all | frequencies |
|
|
exhibits | applications |
---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
User Manual 1 of 2 | Users Manual | 3.73 MiB | ||||
1 2 |
|
User Manual 2 of 2 | Users Manual | 3.21 MiB | ||||
1 2 | Cover Letter(s) | |||||||
1 2 | External Photos | |||||||
1 2 | ID Label/Location Info | |||||||
1 2 | Internal Photos | |||||||
1 2 | Internal Photos | |||||||
1 2 | Test Report | |||||||
1 2 | Test Setup Photos | |||||||
1 2 | Cover Letter(s) | |||||||
1 2 | RF Exposure Info | |||||||
1 2 | RF Exposure Info | |||||||
1 2 | Operational Description |
1 2 | User Manual 1 of 2 | Users Manual | 3.73 MiB |
Copyright 2005 Welcat Inc. All rights reserved. This document may not be reproduced whole or in part without prior consent from the publisher. Specifications are subject to change without prior notice. All products and company names mentioned in this manual are the trade-
marks or registered trademarks of their respective owners. i SAFETY PRECAUTIONS Be sure to read these precautions before using this product in order to insure safe operation of the equipment. Keep this User's Manual on hand for future reference whenever you may need it. Strict observance of these warning and caution indications are MUST for preventing accidents, which could result in bodily injury and substantial property damage. Make sure you fully un-
derstand all definitions of these terms and related symbols given below, before you proceed to the text itself. This symbol indicates an item that can result in death or serious personal injury if ignored. Warning Caution This symbol indicates an item that can result in serious personal injury or material damage if ignored. Meaning of Symbols A diagonal line through a circle indicates something you should not do. A black circle indicates something you must do. A triangle inside indicates something you should be careful about. ii WARNING Only use the specified bat-
tery pack (HBC-51). Using a different type of battery pack could cause damage to equipment, battery rupture or leakage of battery fluid and re-
sulting in a fire, burn, bodily injury, or serious damage to property. Do not heat the battery pack, nor put into fire or water. Doing so could cause battery rupture or leakage of battery fluid and resulting in a fire, burn, bodily injury, or serious damage to property. Do not carry or store the battery pack together with metallic object such as ballpoint pen, necklaces, coins, hairpins, etc. Doing so could short-circuit the terminal pins, causing the bat-
teries to rupture the battery fluid to leak, resulting in a fire, burn, and bodily injury. Avoid dropping the battery pack or letting it undergo any shock or impact. Doing so could cause the bat-
teries to break, generate heat, rupture or burn. iii Only use the specified charger (QC-001, QC-002) for charging the battery pack. Using a different type of charger could cause battery rupture or leakage of battery fluid and re-
sulting in a fire, burn, bodily injury, or serious damage to property. Do not attempt disassemble or modify the battery pack. Doing so could cause battery rupture or leakage of battery fluid and resulting in a fire, burn, bodily injury, or serious damage to property. Do not use the battery if leakage, change of color or shape, or other abnormali-
ties occur. Doing so could cause fire, burn, bodily injury, or serious damage to property. If it brings close to fire, this cause ignition in leak-
age of battery fluid. Do not charge the battery pack where any inflammable gases may be emitted. Doing so could cause battery rupture or leakage of battery fluid and resulting in a fire, burn, bodily injury, or serious damage to property. WARNING Do not place or charge the battery in the hot places such as a fireside, a stove side, under the burning sun, etc. Doing so could cause battery rupture or leakage of battery fluid and resulting in a fire, burn, bodily injury, or serious damage to property. If battery fluid gets on your skin, or clothes, wash it off with clean water. If it is left, there is fear of dam-
age of skin. Be careful not to hook a strap when carrying the terminal. If strap is caught in an obstacle, it could cause injury or accident. If battery fluid gets in your eyes, wash it out with clean water and contact a physi-
cian immediately. If it is left, there is fear of loss of eyesight. Do not attempt disassemble or modify the terminal. Doing so could cause failure, excessive heat, fire, or electrical shock. Do not stare into laser beam. Do not aim the laser at a persons eye. The laser beam emitted through the reading window is harmful to the eyes. iv CAUTION Do not place or use the terminal in the hot places such as a fireside, a stove side, under the burning sun, etc. Doing so could cause fire, modification of a case or equipment trouble. Do not soak in water. If water will gets into the ter-
minal, resulting in failure, fire or electrical shock. Do not place or use the terminal in high humid or dusty areas. If moisture ore dust will get into the terminal, resulting in failure, fire or electrical shock. Do not drop the terminal or subject it to strong impact or vibrations. This could cause malfunction or failure. v Laser Safety This product using the laser complies with US 21CFR1040.10. This equipment is certified as a Class 2 laser product under the U.S. Department of Health and Human Services (DHHS) Radiation Performance Standard according to the Radiation Control for Health and Safety Act of 1968. This means that the equipment does not produce hazardous laser radiation. FDA Regulations U.S. Food and Drug Administration (FDA) have implemented regulations for laser products manufactured on and after August 2, 1976. Compliance is mandatory for products marketed in the United States. The labels on the product indicate compliance with the FDA regulations and must be attached to laser products marketed in the United States. Caution:
Do not look into the laser beam source through the reading window or point the reading window towards the eyes. The laser beam emitted through the reading window is harmful to the eyes. Use of controls, adjustments or performance of procedures other than those specified in this manual may result in hazardous invisible radiation exposure. Class 2 laser scanners use a low power, visible light diode. As with any very bright light source, such as the sun, the user should avoid staring directly into the light beam. Momentary exposure to a Class 2 laser is not known to be harmful. vi XIT-100-BW Labels Wirless Hand-held Terminal XIT-100-BW CAUTION LASER LIGHT DO NOT STARE INTO BEAM FCC ID IC 650nmLASER 1.0mW MAX OUTPU CLASS II LASER PRODUCT MADE IN JAPAN Product Label Hand-held Terminal XIT-100-BW Wirless CAUTION LASER LIGHT DO NOT STARE INTO BEAM FCC ID IC 650nmLASER 1.0mW MAX OUTPU CLASS II LASER PRODUCT MADE IN JAPAN Serial Label SER No. This product complies with 21 CFR 1040.10. MANUFACTURED:NOV.2005 Welcat Inc. 1-17-12 ShinYokohama,Kohoku-ku,Yokohama, Kanagawa,JAPAN
(INSIDE) FDA Label This product complies with 21 CFR 1040.10. MANUFACTURED:NOV.2005 Welcat Inc. 1-17-12 ShinYokohama,Kohoku-ku,Yokohama, Kanagawa,JAPAN vii US and Canada Regulations This device complies with Part 15 of FCC rules, Canada ICES-003 and RSS-Gen rules. Operation is subject to the following two conditions:
(1) this device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesired operation. Note:
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are de-
signed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used on accordance with the instruction manual, may cause harmful in-
terference to radio communications. Operation of this equipment in a resi-
dential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense. Note:
This Class A digital device apparatus complies with Canadian ICES-003. Cet appareil numerique de la classe A est conforme a la norme NMB-003 du Canada. FCC Warning:
Changes or modifications not expressly approved by the manufacturer re-
sponsible for compliance could void the user's authority to operate the equipment. viii FCC Radiation Exposure Statement Caution:
The available scientific evidence does not show that any health problems are associated with using low power wireless devices. There is no proof, however, that these low power wireless devices are absolutely safe. Low power Wireless devices emit low levels of radio frequency energy (RF) in the microwave range while being used. Whereas high levels of RF can produce health effects (by heating tissue), exposure to low-level RF that does not produce heating effects causes no known adverse health effects. Many studies of low-level RF expo-
sures have not found any biological effects. Some studies have suggested that some biological effects might occur, but such findings have not been con-
