TransCore IT241005422 Low power RFID tag programmer transmitter User Manual 411360 002 IT2410 Tag Programmer UG

TransCore Low power RFID tag programmer transmitter 411360 002 IT2410 Tag Programmer UG

users manual

Download: TransCore IT241005422 Low power RFID tag programmer transmitter User Manual 411360 002 IT2410 Tag Programmer UG
Mirror Download [FCC.gov]TransCore IT241005422 Low power RFID tag programmer transmitter User Manual 411360 002 IT2410 Tag Programmer UG
Document ID410856
Application IDHfNqiwsYsXE1gPvVSqh3TQ==
Document Descriptionusers manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize132.36kB (1654458 bits)
Date Submitted2004-04-01 00:00:00
Date Available2004-03-30 00:00:00
Creation Date2004-01-20 10:26:25
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2004-03-25 09:40:27
Document Title411360-002_IT2410 Tag Programmer UG.book
Document CreatorFrameMaker 7.0
Document Author: jstikar

IT2410 Tag Programmer
User Guide
TransCore, Inc.
19111 Dallas Parkway, Suite 300
Dallas, Texas 75287-3106
October 2003
P/N 411360-002
Information in this document is subject to change and does not represent a commitment on the part of
TC IP, Ltd.
©2004 TC IP, Ltd. All rights reserved. TRANSCORE and Amtech are registered trademarks of TC IP, Ltd.
and are used under license. All other trademarks listed are the property of their respective owners. Contents
subject to change. Printed in the U.S.A.
For further information, contact:
TransCore
19111 Dallas Parkway, Suite 300
Dallas, Texas 75287-3106 USA
Phone:
Fax:
(972) 733-6600
(972) 733-6699
TransCore Action Center (TrAC)
19111 Dallas Parkway, Suite 300
Dallas, Texas 75287-3106 USA
Phone:
Fax:
(800) 755-0378
(972) 733-6695
For comments or questions about this document, e-mail tech.pubs@transcore.com.
WARNING TO USERS IN THE UNITED STATES
FEDERAL COMMUNICATIONS COMMISSION (FCC) RADIO FREQUENCY
INTERFERENCE STATEMENT
47 CFR §15.105(a)
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device
pursuant to Part 15 of the Federal Communications Commission (FCC) rules. These limits are designed to
provide reasonable protection against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can radiate radio frequency (RF) energy and
may cause harmful interference to radio communications if not installed and used in accordance with the
instruction manual. Operating this equipment in a residential area is likely to cause harmful interference, in
which case, depending on the laws in effect, the users may be required to correct the interference at their
own expense.
NO UNAUTHORIZED MODIFICATIONS
47 CFR §15.21
CAUTION: This equipment may not be modified, altered, or changed in any way without permission
from TransCore, Inc. Unauthorized modification may void the equipment authorization from the FCC and
will void the TransCore warranty.
USE OF SHIELDED CABLES IS REQUIRED
47 CFR §15.27(a)
Shielded cables must be used with this equipment to comply with FCC regulations.
A license issued by the FCC is required to operate this RF identification device in the United States.
Contact TransCore, Inc. for additional information concerning licensing requirements for specific devices.
TransCore, Inc.
USA
Contents
Contents
1 Getting Started
Purpose. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Plan and Organize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Guide Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
2 IT2410 Tag Programmer Overview
Purpose of Tag Programmer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Programming Head . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Indicator LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Standard Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Anti-Static Wrist Strap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
3 IT2410 Tag Programmer Hardware
Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
ESD Protection Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
ESD Workstation Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Using the ESD Wrist Strap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
vii
IT2410 Tag Programmer User Guide
4 IT2410 Tag Programmer Setup
Equipment List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
Connecting the IT2410 Tag Programmer to a PC . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Powering Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Programming Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Verifying Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
A Tag Programmer Specifications
Environmental . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3
Mean Time Between Failure (MTBF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-4
Maintainability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-4
B PC Interface Definitions
C Frequently Requested Tag Programming Information
Identification, Serial Number, and the Global Password . . . . . . . . . . . . . . . . . . . . C-3
Changing the Global Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-6
Reading and Setting Nonvolatile Status for General Pages . . . . . . . . . . . . . . . . . C-7
Locking Frames (Page Locks) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-7
Auto Beep on Acknowledge and Read Sequences . . . . . . . . . . . . . . . . . . . . . . . . C-8
Using the Custom Message Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-10
D Application Program Interface
Interface Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-3
Ethernet Communications Conduit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-3
RS–232 Communications Conduit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-4
Communications Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General Software Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Programmer-to-Host Software Communications Protocol . . . . . . . . . . . . . . . . . . .
Serial Data Acknowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Ethernet Asynchronous Command and Response Protocol . . . . . . . . . . . . . . . . . .
viii
D-4
D-4
D-4
D-6
D-7
Contents
Serial Error Detection and Recovery for the Programmer . . . . . . . . . . . . . . . . . . . D-8
Serial Message Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-8
Serial Sequence Numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-10
Serial Asynchronous Responses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-10
Command List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Identify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Restore Programmer Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reset Programmer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Save Programmer Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Get/Set Programmer Security Characters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Get/Set Programmer Serial Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Get/Set Programmer Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Set Programmer Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Programmer Command Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Get/Set Communications Baud Rate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Get/Set Ethernet Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Get/Set Programmer RF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Get/Set Time/Date. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
D-10
D-12
D-13
D-14
D-15
D-15
D-17
D-17
D-18
D-20
D-22
D-22
D-23
D-24
Asynchronous Responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-26
Power on/Boot/Diagnostics Status Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-26
Valid Response Tag Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-27
ix
IT2410 Tag Programmer User Guide
List of Figures
Figure 1-1
Figure 2-1
Figure 2-2
Figure 2-3
Figure 2-4
Figure 4-1
Figure 4-2
Figure B-1
Figure D-1
IT2410 Tag Programmer (Top View) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Tag Programming Head . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
IT2410 LED Status Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Banana Plug on ESD Wrist Strap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
ESD Wrist Band Socket Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
IT2410 Tag Programmer System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Power and Serial Interface Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Pin-out Diagram for Power Plug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3
Programmer Command Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-21
List of Tables
Table 1-1 Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
Table 2-1 Indicator Lights, Descriptions, and Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Table 4-1 Programmer Operations and Corresponding Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Table A-1 IT2410 Tag Programmer Physical and Environmental Specifications . . . . . . . . . . . . . . . . . . A-3
Table B-1 PC Interface Protocol Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3
Table C-1 Tag Page Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3
Table C-2 Mode Bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-8
Table C-3 A/V Options Bits Decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-9
Table D-1 Communications Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-4
Table D-2 Command Responses and Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-6
Table D-3 Message Responses and Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-7
Table D-4 Asynchronous Responses and Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-8
Table D-5 Tag Programmer Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-11
Table D-6 Identify Command Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-12
Table D-7 Programmer Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-13
Table D-8 Values for Programmer Configuration Bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-14
Table D-9 Factory Default Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-14
Table D-10 Reset Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-14
Table D-11 Security Characters Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-15
Table D-12 Valid Security Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-16
Table D-13 Programmer Security Characters and Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-16
Table D-14 Serial Number Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-17
Table D-15 Programmer Status Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-18
Table D-16 Set Programmer Password Command Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-19
Table D-17 Password Status Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-19
Table D-18 Set Password Command Responses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-20
Table D-19 Communications Baud Rate Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-22
Table D-20 Ethernet Parameters Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-22
Table D-21 C-String Format for Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-23
Table D-22 Programmer RF Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-23
Table D-23 Valid Transceiver Frequencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-23
Table D-24 Programmer RF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-24
Contents
Table D-25
Table D-26
Table D-27
Table D-28
Table D-29
Time/Date Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-24
Time/Date Field Range Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-25
Programmer Status Report Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-26
Subfields of Programmer Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-26
Tag Data Report Status Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-27
xi
IT2410 Tag Programmer User Guide
xii
1
Getting Started
Getting Started
Chapter 1
Getting Started
This chapter describes this guide’s purpose and intended audience. It
provides a list of topics covered in each section, a list of related
documents, and the symbols and typographical conventions used.
Purpose
This IT2410 Tag Programmer User Guide contains installation and operating instructions for the hardware used to perform the IT2410 Tag Programmer reading (interrogation/verification) and writing (programming) functions. Figure 1-1 illustrates the
features of the IT2410 Tag Programmer.
