all the devices. When ADI is
programmed to a different value, only devices with the same ADI
will communicate. The customer can program ADI on the fly.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
108
System
5.8.5: ORG_ID, DEPARTMENT, GLOBAL and ADI: Impact on
seal's response
The following logical statements can summarize seal response:
1.
2.
3.
4.
Complete unmatched ORG_ID and GLOBAL is on: Seal will
respond with limited VERIFY command only.
Complete unmatched ORG_ID and GLOBAL is off: Seal will
not respond.
Complete match of ORG_ID and complete match of
DEPARTMENT and complete match of ADI: Seal will respond
without limitations.
Complete match of ORG_ID and unmatched ADI: Seal will
not respond.
5.9. Seal Memory.
Seal memory is divided into 2 sections: EVENTS MEMORY and
USER DATA.
5.9.1 Events Memory.
This memory stores the events detected by a seal during normal
operation. Memory size is 55 events.
The memory has a FIFO type structure with 2 segments.
The first segment can store 45 Events and is a simple FIFO buffer
with the SET event at the beginning of the buffer.
The second segment can store 10 Events and is a cyclic buffer
with the last events detected.
When this cyclic buffer is overrun, the SCROLL flag in the
LONG STATUS is set.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
109
System
First segment: SET
45 Events
Second
segment: 10
Events
With the passing of time, the seal detects events that have been
added to the seal. These additional events may be a result of an
internal procedure or an external intervention.
The following table summarizes Events handled by the seal:
Table 5.15.
Events
Set
Seal Tampered/
Wire changed (1)
Low battery warning
Seal open or cut (1)
Seal close (1)
Soft Set
RTC Stopped
Database corrupted
Read
Time Changed
Suspended SET
Event
code
01h
02h
03h
04h
05h
07h
08h
09h
0Ah
0Bh
0Ch
(1) These events are considered TAMPER Events.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
110
System
5.9.2. User Data
USER DATA is the memory segment where free data for electronic
manifests can be written and read. To use the USER DATA memory,
the Write and Read Data commands should be used. Memory size is
2K.
Special attention should be taken at the lower portion of the memory.
The DataTerminal supports the lower portion of the USER DATA
memory. The following instructions should be maintained to ensure
full compatibility between the DataReader channel and the
DataTerminal channel:
Memory map of the lower portion.
Address
Address 0
Address 1
Address 2
Address 3
Address 4
Address 5
Address 52
1 Byte width
UDT
Time & Date
Time & Date
Time & Date
Time & Date
Data
Data
Version
The value Version is the lower nibble of the address 0 and is the
version of the USERDATA format.
The value UDT is the upper nibble of the address 0 and is a number
assigned the data base configuration by the User.
Using this UDT, the system can perform an integrity check of the
USERDATA in the system.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
111
System
Time & Date is the last time and date when the data was written.
Time and Date occupies 4 bytes and the format is:
Date and Time parameter is a counter of 4 bytes with a resolution
of 1 minute.
The zero value starts from the date and time: 00:00:00 01.01.2000
The date and time is set to Greenwich Mean Time (GMT) in
production and is stored under unlock mode.
Bits and Bytes assignment:
Address
Minutes / 10
Month %4
Hours/10
Month / 4
Days/10
Years / 10
Minutes % 10
Hours % 10
Days % 10
Years % 10
Minutes range is: 0-59.
Hours range is: 0- 23.
Day range is: 1-31.
Month's range is: 1-12.
Year's range is: 00-99.
Seconds range is: 0-59. Seconds field is relevant only for read &
write parameters.
From address 5 to 52 the data is according to the application
design.
5.10. Calculating Reader Session Duration
The total duration of a Reader Session can be calculated by using
the following formula:
Reader Duration=(Thw * 3 + Tbmm + 57) * 1.024 + Trw
Tbmm and Trw are command dependent.
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
112
System
5.10.1. Calculating Tbmm:
a) Verify & Tamper Command
Tbmm = 10 msec
b) Addressed Verify Command
Tbmm = 13 msec
c) SET, Suspended SET, Soft SET, Deep Sleep, Reset Data, Start
Burst Mode, Stop Burst Mode and Acknowledge Burst Mode
Commands.
Tbmm = 4.5 + 4 * N msec
Where N is the number of seals
d) Read Data Command
Tbmm = 9 msec
e) Write Command
Tbmm = (17 + Data Size)/2 msec
5.10.2. Calculating Trw:
a) SET, SOFT SET and RESET DATA Commands
Trw = Ts * N * 1.024 msec
Where Ts is slot duration and N is the number of seals in a list.
b) READ PARAMETERS, WRITE PARAMETERS, READ DATA
and WRITE DATA Commands.
Trw = 42 msec
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
113
System
c) VERIFY, TAMPER and ADDRESSED VERIFY Commands.
Trw = (Tiw + Ts * (Na + Nr + Nt)) * 1.024 msec
Where Tiw, Ts, Na, Nr, N t are corresponding parameters of the
command.
d) READ EVENTS Command:
Trw = ((Nmax + 1)/3) * 50 msec
Where Nmax is the maximal number of events.
e) START BURST MODE FOR ALL SEALS, STOP BURST
Trw = 0
Hi-G-Tek Ltd. Microelectronics & Asset Tracking Technology
114

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.2
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Fill forms, Extract, Assemble, Print high-res
Create Date                     : 2002:06:05 12:49:24
Modify Date                     : 2002:06:16 13:30:20+02:00
Producer                        : Corel PDF Engine Version 9.397
Author                          : roni
Creator                         : CorelDRAW Version 9.397
Title                           : ch5.cdr
Page Count                      : 66
EXIF Metadata provided by EXIF.tools
FCC ID Filing: OB6-IGRS46D916

Navigation menu