firmed by additional research. The XIT-100-BW has been tested and found to comply with FCC radiation exposure limits set forth for an uncontrolled equipment and meets the FCC radio frequency (RF) Exposure Guidelines in Supplement C to OET65. The maximum SAR levels tested for the XIT-100-BW has been show to be 0.6101 W/kg at Body. Co-location:
This Hand-held Terminal (XIT-100-BW) must not be co-located or operated in conjunction with any other antenna or transmitter. ix Contents Contents......................................................................................................................................x Introduction ........................................................................................................................... xiii Enclosed items ...................................................................................................................... xiii Optional Extras ..................................................................................................................... xiii Notational Information........................................................................................................ xiv Manual Contents.................................................................................................................... xv Chapter 1 Hardware 1-1 1-1 Part Names...............................................................................................................................................................1-2 1-2 Preparation before Use..............................................................................................................................1-4 1-2-1 Equipment Connections ..........................................................................................1-4 1-2-2 Additional Software ..................................................................................................1-5 1-3 Wireless Communications........................................................................................................................1-6 1-3-1 Preparations for Data Communication................................................................1-7 1-3-2 Data-Communication Method ...............................................................................1-8 1-4 Product Specifications ............................................................................................................................ 1-10 1-5 Scanning Specifications......................................................................................................................... 1-13 1-6 Charging specification............................................................................................................................. 1-16 1-6-1 Charging the Battery Pack................................................................................... 1-16 1-6-2 Charging Method using Single Charger (QC-001)......................................... 1-16 1-6-3 Charging Method using Multi Charger (QC-002) .......................................... 1-18 1-7 Battery pack (HBC-51)............................................................................................................................ 1-20 1-7-1 Charging the Battery Pack................................................................................... 1-20 1-7-2 Installing and Removing a Battery .................................................................... 1-20 1-7-3 Replacing the Worn out Battery Pack .............................................................. 1-21 1-7-4 Cautions about Cleaning of Electrodes ............................................................ 1-21 1-7-5 Charging the Backup Battery.............................................................................. 1-21 1-8 Memory Backup Period (Battery for backup)............................................................... 1-22 1-9 Not use in long time ................................................................................................................................... 1-24 1-10 Resume function ........................................................................................................................................ 1-25 1-11 Screen Output Characters.............................................................................................................. 1-26 Chapter 2 Software 2-1 2-1 XIT-100-BW Software ..................................................................................................................................2-2 2-1-1 Data Storage ...............................................................................................................2-2 2-2 System menu .........................................................................................................................................................2-4 Chapter 3 System menu 3-1 3-1 Introduction..............................................................................................................................................................3-2 3-2 Save the System Parameter..................................................................................................................3-2 3-2-1 Registry ........................................................................................................................3-2 3-3 Key Names and Functions.......................................................................................................................3-3 3-4 System Menu Operations.........................................................................................................................3-5 x 3-5 Battery Level...........................................................................................................................................................3-8 3-6 Starting the System Menu ......................................................................................................................3-9 3-6-1 How to Start the System menu..............................................................................3-9 3-6-2 Executing a DHCP Request ....................................................................................3-9 3-6-3 Starting State for Wireless LAN Operation ........................................................3-9 3-6-4 Executing Setup Wizard ....................................................................................... 3-10 3-6-5 WLAN Security Alert............................................................................................. 3-12 3-7 System Menu List ......................................................................................................................................... 3-13 3-8 System Setup Menu................................................................................................................................... 3-15 3-8-1 Setting the programs for Automatic Launch................................................... 3-15 3-8-2 Clock ......................................................................................................................... 3-16 3-8-3 Resume (resume function) ................................................................................... 3-17 3-8-4 Password .................................................................................................................. 3-18 3-8-5 Auto wake up.......................................................................................................... 3-20 3-8-6 Auto power off........................................................................................................ 3-21 3-9 WLAN Menu ........................................................................................................................................................ 3-22 3-9-1 SSID ........................................................................................................................... 3-22 3-9-2 Roaming level ......................................................................................................... 3-23 3-9-3 Doze mode............................................................................................................... 3-23 3-9-4 Security ..................................................................................................................... 3-24 3-9-5 Advanced ................................................................................................................. 3-31 3-9-6 MAC address ........................................................................................................... 