Figure 1-1 IT2410 Tag Programmer (Top View)
Intended Audience
The intended audience for this user guide includes all personnel who need to accomplish the following tasks:
1-3
IT2410 Tag Programmer User Guide
•
Connect the tag programmer to host personal computer (PC) for the purpose of
programming tags and be able to operate a PC and install electronic equipment by
connecting components with cables and power supply cords.
•
Develop host software.
•
Understand basic tag programming.
Plan and Organize
Tags programmable with the IT2410 programmer use sophisticated memory organization. It is highly recommended that the user plan and organize the necessary steps for
installing the tag programmer (refer to Chapter 4, "IT2410 Tag Programmer Setup"
for instructions) and for programming the tags (refer to user-supplied software instructions).
Guide Topics
This operations guide contains the following chapters and appendixes.
Chapter 1 - Introduction
Describes the purpose, intended audience, guide topics, and
document conventions.
Chapter 2 - Programmer Overview
Provides an overview tag programmer functions and features.
Chapter 3 - Programmer Hardware
Describes the hardware components and requirements.
Chapter 4 - Programmer Setup
Provides information on setting up the tag programmer for first
use.
Appendix A - Programmer
Specifications
Provides the programmer’s physical and environmental
specifications.
Appendix B - PC Interface
Definitions
Describes the interface configuration to a host PC. Also shows
the power supply interface.
Appendix C - Frequently Requested Provides information regarding IT2200-series tag programming.
Tag Programming Information
Appendix D - Application
Programming Interface
1-4
Describes application program interface (API) information on
IT2410 programming methodology, and the protocol information
that is presented provides reference information relevant to
developing host software.
Getting Started
Typographical Conventions
The following conventions are used in this manual (Table 1-1).
Table 1-1 Typographical Conventions
Convention
Indication
This procedure might cause harm to the equipment and/or
the user.
Concerns about a procedure.
Code
Code, including keywords and variables within text and as
separate paragraphs, and user-defined program elements
within text appear in courier typeface.
Dialog Box Title
Title of a dialog box as it appears on screen.
Function
Start with the characters G4 and add mixed case with no
underscores, and include parentheses after the name, as in
G4FunctionName().
Menu Item
Appears on a menu.
Note
Auxiliary information that further clarifies the current
discussion. These important points require the user’s
attention. The paragraph is in italics and the word Note is
bold.
NUL
Zero-value ASCII character or a zero-value byte.
NULL
Zero-value pointers are null-terminated strings that refer to
strings of printable ASCII characters with a zero-value byte
placed in memory directly after the last printable character of
the string.
1-5
IT2410 Tag Programmer User Guide
1-6
2
IT2410 Tag Programmer Overview
IT2410 Tag Programmer Overview
Chapter 2
IT2410 Tag Programmer Overview
This chapter presents an overview of the IT2410 Tag Programmer.
Purpose of Tag Programmer
The tag programmer is a multi-function product used to program IT2200-series tags.
Programmer functions include frame programming, fixed-frame locking, and data
frame interrogation.
Communications
The tag programmer connects to a PC serial port that complies with the RS–232 communications interface standard. A PC-to-programmer RS–232 serial cable is provided
with the tag programmer. An Ethernet interface connection is also provided
Programming Head
The programming head on the top of the tag programmer provides a mechanical interface to the tag. The programming head includes a drop-in tag well that is compatible
with some IT2000-series tags. By placing the tag in the tag well the tag is correctly
positioned to the programmer’s internal antenna. Figure 2-1 shows the IT2410 Tag
Programmer head.
2-3
IT2410 Tag Programmer User Guide
Figure 2-1 Tag Programming Head
Indicator LEDs
The tag programmer uses light-emitting diodes (LEDs) to indicate the status of its
operations. These LED indicators identify operation, functionality, and errors. Figure
2-2 illustrates the external status indicators.
Figure 2-2 IT2410 LED Status Lights
2-4
IT2410 Tag Programmer Overview
Table 2-1 lists the indicator lights and describes their meanings.
Table 2-1 Indicator Lights, Descriptions, and Actions
INDICATOR LED
DESCRIPTION
ACTION
PROGRAM (GREEN)
The tag is being programmed
with user-specified data.
Status only — no action
required by user
VERIFY (GREEN)
The tag programmer has read
valid data from the specified
tag frame.
Status only — no action
required by user
ERROR (RED)
The tag programmer has
detected an error in the
programming or verifying
process or during other
operations.
Check system configuration,
cabling, and power supply to
system. Retry programming
sequence after system check.
If system still not working,
contact TransCore for
support.a
POWER (GREEN)
Power is being supplied to the
tag programmer.
Status only — no action
required by user
The tag programmer is ready
to accept commands from the
PC.
a. Refer to page iii for the TrAC telephone and fax numbers.
Status only — no action
required by user
READY (GREEN)
Standard Formats
The IT2410 Tag Programmer can code tag data using formats specified by wireless
communications standards such as the California Title 21 Regulation for AVI Compatibility, the International Standards Organization (ISO), the Association of American Railroads (AAR), the American National Standards Institute (ANSI), and the
American Trucking Association (ATA).
Anti-Static Wrist Strap
The IT2410 Tag Programmer includes a wrist strap for the user to wear when programming tags. The wrist strap prevents damage to tag circuits from electrostatic discharge (ESD). The wrist strap has a banana plug (see Figure 2-3) that inserts into the
front of the tag programmer (Figure 2-4).
2-5
IT2410 Tag Programmer User Guide
Figure 2-3 Banana Plug on ESD Wrist Strap
Figure 2-4 ESD Wrist Band Socket Location
Power
The IT2410 Tag Programmer is powered from a standard 120 VAC outlet. A ULapproved 12 VDC power supply is included with the standard tag programmer. Refer
to Appendix B to this guide for a pin-out diagram of the power connector.
2-6
3
IT2410 Tag Programmer Hardware
IT2410 Tag Programmer Hardware
Chapter 3
IT2410 Tag Programmer Hardware
This chapter describes the tag programmer’s hardware components and
requirements.
Components
The IT2410 Tag Programmer components include the programmer, power supply,
interconnecting cables, and anti-static wrist strap. The hardware is designed to operate
with a PC. This section describes the hardware requirements for proper operation of
the IT2410 programmer. This section also includes requirements for ESD protection.
Hardware Requirements
The customer-supplied PC requires the following minimum specifications:
•
PC with Intel Pentium (or equivalent microprocessor) 90 MHz, or higher
•
Microsoft Windows 2000, 98/95, or NT 4.0 with Service Pack 3 or higher
•
32 MB RAM
•
CD-ROM drive
•
Available serial port
•
VGA or high-resolution monitor
•
One 3.5 in. floppy drive, one CD-ROM drive, and a hard drive
•
Mouse or other Windows pointing device
ESD Protection Requirements
If the user does not take proper precautions, ESD damage can occur to the programmer and tags during programming. The IT2410 programmer has an external banana
plug socket that provides a point of attachment for the ESD wrist strap included with
the tag programmer.
Static discharge may cause significant damage that can adversely affect a tag’s operating performance. The following are typical symptoms of static discharge:
•
Inability to program the tag
•
Greatly reduced operating range
3-3
IT2410 Tag Programmer User Guide
•
Tag operating failure
Static is generated by friction and can often build to damaging levels. The following
are some of the causes of static:
•
Shoes moving across a carpeted or plastic floor
•
Hot air blowing into a room from a hot-air duct
•
Rubbing tags together
•
Sliding tags across a table top
•
Friction created while wearing certain types of clothing
ESD Workstation Design
Well-designed workstations use a system of multiple protection elements. At a minimum, this protection should include anti-static bench mats and wrist straps to discharge static safely away from the equipment.
As an additional measure to prevent static damage, keep tags in their original packaging, on an anti-static mat, or within an ESD-inhibiting container until you are ready to
program the tags.
Using the ESD Wrist Strap
Always attach the ESD strap before beginning programming operations. Perform the
following steps:
3-4
1.
Place the strap on the wrist and snap the ESD strap to the elastic wristband.
2.