3-32 3-10 Network Menu............................................................................................................................................... 3-33 3-10-1 TCP/IP .................................................................................................................... 3-33 3-10-2 DHCP ...................................................................................................................... 3-34 3-10-3 FTP .......................................................................................................................... 3-36 3-10-4 DNS ......................................................................................................................... 3-39 3-10-5 SNMP ...................................................................................................................... 3-40 3-11 Receiving Menu............................................................................................................................................ 3-44 3-12 File Menu............................................................................................................................................................. 3-47 3-13 ID Menu................................................................................................................................................................. 3-55 3-14 Device Menu.................................................................................................................................................... 3-56 3-14-1 Barcode .................................................................................................................. 3-56 3-14-2 Key .......................................................................................................................... 3-61 3-14-3 Bluetooth .............................................................................................................. 3-61 3-14-4 Display .................................................................................................................. 3-68 3-14-5 Tone/Vibrator ..................................................................................................... 3-69 3-15 Manage Menu................................................................................................................................................ 3-74 3-15-1 Battery level .......................................................................................................... 3-74 3-15-2 System versions.................................................................................................... 3-75 3-15-3 Initialize.................................................................................................................. 3-75 3-15-4 Clone ..................................................................................................................... 3-77 3-15-5 Drive ..................................................................................................................... 3-80 3-15-6 Mothball................................................................................................................. 3-81 3-15-7 Wizard .................................................................................................................... 3-81 3-16 Test Menu .......................................................................................................................................................... 3-82 3-16-1 WLAN ..................................................................................................................... 3-82 3-16-2 Bluetooth................................................................................................................ 3-86 3-16-3 Barcode .................................................................................................................. 3-87 3-16-4 Display.................................................................................................................... 3-89 3-16-5 Key .......................................................................................................................... 3-90 xi Chapter FAQ (Frequently Asked Questions) 4-1 4-1 FAQ ...................................................................................................................................................................................4-2 Q: The power does not turn ON.......................................................................................4-2 Q: Nothing is displayed on the screen............................................................................4-2 Q: After not using for a while, the power is shut OFF. .............................................4-2 Q: It cannot charge. ............................................................................................................4-2 Q: The System Menu does not start. ..............................................................................4-3 Q: How do I change the application, which starts when the power is turned ON?
..................................................................................................................................................4-3 Q: How do I start another application? .........................................................................4-3 Q: The Barcode is not scanned successfully. ...............................................................4-3 Q: How do I check the free area of a drive?................................................................4-3 Q: I cannot perform wireless data communications. .................................................4-4 Q: I cannot perform Bluetooth communication. .........................................................4-5 Q: Can I use at the same time both WLAN and Bluetooth in the same environment and on the same terminal?................................................................................................4-5 Q: "Writing Failed" was displayed during transmission or reception of a file. ....4-5 Q: "Time Out" was displayed during transmission or reception of a file. .............4-5 Q: "Connection Failed" was displayed during transmission or reception of a file
. ................................................................................................................................................4-6 Q: I want to perform the setup of the terminal IP address etc. at a time from a computer.................................................................................................................................4-6 Q: Starting an application or transmission/reception of a file cannot be performed. .................................................................................................................................................4-6 Q: I suspect that the file is corrupt. ................................................................................4-6 Q: "System Error" was displayed and after pressing a key, the power turned OFF
. ................................................................................................................................................4-6 Appendix. A System Menu Factory Settings List A-1 Appendix. A-1 System menu Factory Settings............................................................................A-2 Appendix. B Sample Barcode B-1 Appendix .B-1 Sample Barcode ....................................................................................................................B-2 Index I-1 Index............................................................................................................................................................................................ I- 2 xii Introduction Thank you very much for purchasing a XIT-100-BW Wireless Hand-held Terminal. This user's manual explains about the hardware and the System program of the XIT-100-BW. We hope the XIT-100-BW will improve efficiency of your business. Enclosed items XIT-100-BW................................................................................... 1 Battery pack(HBC-51) .................................................................... 1 Hand Strap....................................................................................... 1 Manual CD-ROM(GID-001)........................................................... *
* Attached in exclusive package. Optional Extras Dust protection cover(DC-001) Anti-shock cover(DC-002) Access point(AP-4131) Single Charger(QC-001) Multi Charger(QC-002) BluePorter(WLF-001) - Bluetooth file transferring utility. WebGlider-X(WBG-001) - Integrated middleware package for web applications. Handy 5250(HTN-5250A) - 5250 Emulator for handy terminals. xiii Notational Information Indicates a note you can refer to. Indicates a caution.