Connect the banana plug (see Figure 2-3 on page 2-6) on the ESD wrist strap to
the ESD banana socket on the front of the tag programmer (see Figure 2-3 on
page 2-6).
4
IT2410 Tag Programmer Setup
IT2410 Tag Programmer Setup
Chapter 4
IT2410 Tag Programmer Setup
This chapter explains how to set up the tag programmer for first use.
Equipment List
User must wear the wrist strap when programming tags. Failure to do so can result
in ESD damage to the tag.
The IT2410 Tag Programmer includes the following components:
•
Tag programmer unit
•
External 12 VDC power module
•
ESD static suppression wrist strap
•
PC-to-programmer RS–232 serial cable with DB-9 connectors on both ends
Figure 4-1 shows the tag programmer and peripheral components.
4-3
IT2410 Tag Programmer User Guide
Figure 4-1 IT2410 Tag Programmer System
Note: To maintain FCC Part 15 Class B compliance, operate the tag programmer in
a horizontal position.
Connecting the IT2410 Tag Programmer to a PC
Use the following procedure to connect the equipment:
4-4
1.
Place the tag programmer on a flat, stable surface.
2.
Connect the power supply to the power socket on the tag programmer’s back
panel.
3.
Connect the power supply plug to a properly grounded — three-prong — AC
outlet.
4.
Connect the PC-to-programmer RS–232 serial cable to the COM1 port on the
PC. Connect the other cable end to the RS–232 connector on the tag
programmer’s back panel.
IT2410 Tag Programmer Setup
5.
Connect the Ethernet cable to the Ethernet connector on the PC. Connect the
other cable end to the Ethernet connector on the tag programmer’s back panel.
6.
Connect the ESD wrist band banana plug to the socket on the tag programmer’s
front panel.
Figure 4-2 shows the location of the power and serial interface connectors on the tag
programmer’s back panel.
Figure 4-2 Power and Serial Interface Connections
Powering Up
When all the equipment is connected as described in the preceding section, apply
power to the system components as follows:
1.
Switch on the PC and verify its proper operation.
Note: Do not place a tag in the programmer head at this time. The indicator lights
operate differently when a tag is already in place.
2.
Switch on the tag programmer’s power switch located on the programmer’s rear
panel. The green POWER LED illuminates.
Note: The operating system will initiate a self-test upon power up or after power
interruption.
When the tag programmer’s internal power-on self-test is successfully completed, the
user is notified as follows:
•
The green READY indicator light illuminates.
•
After approximately 10 seconds, the tag programmer sounds three short tones in
rapid succession.
If the tag programmer fails to power up, the READY LED goes out, and the ERROR
LED illuminates and the alarm beeps once for one second.
The IT2410 unit is now ready to start programming tags.
4-5
IT2410 Tag Programmer User Guide
Programming Cycle
When the programming cycle is initiated by the remote host system, the PROGRAM
LED illuminates and the alarm beeps for an approximate duration of 0.25 seconds,
once a second, for a 10-s period, or until the programming operation has completed.
The operator has an approximate 10-s time-out period in which to place an operating
IT2200-series tag on the programming head fixture. Once the tag is in the fixture and
the programmer detects the valid RF data, the programmer executes the specific write
command from the host.
If the programming is successful then the PROGRAM LED goes out and the alarm
sounds three times for approximately 0.25 seconds each.
If the programming cycle is unsuccessful or a tag is not detected within the 10-s
period, the ERROR LED illuminates and the alarm sounds once for approximately 1
second.
Verifying Cycle
When the verify cycle is initiated by the remote host system, the VERIFY LED illuminates and the alarm beeps each second for an approximate 10-s period or until the verify operation is complete.
The operator has a 10-s time-out period in which to place an operating IT2200-series
tag on the programming head. Once the tag is placed in the fixture and the programmer can detect the valid RF data, the programmer executes the specific read command
from the host.
If the verifying is successful the VERIFY LED goes out and the alarm sounds three
short beeps.
If the verifying cycle is unsuccessful or if a tag is not detected within the 10-s period,
the ERROR LED illuminates and the alarm beeps for 1 second.
The tag programmer incorporates an audible indicator that is controlled by software.
The indicator’s sound is pleasing to the ear (2200 Hz) and can be easily heard while
operating near the unit under normal conditions. The alarm audibly indicates the status
of programmer operations. Table 4-1 lists the various programmer operations and the
corresponding alarms that sound as an audible operation verification.
Table 4-1 Programmer Operations and Corresponding Alarms
Programmer Operation
Audible Alarm
Beep Duration
Duty (%)
Successful Self Test
3 beeps
0.25 s
50
Failed Self Test
1 beep
3.0 s
100
4-6
IT2410 Tag Programmer Setup
Table 4-1 Programmer Operations and Corresponding Alarms (continued)
Programmer Operation
Audible Alarm
Beep Duration
Duty (%)
Programming Cycle
1 beep per second for 10 s
0.25 s each
25
Successful Programming Cycle
3 beeps
0.25 s each
50
Unsuccessful Programming Cycle
1 beep
3.0 s
100
VERIFY Cycle
1 beep per second for 10 s
0.25 s each
25
Successful VERIFY Cycle
3 beeps
0.25 s each
50
Unsuccessful VERIFY Cycle
1 beep
3.0 s
100
4-7
IT2410 Tag Programmer User Guide
4-8
A
Tag Programmer Specifications
Tag Programmer Specifications
Appendix A
Tag Programmer Specifications
This appendix lists the tag programmer physical and environmental
specifications.
Table A-1 lists the IT2410 Tag Programmer parameters and specifications.
Table A-1 IT2410 Tag Programmer Physical and Environmental Specifications
Parameter
Size (W x H x D)
Specification
14.3 x 3.2 x 11.5 in
(36.3 x 8.1 x 29.2 cm)
Weight
6.8 lbs (3.1 kg)
Input Voltage
120 VAC
Power Consumption
36 W
Operating Temperature
32°F to +131°F
(0°C to +55°C)
Storage Temperature
-4°F to +185°F
(-20°C to +85°C)
Humidity
95% noncondensing (within 77°F to
131°F (25°C to 55°C))
Enclosure
Dustproof
Operational Vibration
1.04 Grms, 5-500 Hz, power spectral
density-uniform 0.0022 G2/Hz, 1 hour
per axis
Shock
4 Gzero-to-peak by 11 ms half-sine
duration in all 3 axes
PC-to-Programmer Cable
RS–232 (DTE)
RF Power
Programming head: 1.0 mW
FCC Classification
Part 15, site license not required
Environmental
The programmer is designed to operate in typical office environment conditions. The
programmer performs to the specifications listed in Table A-1 and is ready to program
with a warm-up time of not more than three minutes.
A-3
IT2410 Tag Programmer User Guide
Mean Time Between Failure (MTBF)
The programmer has a minimum MTBF of 20,000 hours.
Maintainability
The interval for periodic maintenance is least one year. The mean time to repair
(MTTR) is less than 30 minutes.
A-4
B
PC Interface Definitions
PC Interface Definitions
Appendix B
PC Interface Definitions
The tag programmer’s PC interface complies with the RS–232 standard for data communications equipment and uses the protocol settings listed in Table B-1. Figure B-1
shows the pin-out locations for the power plug.
Table B-1 PC Interface Protocol Settings
Protocol
Setting
Data Rate
38,400 bps (factory default)
Data Bits
Parity
None
Stop Bits
Software Flow Control
None
Hardware Flow Control
None
Figure B-1 Pin-out Diagram for Power Plug
B-3
IT2410 Tag Programmer User Guide
B-4
C
Frequently Requested Tag
Programming Information
Frequently Requested Tag Programming Information
Appendix C
Frequently Requested Tag Programming
Information
This appendix explains frequently requested information regarding
IT2200-series tag programming information.
Identification, Serial Number, and the Global Password
TransCore documentation and/or host software references a tag identification number
(ID) that corresponds to the Title 21 ID. The Title 21 ID is a unique identifier used by
radio frequency identification systems in California. This is found in the first 8 hexadecimal characters (32 bits) of the tag’s general Page 1. In all IT2200-series tags, this
ID is either the same as the serial number from Page 0, or other application specifications.
The tag serial number (S/N) is the first 8 hexadecimal characters (32 bits) in general
Page 0. The global password is 64 bits long and the default is generated by repeating
the serial number twice. Once this global password is known, it can be used to change
read and write passwords on any of the general pages of data in the tag, change which
frames are designated nonvolatile, and lock pages of data so that they cannot be
changed unless the page is unlocked first using the global password.
These two identifying numbers are in addition to any customer-specific ID numbers.
Most of the customers that use the IT2200-series tags employ one of the other general
pages of data available in the tag to store their own unique ID number, which usually
corresponds to a patron account number.
The global password in the IT2200-series tag acts like a master key, which can be
used to perform crucial tag operations and is meant to be controlled by the owner
agency. It has a default setting that is created from the tag’s unique serial number, but
can be changed by the owner agency, if desired. Table C-1 shows the tag page layout.
Table C-1 Tag Page Layout
Page Number (in HEX)
Field Name
Area
Length
in Bytes
*0000H
Configuration Page
(reserved for factory use)
General
16
*0001H
General Page 1/Diagnostics
General
16
0002H
General Page 2
General
16
C-3
IT2410 Tag Programmer User Guide
Table C-1 Tag Page Layout (continued)
Page Number (in HEX)
C-4
Field Name
Area
Length
in Bytes
0003H
General Page 3
General
16
0004H
General Page 4
General
16
0005H
General Page 5
General
16
0006H
General Page 6
General
16
0007H
General Page 7
General
16
0008H
General Page 8
General
16
0009H
General Page 9
General
16
000AH
General Page A
General
16
000BH
General Page B
General
16
000CH
General Page C
General
16
000DH
General Page D
General
16
000EH
General Page E
General
16
000FH
General Page F
General
16
*0000H
User Password for Page
0000H
User
*0001H
Read User Password for
Page 0001H
User
*0002H
Read User Password for
Page 0002H
User
*0003H
Read User Password for
Page 0003H
User
*0004H
Read User Password for
Page 0004H
User
*0005H
Read User Password for
Page 0005H
User
*0006H
Read User Password for
Page 0006H
User
*0007H
Read User Password for
Page 0007H
User
*0008H
Read User Password for
Page 0008H
User
Frequently Requested Tag Programming Information
Table C-1 Tag Page Layout (continued)
Page Number (in HEX)
Field Name
Area
Length
in Bytes
*0009H
Read User Password for
Page 0009H
User
*000AH
Read User Password for
Page 000AH
User
*000BH
Read User Password for
Page 000BH
User
*000CH
Read User Password for
Page 000CH
User
*000DH
Read User Password for
Page 000DH
User
*000EH
Read User Password for
Page 000EH
User
*000FH
Read User Password for
Page 000FH
User
*0014H
Write User Password for
Page 0000H
User
*0015H
Write User Password for
Page 0001H
User
*0016H
Write User Password for
Page 0002H
User
*0017H
Write User Password for
Page 0003H
User
*0018H
Write User Password for
Page 0004H
User
*0019H
Write User Password for
Page 0005H
User
*001AH
Write User Password for
Page 0006H
User
*001BH
Write User Password for
Page 0007H
User
*001CH
Write User Password for
Page 0008H
User
*001DH
Write User Password for
Page 0009H
User
*001EH
Write User Password for
Page 000AH
User
C-5
IT2410 Tag Programmer User Guide
Table C-1 Tag Page Layout (continued)
Page Number (in HEX)
Field Name
Area
Length
in Bytes
*001FH
Write User Password for
Page 000BH
User
*0020H
Write User Password for
Page 000CH
User
*0021H
Write User Password for
Page 000DH
User
*0022H
Write User Password for
Page 000EH
User
*0023H
Write User Password for
Page 000FH
User
*0000H
Page lock bits
Owner
*0001H
Reserved for Read
Password lock
Owner
*0002H
Reserved for Write
Password lock
Owner
*0003H
Page NV RAM bits
Owner
*0004H
Global Password
Owner
Note: * These commands are write only.
Changing the Global Password
As with personal identification numbers, or PINs, which are used with automatic teller
machines, the first time that a tag’s global password is changed, it is from the default
setting. You must know the tag’s current global password before you can change it. To
change it, you must execute a write request to owner Page 4. The host program that is
being used to communicate with the reader should prompt you for the current global
password as well as the new password. Once you change the global password, safeguard it to prevent unauthorized access to the tag.
Reading and Setting Nonvolatile Status for General
Pages
Note: It is important to make any critical information in the tag nonvolatile, or the
information is lost when the tag batteries run down, or are changed.
To find out which general pages of data have been set to nonvolatile status, read owner
Page 3 by using the global password.
C-6
Frequently Requested Tag Programming Information
Perform a read request of owner Page 3 and enter the global password when you are
prompted for it. The read response should return 4 hex characters (16 bits) of data,
each bit corresponding to a general page of data. If the data bit is a logic 1 for the general frame in question, then that frame is nonvolatile, and a copy is saved in
EEPROM. For example:
Returned data:
D400
Hexadecimal to binary conversion: 1101 0100 0000 0000
MSB
LSB
The most significant bit (MSB) corresponds to general Page 0, and the least significant bit (LSB) corresponds to general Page 15, so for this example Pages 0,1,3, and 5
are nonvolatile.
To change the status of the nonvolatile bits, perform a write request to owner area
Page 3 using the global password. Depending on the host program used, the write data
is entered in hexadecimal form. For example, to make only frames 3, 4, and 12 nonvolatile, the write data is entered as 1808 hex. This translates to the following binary
data: 0001 1000 0000 1000.
Note: To preserve factory configuration data and built-in-self-test diagnostic information, general Pages 0 and 1 are saved in nonvolatile memory despite the bit settings in owner Page 3.
Locking Frames (Page Locks)
The page lock feature is used to designate general pages as read only. Once a page is
locked, the global password must be used to unlock it before a successful write request
can be processed to change the data in that frame. The page lock bits are stored in
owner area Page 0.
To read the page lock bits, execute a read request of owner Page 0 and enter the global
password when the host program prompts you for it. The read response should return
4 hex characters (16 bits) of data, in which each bit corresponds to a general page of
data. If the data bit is a logic 1 for the general frame in question, then that frame is
locked and is read only. For example:
Returned data:
c160
Hexadecimal to binary conversion: 1100 0001 0110 0000
MSB
LSB
The MSB corresponds to general Page 0, and the LSB corresponds to general Page 15.
In this example Pages 0,1,7,9, and 10 are locked.
C-7
IT2410 Tag Programmer User Guide
To change the status of the nonvolatile bits, use the global password to perform a write
request to owner area Page 0. Depending on the host program used, the write data is
entered in hexadecimal form. So for example, to lock frames 4 and 7, the write data is
entered as 0900 hex. This translates to binary data as follows: 0000 1001 0000 0000.
Auto Beep on Acknowledge and Read Sequences
The IT2235 Tag features an Auto Beep function. This lets the tag emit various beep
sequences after receiving either a Title 21 acknowledge (ACK) command or a Title 21
Read Request. A byte, called the mode bits, programmed into general Page 0 controls
this function. The mode bits are detailed in Table C-2.
Table C-2 Mode Bits
Field Name
Bit No.
EEPROM Config Mode — Factory use only
112
Auto Beep A/V Code Bit 4
113
Auto Beep A/V Code Bit 3
114
Auto Beep A/V Code Bit 2
115
Auto Beep A/V Code Bit 1
116
Auto Beep A/V Code Bit 0
117
Auto Beep On ACK
118
Auto Beep On Read
119
The EEPROM configuration mode bit is for factory use only. When setting the Auto
Beep function, always make this bit a logic 0.
The other bits in this byte all apply to the Auto Beep function. The Auto Beep A/V
bits 4 through 0 can be set to emit the desired A/V sequence based on the information
presented in Table C-3.