"XIT-100-BW" "Terminal" Wireless LAN Terminal, Wireless Hand-held Terminal XIT-100-BW. Access point The wireless communication interface to allow data to be sent between the XIT-100-BW and a PC connected to an Ethernet communicating via TCP/IP. Please use our recommended equipment based on the IEEE802.11b WLAN standard. WLAN Wireless LAN System Program The OS stored in the XIT-100-BW. System Menu A function of the system program. WebGlider-X browser The browser operates as an application of the terminal when web based system is configured by using "WebGlider-X". WebGlider-X
"WebGlider-X" is an integrated middleware package for web applica-
tions (WBG-001). Please purchase separately if needed. BluePorter F Drive S Drive Utility software for executing file Transfer using Bluetooth communi-
cation between the PC and the terminal. Please purchase separately if needed. The storage area for storing application, database, and master files. etc. The application data downloaded from the host computer will be stored in F drive. Used for the storage area to store a temporary file during the applica-
tion is running. Battery pack
"HBC-51"
Backup battery The battery to perform a temporary saving the built in clock data and files when the battery pack is removed or the power becomes short. Scan key Used when scanning a barcode. Local device Bluetooth device during operation is running. When the XIT-100-BW is in operation, "Local device" means the XIT-100-BW. Remote device Bluetooth device to which the local device is connected. Default device The Bluetooth device setup as default among the registered Remote device list in the System Menu. In the System Menu always this default device is connected to. xiv Manual Contents Chapter 1 Hardware Explains the standard handling, specifications and operation methods of the XIT-100-BW. Chapter 2 Software Explains an outline of the software installed, and related to the XIT-100-BW. Chapter 3 System menu Explains the System Menu setup and Operation Method. Chapter 4 FAQ (Frequently Asked Questions) Questions and troubles frequently asked, and the items required for resolving them, refer-
ence pages of this manual are also commented. Appendix. A System Menu Factory Settings List Appendix. B Sample Barcode Index xv Chapter 1 Hardware 1 Chapter 1 Hardware 1-1 Part Names
(Inside the cover) 1. Barcode window The opening from where the Barcode is read. As the laser light is irradiated, be sure NOT to look into the window. 2. LCD (Liquid Crystal Display) Data, characters and images are displayed on the LCD. 3. SCAN LED (LED Indicator) If a barcode is read correctly, the light will turn green. While the battery is being charged, the light will turn ON red. When the battery charging is completed, it will turn ON green. 4. ALARM LED Shows the status of Wireless Communications. Shows the status of wireless communication between the access point and the status of EAP authentication. (P.1-12). 5. Scan Key Press this key to read a Barcode. 6. Function Keys(
to
) Used for changing functions and cursor operation. 7. F9 key, F10 key Used for changing functions and cursor operation. Leftward by F9 key, Rightward by F10 key, when using this key to scan a barcode, support by the software is required. 8. 9. key (Enter Key) Press this key to confirm and to execute the entered data or operation. key (Cancellation Key) Used to return to the previous screen, or deleted all the characters entered. 10. Numeric Keys (
to ,
) Used to input assigned numeric, characters, or, select the corresponding item in the Menu. 11. key (Power Switch) 1-2 1-1 Part Names 12. key (back space key) Deletes the last character entered. 13. key (Shift key). Used to switch to the character input mode, or special functions can be accessed by pressing this key together with other keys. 14. Battery Cover Lock Lever Move the lever to the direction of an arrow to lock. Be sure to keep it locked when using it. 15. Battery Cover Always attach the battery cover while in use. 16. Battery Pack After purchasing, be sure to charge the battery pack before you use. Be careful not to have the Charg-
ing terminal jack attached with dust or dirt. When dust or dirt is attached, remove it with a swab etc. 17. Charging jack Be careful not to have the Charging terminal jack attached with dust or dirt. When dust or dirt is at-
tached, remove it with a swab etc. 18. Serial number seal The seal is attached that carries serial number and a description about the direction to which re-
move/install the battery pack. 19. Hand Strap 20. Speaker Hole 21. Product plate Product name, manufacturer and the laser alarm etc. are described. 1-3 Chapter 1 Hardware 1-2 Preparation before Use Please carry out following preparations before using the XIT-100-BW Battery Pack HBC-51 The battery pack is required in order to use the XIT-100-BW. The battery pack should be charged be-
fore use, attached correctly and locked with the battery cover. Isn't the barcode window dirty?
If the barcode window is dirty, a barcode cannot be scanned correctly. When dirty, please wipe lightly with a soft cloth etc. Isn't charging terminal dirty?
If the charging terminal is covered with dust or dirt, charging error or failure may occur. When dirty, please remove the dust or dirt by using a swab etc. 1-2-1 Equipment Connections Data entered can be transmitted from the XIT-100-BW to a host computer or the XIT-100-BW can receive data from a host computer. The following are the Methods for connecting to a host computer. Preparations required depend on the applica-
tion environment. In the case of WLAN communication The XIT-100-BW communicates via wireless LAN com-
munication to a host computer through an access point, which is connected to the Ethernet LAN. Purchased Separately Access Point (our recommended product) Ethernet cables, HUB For details about setting up a wireless network, refer to the Access point Manual and the document. In the case of Bluetooth communication The XIT-100-BW communicates via Bluetooth communi-
cation to a host computer through USB adapter, which is connected to the USB port of the host computer. Purchased Separately Transfer Utility "BluePorter" (Bluetooth USB adapter is in-
cluded.) 1-4 Computer P.1-8 P.1-9 1-2 Preparation before Use 1-2-2 Additional Software In the case where you want to create a system for data communication between the XIT-100-BW and a host computer or build a system using theXIT-100-BW browser, the following software is required. For details of the System configuration, please refer to the online Manual attached to respective software. Software name Web based inte-
grated middleware package WebGlider-X 5250 Emulator for handy terminal Handy5250 Transfer utility Blue Porter Preparation/Use The WebGlider-X software is required when building a Web based wireless system using the WebGlider-X Browser. Please install the "WebGlider-X" package on a computer and setup the com-
munication environment, before performing data communication between the computer and the "WebGlider-X" browser. The Handy 5250 software is required when creating a system to connect to an AS/400 host via the 5250 emulation environment. Please purchase separately if needed. Before using, install the Handy 5250 setup utility, which will allow the setup of the communication environment. The Blue Porter is utility software to perform File Transfer for Bluetooth communication. Please purchase separately if needed. Before using, installing the driver software and the Bluetooth USB adapter setups are required. 1-5 Chapter 1 Hardware 1-3 Wireless Communications Wireless function of the XIT-100-BW The XIT-100-BW is a handy terminal network system incorporating a wireless communication system. The Bar-
code terminal is small, lightweight and excels in portability. It is also suitable for moving around the work place, operating remotely from the computer while collecting Barcode data. The XIT-100-BW 's wireless communication system is based on WLAN and Bluetooth methods. WLAN con-
forms to the WLAN standard, IEEE802.11b. The maximum possible wireless transmission speed is approxi-
mately 11Mbps, enabling the indoor wireless communication up to 75m distance. Bluetooth conforms to the Bluetooth Specification ver1.1, enabling up to 10m communications. Transmission and reception of scanned Barcode data or files can be performed in real time through the wireless network. Wireless Network 10/100 BASE-T Access Point XIT-100-BW Wireless Network Computer 10/100 BASE-T Access Point XIT-100-BW Network example (WLAN communication) Computer XIT-100-BW Network example (Bluetooth communication) 1-6 1-3 Wireless Communications WLAN Communications The wireless communication system is based on the IEEE802.11b standard, which is generally used in Wireless Local Area Networks (WLAN). In almost all cases, wireless communication can be per-
formed if the access point used is based on the IEEE802.11b standard, however, please use our rec-
ommended product to perform a stable communication. As for this product, only the infrastructure mode is supported. It does not support ad-hoc mode. The role of an access point An access point provides a wireless service area to a terminal (XIT-100-BW) and acts as a local bridge, which performs packet transmission between the cabled LAN and wireless network. Each terminal has a unique IP address, which allows direct Ethernet LAN connection through an ac-
cess point. This allows TCP/IP communication between the computer and the terminal. Please use our recommended access points. For information on manufactures and part numbers of the recommended access points, refer to our catalog or contact our sales department. 1-3-1 Preparations for Data Communication For data communication between a computer and the XIT-100-BW, perform the following setup. WLAN communications Item Description 1. SSID Setup 2. Security Setup 3. TCP/IP Setup 4. FTP Setup 5. DHCP Setup 6. DNS setting Set the SSID (or ESSID) of the XIT-100-BW to the same as that of the access point. XIT-100-BW includes an AP search function that will acquire and set up the SSID of an available access point. Make the security settings to the same as the access point. Set the TCP/IP address to allow communication with a computer via the Ethernet LAN. Make the FTP settings to allow wireless file transfer. The FTP settings corresponds to the "WebGlider -X"
FTP server or general FTP server settings. Make the DHCP settings when using the DHCP client function. This corresponds to the "WebGlider-X"
DHCP server. Make the DNS settings in the case where the DNS is used for name resolution. Whether or not the DNS is used depends on the application. Reference page P.3-22 P.3-24 P.3-33 P.3-36 P.3-34 P.3-39 Items mean:
Using the DHCP client function on the computer side (P.3-34), all configurations are performed at the same time. When you use the DHCP client function, "WebGlider-X " is required. 1-7 Chapter 1 Hardware Since setting the "1. SSID Setup" and "2. Security Setup" using the DHCP client function creates a security weak point, please do not use this function whenever possible. Bluetooth communication Item Description 1. Terminal ID setup ID number for Identification to each XIT-100-BW.