Table C-3 A/V Options Bits Decoding
C-8
Bit 4
Bit 3
Bit 2
Bit 1
Bit 0
Audio Sequence
None
HI-HI-HI-HI
LO-LO-LO-LO
LO-HI
Long LO
Frequently Requested Tag Programming Information
Table C-3 A/V Options Bits Decoding (continued)
HI-LO-HI-LO
LO-LO-LO
HI-HI-HI
HI-HI
Long HI
LO
HI
HI
The Auto Beep on ACK bit, when set to 1, enables the automatic initiation of the
encoded A/V sequence determined in Auto Beep A/V code bits 0 to 4 after a Title 21
ACK is processed.
The Auto Beep on read bit, when set to 1, enables the automatic initiation of the
encoded A/V sequence determined in Auto Beep A/V code bits 0 to 4 after a Title 21
read request has been processed, and the tag enters an idle state.
For example, if you want the tag to beep three times with a HI tone whenever it
receives a Title 21 read, program the byte to a value of 01001101, or a hex 4D. Program general Page 0 with this byte, and the following sequence must occur:
1.
Read the page lock bits (owner Page 0), note their values for later restoration.
2.
Write to owner Page 0 to change the lock bit for general Page 0 to a value of 0.
3.
Write to general Page 0, changing only the mode bits field to the value desired
(hex 4D in the example on page C-7).
4.
Write to owner Page 0 to change the lock bit for general Page 0 to a value of 1.
Using the Custom Message Feature
The IT2235 Tag can store a custom message of up to 16 ASCII characters, and display
the message on the LCD when the tag pushbutton is pressed. To use this capability,
program the custom message into one of the general data pages (Pages 2 to 15), and
then send a GEN ACK command with a pointer indicating where the custom message
is stored in tag memory.
The GEN ACK command has a field called the LCD message page pointer that consists of 1 byte (8 bits). If the custom message, for example, is stored in general Page 5,
this page pointer in the GEN ACK command is set to a value of 00000101 binary, or
05 hex.
The LCD controller always interprets the data as ASCII data. Therefore, if a GEN
ACK command is sent that points to a custom message page and the page has normal
C-9
IT2410 Tag Programmer User Guide
hex data, it still will be interpreted as ASCII and the tag will display an unintelligible
message on its LCD.
To discontinue using the custom message, send the tag another GEN ACK command
with 0’s in the LCD message page pointer field.
C-10
D
Application Program Interface
Application Program Interface
Appendix D
Application Program Interface
This appendix describes the application program interface (API) for the
IT2410 Tag Programmer.
Interface Definitions
Communication between the tag programmer and host occurs via a serial RS–232
interface or an Ethernet (TCP/IP) interface. “Ethernet Communications Conduit”
describes the TCP/IP interface. “Communications Protocols” on page D-4 describes
the serial protocol. This platform performs data transfer, commands, and responses in
a binary-coded format similar to the ISA data structure, but with error correcting protocol (ECP) additions to maintain error-free communications.
Ethernet Communications Conduit
All Ethernet parameters are factory set initially and will need to be reset to the correct
customer configuration in the field to function properly. All parameters except the
media access control (MAC) address can be changed in the field. These parameters
are factory defaults:
•
MAC address
•
Programmer IP address
•
Host IP address
•
Gateway IP address
•
Network mask
TransCore recommends that you first configure the Ethernet settings using the standard RS–232 communications conduit. Subsequent changes can be made using either
the RS–232 or Ethernet conduits. Changes to Ethernet settings will not take effect
until after the unit has been reset either by command or by switching the power off
and on.
The IT2410 Tag Programmer operates as a TCP/IP client. The programmer attempts
to connect to a listening socket server (also known as host). The Ethernet communications occur using port 8000.
Responses to all command requests are categorized as either synchronous or asynchronous. Some requests have a synchronous response associated with them. Some
requests also have an asynchronous response associated with them. Some asynchronous responses occur independent of any request by the application. Some of these
responses contain data, the content and format of which is included with the definition
of each command.
D-3
IT2410 Tag Programmer User Guide
RS–232 Communications Conduit
The RS–232 conduit is configured with the defined communications parameters listed
in Table D-1.
Table D-1 Communications Parameters
Parameter
Value
Baud
19,200 or 38,400 (factory default)
Data bits
Parity
None
Stop bits
Software flow control
None
Hardware flow control
None
Communications Protocols
TransCore reader systems use a programmer-to-host software protocol. The protocol
information that is presented in this section provides reference information relevant to
developing host software.
Each message is framed with the start-of-message (som) and end-of-message (eom)
characters so that the host computer can detect the beginning and end of each message.
General Software Information
All tag programmer commands are preceded by a start-of-message () ampersand character (&) followed by an end-of-message () percent character (%). All
data after the  character is ignored until the next  is detected.
Any & character that occurs in the message between the  and  is converted to the backslash and at character (\@) sequence. Any % character is converted
to the \? character sequence. All \ characters are converted to the \\ sequence. All
 and  character conversions are performed after the cyclic redundancy
check (CRC) has been performed on the transmit data and before the CRC is performed on the receive data.
Programmer-to-Host Software Communications
Protocol
The programmer and host interface use the following communications protocol for
command responses and asynchronous responses.
D-4
Application Program Interface
Binary-coded integer messages are contained in a protocol defined by:
    []  
where
 - start of message is used to find the start of the next message following a mes-
sage time-out or following the end of the previous message. All data is ignored until
the  is detected. The start of message is defined as the ASCII character &.
 - a combination of  and  makes 16 bits or 2 bytes of data.
The sequence number is 6 bits and the length is 10 bits. The sequence number is used
for the error detection scheme. The value for sequence number may represent any
number between 0 and 63 with the following restrictions:
•
The sequence number for command responses matches the sequence number of
the last received command.
•
The sequence numbers for asynchronous messages are 0,2,4,6,...,62 and is incremented after each new asynchronous message.
 - length is a group of 10 binary bits that specifies the number of bytes in the
response and data fields.
 - response is 2 bytes long to indicate the status of the command received by
the programmer from the host. Responses are described in Table D-2.
D-5
IT2410 Tag Programmer User Guide
Table D-2 Command Responses and Definitions
Response
Meaning
0000H
Command complete
0001H
Command in progress
0002H
Command data invalid
0003H
Command invalid
0004H
Command aborted
3XXXH
Tag data
3000H
No-Tag Data Status Code
3001H
IT2200 Tag Data Status Code
3002H
Reserved
8XXXH
Diagnostic data
8000H
Power-Up Diagnostic Report Status Code
8001H
Background Diagnostic Report Status Code
8002H
Download Active
AXXXH
Diagnostics Statistical Data
[] - the data field may be of length from 0 to 1021 bytes and is associated
with each specific response. See “Command List” on page D-10, for a complete listing of tag commands.
 - cyclic redundancy check, or CRC, is 2 bytes or 16 binary bits long, denoting
a CRC-XMODEM result generated on each message byte exclusive of the  and
. The polynomial for the CRC calculation is X16+X12+X5+1 with a feedback of
1021H for a XMODEM type CRC.
 - end of message aids in finding the end of the message. All data after the
 is ignored until the next  is detected. The end of message is defined as
the ASCII character %.
Serial Data Acknowledge
The programmer and host interface use the data acknowledge protocol as noted below.
Binary-coded integer messages contained in a protocol are defined by:
     
where
 - start of message finds the start of the next message following a message time-
out or following the end of the previous message. All data is ignored until the 
is detected. The start of message is defined as the ASCII character &.
D-6
Application Program Interface
 - a combination of  and , makes 16 bits or 2 bytes of data.
The sequence number is 6 bits and the length is 10 bits. The sequence number is used
for the error detection scheme. The value for sequence number may represent any
number between 0 and 63. The sequence number for the acknowledge (ACK)/not
acknowledge (NACK) message matches the sequence number of the last received
message.
 - length is a group of 10 binary bits that specifies the number of bytes in the
response. The value of length is 1 for ACK/NACK responses.
 - response is 1 byte long to indicate the status of the data response received
by the programmer from the host. Table D-3 lists the responses.
Table D-3 Message Responses and Definitions
Response
Meaning
DDH
Data acknowledge (ACK)
EEH
Data invalid (NACK)
 - cyclic redundancy check, or CRC, is 2 bytes, or 16 binary bits long, denoting
a CRC-XMODEM result generated on each message byte exclusive of the  and
. The polynomial for the CRC calculation is X16+X12+X5+1 with a feedback of
1021H for a XMODEM type CRC.