"BluePorter" and "WebGlider-X" identifies the terminal using this ID. 2. Bluetooth device setup The setup of registrations to connect required for com-
munication, and Security etc. Reference pages P.3-55 P.3-61 1-3-2 Data-Communication Method Once the equipment has been setup, data communication can be performed using the following procedures. In the case of WLAN communications The procedure for performing WLAN communications is as follows. 1. Connect the access point to the Ethernet LAN, then setup the access point so that it can communi-
cate with a host computer. At this point, be sure to perform Security setup. 2. In order to enable the Security setup of 1. , Restart the access point. (Some access points do not re-
quire restarting.) 3. Turn ON the XIT-100-BW and setup the WLAN and TCP/IP from the System Menu. At this point, be sure to perform Security setup. When the XIT-100-BW is started up without Security setup, the warning screen "NO WLAN Secu-
rity " is displayed. Though it is possible to make this warning screen being not displayed, this is not recommended for Security reason. Please set this screen if there is no special reason for not displaying it. 4. From System menu, set up TCP/IP. (P.3-33) 5. When setup is complete, first perform the Ping test toward the IP address of the access point, then toward the IP address of the computer. 1-8 1-3 Wireless Communications 6. Setup FTP to transmit and receive a file. See P.3-51 for transmitting a file to a host computer from the XIT-100-BW. See P.3-44 for receiving a file from a host computer to the XIT-100-BW. In the case using the DHCP function (P.3-34), "WebGlider-X" is required separately. In the case of Bluetooth communication The procedure to perform Bluetooth communication is as follows. 1. Starting up the host computer in which "BluePorter" is installed. 2. Connect the Bluetooth USB adapter to the USB port of the computer. 3. Starting up the "BluePorter", and perform the setup required for transmission or reception of files. 4. Turn ON the XIT-100-BW, perform setup for connection and so on. 5. Perform transmission or reception file. See P.3-51 for transmitting a file to a host computer from the XIT-100-BW. See P.3-44 for receiving a file from a host computer to the XIT-100-BW. 1-9 Chapter 1 Hardware 1-4 Product Specifications CPU OS Memory ROM Scanner RAM Codes scanned LED LCD Number digits scanned Scanning width Light source Laser class MAX output Wavelength Scanning speed PCS Resolution SCAN LED ALARM LED Display element Display size dots Display Characters (Kanji) Display Characters
(Single-byte characters) Display area Display Characters Contrast adjustment Backlight Speaker Vibrator Key Input part Keys Size Weight Cradle charging function 1-10 32 bit RISC CPU ITRON 16MB(including12MB for file area) Download file has 6MB max .In case the extension is "wav"
or "out", the download file has 5MB max. 16MB(including 6MB for file area) NW-7, CODE39, JAN-13/8(add-on: enabled), UPC-A/E, In-
dustrial 2of5, ITF, CODE93, CODE128, EAN128, RSS-14
(Stack: enabled), RSS Limited, RSS Expanded*1 MAX 74 digits (data digits) MAX 360mm Red light semiconductor laser Class2 (JIS C 6802) 1mW 65010nm 100scanning/ seconds 0.45 or more (reflectance space and margin: 70% or more) 0.127mm Green / Red / Orange Orange (which illuminates when out of range) FSTN dot matrix 132(W)128(H) 10 chracters10 lines (12dot font) 8 chracters8 lines (16dot font) 20 chracters10 lines (12dot font) 16 chracters8 lines (16dot font) 38(W)44(H) mm JIS level-1 kanji set, JIS level-2 kanji set, ANK, Symbols, external characters. (Wide, tall and quad characters are en-
abled) 8 levels White LED (Luminosity adjustable) Beep sound, audio, play via speaker. At the time of scanning, various kinds of Error (can be speci-
fied by the user) Vibrated at the time of scanning, various kinds of Error (can be specified by the user) 27 58(W)162(D)40(H) mm Grip part45 (W)26(H) mm Approximately 203g(battery pack included) Enabled (However the environment during charging con-
forms to charger's temperature specification) Power Operating environment Main Battery Backup Battery Working temperature Working humidity Storage temperature Storage humidity Drip-proof / Dust-proof Drop impact proof Illumination conditions Continuous operation time 1-4 Product Specifications Lithium-ion battery Lithium-ion battery (Maintenance free)
-5 to 50C 20 to 80% (non condensing)
-10 to 60C 10 to 90% (non condensing) IEC IP54 1.5m (onto concrete)*2 Artificial light up to 4,000lx Sunlight up to 80,000lx Approximately 20 hours Setup conditions: scan once in 20 seconds WLAN transmis-
sion or reception Year (4 digits) Month/Date/Hour/Minute/Second With automatic leap year compensation, With timer function Bluetooth Specification Ver1.1 Spread spectrum (frequency hopping) Clock function Wireless part Blue-
tooth WLAN Management function Support MIB Class2 2.4GHz band Built in the body MAX 10m Specification Communication Method Frequency Communication rate MAX 921.6kbps Transmission power class Antenna Communication dis-
tance Standards Communication Method Frequency Antenna power out-
put Transmission rate Number of channels 11 Security Antenna Transmission range IEEE802.11b Spread spectrum (direct sequence) 2.4GHz band Less than 10mW/MHz 11/5.5/2/1 Mbps (Switched automatically/fixed) SSID, WEP (40/128), PSK-TKIP, IEEE802.1X Built in the body IndoorsMAX 75m, outdoorsMAX 200m SNMP agent MIB-II (RFC1213), Welcat Enterprise MIB
*1 a part of the specification RSS Expanded Stacked is not supported. About details please contact our sales de-
partment.
*2 test value, not guaranteed value. 1-11 Chapter 1 Hardware Display of ALARM LED during wireless communications The state and meaning of the alarm LED during wireless communications are as follows. LED state Meaning OFF Blinking ON Communication with an access point is possible. Or no commu-
nication is currently taking place. Continuous blinking during EAP authentication (P.3-28) Communication with an access point has been attempted but syn-
chronization with the access point cannot be achieved. When the barcode scanner goes out of sync with the access point, the LED will turn ON. SCAN LED Display during terminal charging SCAN LED status and Meaning during terminal charging is as follows. LED status Meaning Red ON Green ON OFF Performing terminal charging. Charging terminal has normally completed. During terminal charging, an Error occurred. 1-12 1-5 Scanning Specifications 1-5 Scanning Specifications Laser light irradiation angle The angle of the laser light irradiated from the XIT-100-BW is 54 degrees. Scanning Depth The range across which a Barcode can be scanned is called a "scanning depth."
The scanning depth for the XIT-100-BW is as shown in the figure below. 1-13 Chapter 1 Hardware Inclination of a Barcode and the angle with which it can be read The following are the three kinds of a Barcode inclination SKEW PITCH SKEW TILT TILT PITCH Skew Scanning is possible up t o 50perpendicular to the upper and lower sides of a Barcode. Dead Zone 8 The range of 8around a vertical line from the front face of a Barcode is the "Dead Zone" caused by the specular reflection; scanning may become poor within this range. Change the angle if you cannot read the Barcode and scan it again. Pitch Scanning is possible up to 35 perpendicular to the right and left of a Barcode. 1-14 Tilt 1-5 Scanning Specifications The Tilt is the angle with which the laser light irradiates the Barcode. Tilt angle 20 Margin The laser light should always cross the whole label. Make sure it also irradiates the unfilled space (margin) to the right and left of the Barcode. Measurement Condition is as follows. 110mm from the head of the Laser scanner module. Used label At the time of measurement of pitch angle, skew angle, dead zone PCS=0.9, Resolution=0.25mm, 9 digits Code39, Narrow/Wide ra-
tio=1:2.5, margin=10mm At the time of measurement of tilt anglePCS=0.9, Resolution=0.26mm, 13 digits JAN, margin=10mm 1-15 Chapter 1 Hardware 1-6 Charging specification 1-6-1 Charging the Battery Pack XIT-100-BW allows charging with a battery pack installed on the terminal by using dedicated charger
(QC-001/QC-002). Though the operation can be performed in this status, but be sure to avoid the key operation lest it may fall or cause poor contact with the charging terminal. 1-6-2 Charging Method using Single Charger (QC-001) When the XIT-100-BW and the battery pack are set at the same time, the XIT-100-BW charging has a priority. After the XIT-100-BW charging completed, the battery pack charging starts. The chargers can be connected by using the joint enclosed in the Single Charger (QC-001). (Limited to single Charger). However carrying them as connected gives a large load on the joint fixed part, take care in handling. When more than four chargers are connected, please use the Multi Charger (QC-002). Charging with the battery pack attached to the XIT-100-BW During charging, the SCAN LED on the XIT-100-BW will turn ON red, when charging completed turn ON green. Charging time is approximately 2.5 hours. Take notes to the direction of the XIT-100-BW when set it on the charger. Place the XIT-100-BW in the charger as shown below. During charging Charging complete SCAN LED green turn ON, Charging Error SCAN LED red turn ON, SCAN LED turn OFF, In case an error occurred during charging in the state of running on, the screen on the right will be displayed for 5 seconds, and then the power will turn OFF. 1-16 1-6 Charging specification Charging the Battery Pack alone During charging, the Battery charging LED in the upper part of battery mark on the front of the charger turns ON red, while charging has completed it turns ON green. Charging will be completed in approximately 2.5 hours. During Charging Charging complete Battery charging LED green turn ON Charging Error Battery charging LED red turn ON Battery charging LED turn OFF, Please take care for the direction of the battery pack when you set it on the charger. Place the battery pack in the charger, as it should turn a label side to the back, and should set a electrodes downward. 1-17 Chapter 1 Hardware 1-6-3 Charging Method using Multi Charger (QC-002) The Multi Charger (QC-002) allows charging many batteries simultaneously. In the XIT-100-BW and the battery pack which are set in the same number as that of the Multi Charger, the XIT-100-BW charging has the priority;
the battery pack charging starts automatically after the XIT-100-BW charging has completed. Charging the battery pack attached to the terminal. During charging the SCAN LED on the XIT-100-BW terminal will turn ON red, when charging completes turn ON green. Charging time is approximately 2.5 hours. Take notes the direction of XIT-100-BW when set it on the charger. the to During charging Charging complete Charging Error SCAN LED red turn ON SCAN LED green turn ON SCAN LED turn OFF, Place the XIT-100-BW in the charger as shown below. When error occurred during charging in the state of running on, the power will turn OFF displaying the screen on the right for 5 seconds. Charging a battery pack alone While charging, the LED on the up-
per part of the mark on each battery turns ON red, and when charging completes, turns ON green. Charging time is approximately 2.5 hours. it During charging Battery charging LED red turn ON Charging complete Battery charging LED green turn ON Charging Error Battery charging LED turn OFF, When setting battery on the charger, please take notes to the direction of the battery pack. 1-18 1-6 Charging specification Place the battery pack in the charger, as it should turn a label side to the back, and should set a electrodes downward. When charging Error occurred, charge it again. If the error occurs re-
peatedly, remove the battery and contact our sales department. Take care not to use the battery that the error occurred. 1-19 Chapter 1 Hardware 1-7 Battery pack (HBC-51) 1-7-1 Charging the Battery Pack Be sure to follow the precautions below when handling the battery pack. After purchasing, be sure to fully charge the battery pack before using. Be sure to shut off the power before removing the battery pack. If the battery pack is removed during operation, the data file in the S drive may be corrupted. Be sure not to touch the electrodes with your hand, and avoid dust on the electrodes. Otherwise this may cause poor contact with the battery pack and the XIT-100-BW. When dirty, wipe clean with a dry soft cloth. When installing and removing the battery pack, use a desk or other appropriate surface as the working table so that it cannot fall onto you feet. Be sure to attach the battery cover and lock it before use. 1-7-2 Installing and Removing a Battery A packing material to protect the water immersion is attached to the Battery cover. When installing the Battery cover, please confirm if the dust or dirt NOT attached to the packing or the packing inserted correctly. If the dust or dirt is attached, wipe it softly with dry clean cloth. Removing the Battery Pack 1.Release the lock by sliding up the lock lever. 2.Remove the battery cover. 3.Take out the battery pack from electrodes side. 1-20 1-7 Battery pack (HBC-51) Installing the Battery Pack 1.Insert the battery pack in main body cushion side first. 2.Attach the battery cover to bottom side first, and lock by sliding down the lock lever. 1-7-3 Replacing the Worn out Battery Pack A battery pack is an expendable item. Even if the battery pack is used correctly, it will deteriorate gradually in the course of being charged and discharged repeatedly. If the usage time is becoming shorter even after charging for the specified charging time, please replace the ex-