 - end of message aids in finding the end of the message. All data after the
 is ignored until the next  is detected. The end of message is defined as
the ASCII character %.
Ethernet Asynchronous Command and Response
Protocol
Tag data or diagnostics data generate asynchronous or command responses. Asynchronous responses have no associated commands. An interrupt occurs notifying the
lane controller or host computer of a response to read data from the first-in-first-out
(FIFO) data I/O address if interrupt mode is enabled. Otherwise, polling the FIFO
buffer status register notifies the lane controller or host computer to asynchronous
responses. The reader and host interface use the communications protocol for command responses and asynchronous responses shown here. Binary-coded integer messages contained in a protocol are defined by:
  []
where
 - length specifies the number of bytes in the response and data fields. The
range for this field is 2 to 1022.
 - response is one-word long to indicate the status of the command received by
the host from the reader. The responses are shown in Table D-4.
D-7
IT2410 Tag Programmer User Guide
Table D-4 Asynchronous Responses and Definitions
Response
Meaning
0000H
Command complete
0001H
Command in progress
0002H
Command data invalid
0003H
Command invalid
0004H
Command aborted
3XXXH
Valid read tag data
3000H
No-tag data status code
3001H
IT2200 Read/write tag data status code
3002H
Reserved
8XXXH
Diagnostic data
8000H
Power-up diagnostic report status code
8001H
Background diagnostic report status code
8002H
Download active
AXXXH
Diagnostics statistical data
[] - data field may be of length from 0 to 1020 bytes and is associated with
each specific response. See the “Command List” on page D-10 for more information.
Serial Error Detection and Recovery for the Programmer
Rather than implementing a complex ECP, the IT2410 Tag Programmer uses a method
of error detection and recovery, which consists of a combination of CRC, sequence
numbers, a simple structured protocol with message delimiters, a message length, and
message time-outs. By using this combination of error detection and structured communications protocol, a high-level of confidence is obtained without the overhead
associated with standard ECP.
These methods are described in the following sections.
Serial Message Failures
Serial data transmission failures can occur in one the three forms:
D-8
•
Modified byte
•
Extra byte
•
Lost byte
Application Program Interface
Modified bytes are detected by the CRC check. Extra bytes are detected by the CRC
and are compensated for by the  and . Lost bytes require that time-outs
be implemented to prevent lockups caused by anticipation of additional bytes being
received as specified by the . The time-outs implemented are described as follows:
•
Any received  ...  should take less than 500 ms. This assumes 1500
characters at 19.2 k baud and long commands are followed by short responses.
•
The asynchronous data  ... ACK ...  should take less than 1.0 s.
•
A command  ... response ...  may take considerably longer because
of command processing time.
If a message CRC or time-out error occurs during the command/response message
sequence, the error reporting will occur as follows.
•
For a CRC failure that occurs during the command message, the programmer
reports the error to the host using the NACK message.
•
For a CRC failure or time-out failure that occurs during the response message, the
host reports the error to the programmer by retransmitting the command message.
If a message CRC or time-out error occurs during an asynchronous response/ACK
message sequence, the error reporting will occur as follows:
•
For a CRC failure that occurs during the asynchronous response message, the host
should report the error to the programmer using the NACK message.
•
For a CRC failure or time-out failure that occurs during the ACK message, the
programmer reports the error to the host by retransmitting the asynchronous
response message.
D-9
IT2410 Tag Programmer User Guide
Serial Sequence Numbers
The host maintains control of the sequence numbers for commands and their associated responses.
•
A command is not complete until a response with a proper sequence number is
received from the programmer.
•
A response is not complete until the host changes the command sequence number
from the previous command.
If the command sequence number does not change, the response is retransmitted by
the programmer.
Sequence numbers for asynchronous response communications sequences are maintained by the programmer.
•
An asynchronous response transmission sequence is not complete until an ACK is
received from the host with a proper sequence number.
•
An ACK is not complete until the programmer changes the data sequence number.
If the data sequence number does not change, the ACK is retransmitted by the host.
To prevent asynchronous messages from being interpreted as command responses
when host and programmer sequence numbers pass each other, the host sequence
numbers should be odd (1,3,5,7,...,63) and programmer sequence numbers should be
even (0,2,4,6,...,62).
Serial Asynchronous Responses
Tag data or diagnostics data will generate asynchronous responses, that is, responses
that have no associated commands. If the host begins sending a command during this
time, the host ignores the asynchronous response. The programmer automatically
retransmits the asynchronous response following the command execution.
Command List
The command list (Table D-5) describes the command requests that are used between
the programmer and the host computer and/or lane controller. Within the list, the commands are further divided according to their functionality, for example, communications and real-time clock.
D-10
Application Program Interface
Table D-5 Tag Programmer Commands
Command Type
Command
Configuring the Programmer
Identify
0480H
Restore Programmer Configuration
057CH
Reset Programmer
057DH
Save Programmer Configuration
057EH
Get Programmer Security Characters
06ABH
Set Programmer Security Characters
056BH (key required)
Get Programmer Serial Number
06ACH
Set Programmer Serial Number
056CH (key required)
Get Programmer Control
06ADH
Set Programmer Control
056DH
Set Programmer Password
057BH
Communications Parameters for the Programmer
Get Communications Baud Rate
06A6H
Set Communications Baud Rate
0566H
Get Ethernet Parameters
06BFH
Set Ethernet Parameters
057FH
Communications with the RF Module
Get Programmer RF
06A2H
Set Programmer RF
0562H
Working with Asynchronous Commands
Get Asynchronous Transaction Response Count
06A1H
Accessing the Real-time Clock
Get Time and Date
06A7H
Set Time and Date
0567H
Reading from and Writing to Tags
R/W Tag Command Request
3000H
R/W Virtual Tag Command Request
3040H
D-11
IT2410 Tag Programmer User Guide
Table D-5 Tag Programmer Commands (continued)
Reserved/Sparea
Spare
05601H
Spare
0564H-0565H
Spare
0572H-0579H
Reserved
057FH
Spare
06A4H-06A5H
Spare
06B2H-06BEH
Reserved
06BFH
a. These commands have not been delegated a command type and are not listed in this section.
Note: Command 3000H (host tag command) has an extended command set that parallels the tag-reader command set for the interface between the reader and tag on the
RF interface.
Identify
The Identify command requests the identification (ID) and version numbers of the
programmer application firmware, the RF module firmware, and the programmer
hardware version.
Data associated with Identify command for the programmer is shown in Table D-6.
Table D-6 Identify Command Code
Byte
Bit 7
0-7
Vendor
8-9
Hardware version
10-29
Boot S/W ID
30-49
Application S/W ID
50-69
S/N on programmer
70-89
Reserved field on programmer
Vendor — The first group of eight ASCII characters provides the host with a vendor
name, AMTECH, followed by two spaces. The symbol ^ indicates a space or an ASCII
character 20H in this document.
Hardware version — The next two bytes provide a version of the hardware. The general format of the vendor and hardware version is illustrated below:
D-12
Application Program Interface
Description
ASCII Characters
Vendor
AMTECH^^
Hardware version XX
Boot software IDs — The remaining four groups provide 20-character version IDs of
the boot and application software for the reader, and alternately serve as a method to
read the programmer serial number. In the reader, each software ID is composed of a
9-character Amtech internal part number and an 11-character software version. The
general format for each of the four software IDs is illustrated below:
Description
ASCII Characters
Software ID
Part number
XXXXX-XX^
Version
VER^XX.XX^^^
Programmer S/N — For the programmer, the first four bytes (50-53) of the software
field return the programmer serial number.
Restore Programmer Configuration
The Restore Programmer Configuration command is used to return the programmer to
its original factory default settings. The Restore Programmer Configuration command
requests the programmer to reconfigure its current internal settings (RF frequency, RF
attenuation, etc.) to what is saved in nonvolatile memory or to default factory settings.
The data associated with the Restore Programmer Configuration is shown in Table D7. This data defines the source (factory defaults or NVM) of the configuration parameters of the programmer. The NVRAM parameters are the last saved using the Set Programmer Configuration command. Upon command, the programmer changes the
programmer configuration to the values from the selected source immediately following the transmission of the command response (Table D-8).
Table D-7 Programmer Configuration Data
Bits 7 - 1
Spare
Bit 0
Programmer configuration
control
D-13
IT2410 Tag Programmer User Guide
Table D-8 Values for Programmer Configuration Bit
Value
Definition
Factory defaults
Nonvolatile memory (NVRAM)
All the factory defaults for the programmer and the configuration parameters restored
from NVRAM or from factory defaults are shown in Table D-9.
Table D-9 Factory Default Configuration Parameters
Parameter
Programmer Factory Defaults
RF frequency
914.75 MHz
RF attenuation level
0 (fixed attenuation)a
Communications baud rate
38,400 bps
Check tag configuration
N/A
Tag response append data
N/A
Tag command mode
N/A
Custom auto tag command table
N/A
Custom auto user sequence table
N/A
Programmer control
Tag command time-out 10 seconds, buzzer
enabled
a. The programmer is designed so that the RF attenuation is fixed in the firm-
ware to a setting of 0 dB, however, there is a fixed attenuation in the RF
module to allow limited functional range of approximately 0.5 ft (0.15 m)
for the built-in antenna.
Reset Programmer
The Reset Programmer command causes all the programmer parameters to initialize
to a power-up state (based on the NVM settings) and forces the internal logic card
power-on diagnostics to be initiated (Table D-10).
Table D-10 Reset Data
Byte
D-14
Bit 7
Reset control (most significant byte)
Reset control (least significant byte)
Application Program Interface
A command complete response is associated with this command, followed by a
8000H asynchronous response type data code with the results of the power-on diagnostics test. All buffered tag responses will be deleted after execution of this command. Execution time is approximately 10 s.
Reset Control — This field contains a unique value to prevent a bit error from inadvertently causing a soft reset of the programmer. This field must contain the hexadecimal value A5A5 to invoke a reset of the programmer.
Save Programmer Configuration
The Save Programmer Configuration command causes the current configuration of
the programmer to be saved to NVM. There is no data associated with the Save Programmer Configuration command. See the “Restore Programmer Configuration” on
page D-13 for a listing of the parameters that are saved and the factory default values
for each.
Get/Set Programmer Security Characters
Unique security characters are programmed into each customer tag programmer at the
time of manufacture and are assigned and tracked by TransCore. Each security character set is linked to a programmer serial number, also assigned and managed by
TransCore. The security codes are programmed at the factory prior to shipment.
The Get Programmer Security Character command requests the programmer’s
assigned security characters. Security characters are bit patterns in predetermined
positions in the American Trucking Association page. The Set Programmer Security
Character command sets the programmer security characters.
Invalid security characters are reported using command data invalid response code as
specified in the “Ethernet Asynchronous Command and Response Protocol” on page
D-7.
The data associated with the Get/Set Programmer Security Characters command is
shown in Table D-11.
Table D-11 Security Characters Data
Byte
Bits 7 - 0
Security character 0
Security character 1
Security character — This field contains a two-byte quantity indicating that the
security characters are assigned to the programmer. These security characters may be
used to aid in controlling fraudulent use of any reader system. The hardware programming key is required to perform the set programmer security characters command successfully.
D-15
IT2410 Tag Programmer User Guide
Valid security characters and their associated ASCII (hex) representations are shown
in Table D-12.
Table D-12 Valid Security Characters
Security Character
ASCII (Hex)
Security Character
ASCII (Hex)
(space)
20
3A
21
3B
22
3C
23
3D
24
3E
25
3F
26
40
27
5B
28
5C
29
5D
2B
5E
2C
5F
The location of these security bits within the 128-bit page, based on automatic vehicle
identification standards, including AAR and ISO, consist of two distinct 6-bit groups
comprising the 106 through 111 and 112 through 117 bit positions. These correspond
to the 18th and 19th character locations based on the 6-bit AVI standards.
Security characters stored in the programmer's NVM can be set to one of two combinations. At least one of the security character positions must be programmed to customer-specific security characters from the security character set for customer
programmers (see Table D-13).
Table D-13 Programmer Security Characters and Values
Programmer Security 1
D-16
Programmer Security 2
Description
Security character
Security character
Valid customer combination
Security character
Normal character
Valid customer combination
Normal character
Security character
Valid customer combination
Normal character
Normal character
Invalid combination
Space
Space
Reserved
Application Program Interface
Get/Set Programmer Serial Number
The Get Programmer Serial Number command requests the factory-programmed
serial number. The Set Programmer Serial Number command sets the programmer
serial number.
Programmer serial numbers are individually programmed into each programmer at the
time of manufacture. Serial numbers are related to a set of security characters that
have been assigned to the programmer. Serial numbers are identified in the unique
released document for each customer programmer.
The data associated with the get/set programmer serial number commands is shown in
Table D-14.
Table D-14 Serial Number Data
Byte
Bit 7
Serial number (MSB)
Serial number
Serial number
Serial number (LSB)
Serial numbers are programmed by the Host command, which can only be accomplished, as with security characters, using the master key.
Serial number byte — This field contains a four-byte quantity. It indicates the serial
number that is to be assigned to the programmer at the factory. The hardware programming key is required to perform the set programmer serial number command successfully.
Get/Set Programmer Control
The Get Programmer Control command requests the tag command time-out and programmer audio buzzer settings. The Set Programmer Control command enables or
disables the programmer control of the tag time-out and audio buzzer.
The tag command time-out instructs the programmer to continue sending a tag command (read, write) over the RF link for a specified period of time. These values are
stored in the programmer’s NVM. The data associated with the Get/Set Programmer
Control commands is shown in Table D-15.
D-17
IT2410 Tag Programmer User Guide
Table D-15 Programmer Status Data
Byte
Bits 7 - 1
Tag command time-out
Spare
Bit 0
Buzzer disable
Tag command time-out — This byte indicates the time-out period for tag commands
in increments of 100 ms. This field is a binary-coded integer with values in the range
of 0 to 255. A value of 0 represents a time-out of 100 ms. A value of 255 represents a
time-out of 25.6 s. This tag command time-out determines the length of time that the
programmer continues to send tag commands over the RF link after having received
the tag command request from the host. The factory default value for the tag command
time-out is 10 s.
Buzzer disable — This bit is used to control the status of the audible indicator for the
programmer. When set to 1, the buzzer functions for the programmer are disabled. The
factory default for the buzzer disable is 0, or buzzer enabled.
Set Programmer Password
The Set Programmer Password command sets and verifies the user password. The user
password can only be changed by resending the set programmer password command
within two seconds of password verification.
Note: Any host software should prompt the user to reenter, or verify, the new password prior to sending a change to the programmer.
These commands are applicable to the programmer only. This command is not linked
with a get command. This maintains the integrity of the password.
The programmer maintains the current user password in NVM that is supplied by the
host. The programmer only responds to a limited command set until the password supplied by the host matches the one stored in NVM. The user password is used to initiate
a programming session. The data associated to the set programmer password command is provided in Table D-16.
D-18
Application Program Interface
Table D-16 Set Programmer Password Command Data
Byte
Bits 7 - 0
Password byte 0
Password byte 1
Password byte 2
Password byte 3
Password byte 4
Password byte 5
Password byte — This subfield contains a six-byte quantity. It provides the password
that is to be assigned to the programmer. All programmer passwords are set to a factory default of PROGMR at the time of manufacture. This nonvolatile parameter is
capable of being changed by the user of the host software. Once changed, the new
password is activated.
A backdoor password is available from the factory for customers who lose or forget
their password. The backdoor password is only valid for a limited period of time. Perform an update of the programmer password after use of this backdoor password so
that the current password is known. Table D-17 lists the backdoor password status
data.
Table D-17 Password Status Data
Bits 7 - 0
Password status
A new programmer password may be set when you issue a Set Programmer Password
command immediately following (within two seconds) the initial Set Programmer
Password command request. The initial command request may contain either the valid
programmer password or the backdoor password.
The response associated with the Set Password Command is shown in Table D-18.
Only limited programmer commands are available until the user password is verified.
Once the backdoor password has been verified, only limited programmer commands
are available until the user password is changed.
D-19
IT2410 Tag Programmer User Guide
Table D-18 Set Password Command Responses
Value
Description
Invalid password
Backdoor password verified
User password verified
User password changed
Programmer Command Restrictions
This section describes the interaction of commands and functions.
During manufacturing of the programmer, the security characters, Ethernet parameters, and serial number are set. The security characters, MAC address, and serial number are written to the programmer and can only be changed at the factory.
Each time the programmer is powered on it performs a self-test and awaits an
acknowledgement from the host. Only the select commands are valid until the Set
Time/Date command is issued. Further restrictions apply until the programmer password is verified using the Set Programmer Password command.
The Identify, Reset Programmer, and Get/Set Time/Date commands are always available regardless of password status. The Set Programmer Password command is only
available after the time and date have been set and validated. The Set Serial Number
and Set Security Characters commands are available only to the factory. Limited tag
commands are available until the programmer password has been verified. Virtually
all commands are available once the programmer password has been verified.
Figure D-1 illustrates the precedence of these functions. The Time/Date is set in permanent programmer memory. Once set and saved using Save Programmer Configuration, the Time/Date no longer need to be set.
D-20
Application Program Interface
Figure D-1 Programmer Command Hierarchy
D-21
IT2410 Tag Programmer User Guide
Get/Set Communications Baud Rate
The Get Communications Baud Rate command requests programmer’s communications baud rate. The Set Communications Baud Rate command sets the programmer
RS–232 communications baud rate.
Upon command, the programmer changes its baud rate to the selected value immediately following the transmission of the command response. It is recommended that the
baud rate only be changed on the host after the programmer has received the acknowledge so that communications are maintained.
Note: You might want to have a command in the host to let the user change the baud
rate when the programmer has been saved to a different baud rate than that of the host
default.
The data associated with the Get/Set Communications Baud Rate is shown in
Table D-19.
Table D-19 Communications Baud Rate Data
Bits 7 - 0
Communications baud rate
Value
Definition
0CH
19,200 bps
0DH
38,400 bps (factory default)
Get/Set Ethernet Parameters
The Get Ethernet Parameters command requests programmer’s Ethernet parameters.
The Set Ethernet Parameters command sets the programmer’s Ethernet parameters.
The data associated with the Get/Set Ethernet Parameters is shown in Table D-20.
Table D-20 Ethernet Parameters Data
Subcommand
Parameter
01H
MAC address
02H
Programmer IP address
03H
Host IP address
04H
Gateway IP address
05H
Network mask
IP addresses — Must be specified in valid dot format, such as 10.3.10.10.
D-22
Application Program Interface
Network mask — Must be specified in valid dot format, such as 10.3.10.10.
MAC address — Must be specified in valid dash format, such as 00-01-02-03-04-05.
MAC address can only be set during factory setup.
All parameters must be passed in C-string format, including 0 (NULL) terminating
byte (Table D-21). N represents the C-string length, not including terminating byte.
Table D-21 C-String Format for Parameters
Command Bytes
Data
Subcommand
1-(N+1)
Data string, such as 10.3.10.10 or
00-01-02-03-04-05.
(N+1)+1
00H
Get/Set Programmer RF
The Get Programmer RF requests the frequency setting from the host. The Set Programmer RF sets the frequency. Data associated with the tag programmer RF is listed
in Table D-22.
Table D-22 Programmer RF Data
Byte
Bits 7 - 0
Reserved
Transceiver RF
Transceiver RF Frequency — This byte represents the transceiver RF. Table D-23
lists the valid frequencies.
Table D-23 Valid Transceiver Frequencies
Byte Value
Frequency (MHz)
2BH
912.75
2FH
913.75
33H
914.75
37H
915.75
3BH
916.75
3FH
917.75
43H
918.75
D-23
IT2410 Tag Programmer User Guide
Data associated with the tag programmer RF is listed in Table D-24.
Table D-24 Programmer RF
Bits 7 - 0
RF control
RF control — This subfield contains a representation of the frequency control as a
binary-coded integer. Valid values are in the range of 0BH to 11H determining the
emission frequency in 1-MHz steps from 912.75 MHz to 918.75 MHz.
Get/Set Time/Date
The Get Time/Date command requests the current time and date that is set on the programmer’s clock. The Set Time/Date command sets the programmer’s real-time clock
to the time and date specified in the request data.
The data associated with the Get/Set Time/Date defines the format of the time and
date (Table D-25). You can modify and read this data at any time. This field is used
with the tag read parameters to append time and date to any response to the host.
Table D-25 Time/Date Data
Byte
Bit 7
Hours
Minutes
Seconds
Hundredths of seconds
Month
Day
Year
The range specifications for the individual time/date fields are shown in Table D-26
D-24
Application Program Interface
Table D-26 Time/Date Field Range Specifications
Description
Range
Hours
0-23
Minutes
0-59
Seconds
0-59
Hundredths
0-99
Month
1-12
Day
1-31
Year
0-99
Note: The fields listed in Table D-26 are binary integers, not binary-coded data.
Note: Only the two least significant digits of the year are contained in the date. It is
the responsibility of the application to use the year such that the year 2000 is processed correctly. The year 2000 is represented by a year value of zero.
D-25
IT2410 Tag Programmer User Guide
Asynchronous Responses
Asynchronous responses to tag commands, programmer modes, errors, and failure
conditions are sent from the programmer to the host.
Power on/Boot/Diagnostics Status Reports
The programmer status is reported asynchronously once at powerup and whenever
any change has occurred during background self-test processing.
If a fault message occurs, a bit representing the fault is set in the diagnostic report
data. The status codes associated with the diagnostic reports are as follows:
•
The command code at powerup or after the issue of a reset command for the diagnostic report status code is 8000H.
•
The command code for background diagnostic report status code is 8001H.
The data associated with the power-on and background status reports for the programmer is specified in Table D-27.
Table D-27 Programmer Status Report Data
Byte
Bits 7 - 0
Programmer status
Programmer status — This field contains the subfields associated with the programmer as shown in Table D-28.
Table D-28 Subfields of Programmer Status
Byte
Bit 7
Bit 6
Bit 5
Bit 4
Bit 3
Boot
flash test
Application
flash test
Reserved
RFI RAM
test
Processor
RAM test
Bit 2
Bit 1
Bit 0
Check
tag test
Spare
Spare
Boot flash test — This bit indicates a failure of the IT2410 boot sector of the flash
memory logic module when set to 1. Tests are automatically and continually run internally by the programmer.
Application flash test — This bit indicates a failure of the IT2410 logic module
application sector flash memory when set to 1. Tests are automatically and continually
run internally by the programmer.
Reserved — Reserved for future use.
RFI RAM test — This bit indicates a failure of the IT2410 RFI RAM logic module
when set to 1. Tests are automatically and continually run internally by the program-
D-26
Application Program Interface
mer.
Processor RAM test — This bit indicates a failure of the IT2410 processor RAM
logic module when set to 1. Tests are automatically and continually run internally by
the programmer.
Check tag test — This bit indicates a check tag failure when set to 1.
Valid Response Tag Data
Valid response tag data is reported asynchronously when a tag is detected. The status
codes associated with the tag data reports are shown in Table D-29.
Table D-29 Tag Data Report Status Codes
Code
Description
3000H
No-tag data status
3001H
IT2200 R/W tag data status
3002H
Reserved
When a tag is detected, tag data is sent to the host computer or lane controller. If it
passes the CRC check, the tag data is assumed to not be corrupted.
D-27
IT2410 Tag Programmer User Guide
D-28

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Modify Date                     : 2004:03:25 09:40:27-07:00
Create Date                     : 2004:01:20 10:26:25Z
Page Count                      : 82
Creation Date                   : 2004:01:20 10:26:25Z
Mod Date                        : 2004:03:25 09:40:27-07:00
Producer                        : Acrobat Distiller 5.0.5 (Windows)
Author                          : jstikar
Metadata Date                   : 2004:03:25 09:40:27-07:00
Creator                         : jstikar
Title                           : 411360-002_IT2410 Tag Programmer UG.book
Page Mode                       : UseOutlines
Tagged PDF                      : Yes
Has XFA                         : No
EXIF Metadata provided by EXIF.tools
FCC ID Filing: FIHIT241005422

Navigation menu