isting battery pack with a new one. 1-7-4 Cautions about Cleaning of Electrodes When the operational time has become shorter or it is having trouble starting, poor contact between electrodes because of dirt, may be the cause instead of a degrading battery. If this is the case, cleaning both the battery elec-
trodes and the main body electrodes will improve this condition. Methods for cleaning the electrodes Please wipe the dirty electrodes with a clean dry soft cloth, a swab, etc. Never rub the electrodes with an unclean cloth, fingers or a hard object. Wipe the electrodes lightly, especially the main body elec-
trodes, else they may get scratched or deformed. 1-7-5 Charging the Backup Battery This section describes the Method for charging the backup battery. 1. Put the XIT-100-BW (with no battery pack installed) and one fully charged battery pack at a handy place. 2. Install the XIT-100-BW with the battery pack. The charging process for the backup battery will then be started. If the Backup Battery has completely been discharged, do not remove the battery pack for at least two days after the start of the charging process. 1-21 Chapter 1 Hardware 1-8 Memory Backup Period (Battery for backup) XIT-100-BW has two drive areas to store the file: F drive (Non-volatile) and S drive (Volatile). The application data download from host computer is stored in F drive, so the data won't be lost even if the battery pack has worn out. (Refer "2-1-1 Data Storage" "Information about the data storage (drive configuration)" See P.2-2). Memory Back Up by battery pack Battery Use Charging time Backup Period Notes in Use Battery pack The operation by XIT-100-BW Charging the battery by using a Dedicated charger, Approximately 2.5 hours to complete charging. The data storage period with a full charged battery pack attached is as fol-
lows. The data in S drive and resume (suspended) information Approximately 25 days When the battery pack is removed during operation, the data in the S drive and resume information will be lost. When temporary storage is per-
key to power off, and then remove the bat-
formed, be sure to press the tery pack. Refer to "1-10 Resume function"(P.1-25) for resume function. If such an operation as removing a battery pack each time the terminal is not used (the memory back up by the back up battery is applied), the backup period will get extremely shortened in approximately half a year. In this case, the replacement of the backup battery is necessary (paid) therefore please attach the battery pack except for changing the battery. 1-22 1-8 Memory Backup Period (Battery for backup) Memory Back up by backup battery Battery Use Charging time Battery for Backup The Clock data built in XIT-100-BW is kept. In addition, The data in the S drive is saved only for a certain period while replacing batteries etc. When resume function setup is enabled, the resume information is stored. Approximately 2 days after fully charged battery pack is attached to the XIT-100-BW. Backup period Data storage period after removing the battery after Normal termina-
tion*1 is as follows. S drive data and resume information (when resume function is enabled)Approximately 15 hours Built in clock dataApproximately 6 months Data storage period after terminating by Mothball Menu*2 is as follows. Built in clock dataApproximately 1 Year
(with or without battery pack) For details of prolonged storage of the terminal, please refer to"1-9 Not use in long time" (P.1-24). The data lost due to the worn out of the battery for back up will not be restored. Be sure to save the data other than the temporary one in the F drive. Notes in Use
*1 Normal terminationThe termination method after pressing the key remove the battery pack.
*2 Termination by Mothball The method to terminate to select mothball from the System menu. The Memory backup time varies depending on the surrounding envi-
ronment. For example, backup time will be drastically reduced in tem-
perature below 0oC and over 40oC and more. It is recommended to use the battery at room temperature. 1-23 Chapter 1 Hardware 1-9 Not use in long time Not use in long time (the terminal) If you do not use the terminal for a long period (more than 6 months), it is recommended to setup the terminal to Mothball, the power will soon turn off. By Mothball setup, though the data in the S drive and resume information will disappear, the built in clock data will be kept, thus saving the consumption of the battery. About setup method, refer to
"3-15-6 Mothball"(P.3-81) for the Setup method of Mothball. Not use in long time (the battery) for Battery When you do not use the battery for an extended period of time, setup the terminal to Mothball and removing the battery to keep it in a cool spot charged about 50%. When you do not use it for one month or more, remove the battery pack and keep it at room temperature. The battery may deteriorate rapidly by over discharging or under high temperature. 1-24 1-10 Resume function 1-10 Resume function The XIT-100-BW supports resume function, from System menu, setup, the behavior of the power on by the key. For setup method, see "3-8-3 Resume (resume function)"(P.3-17). Resume function enabled After pressing key to turn off the XIT-100-BW and start up with key, the processing resumes what was executed immediately the before the power off. Resume function disabled After pressing key to turn off the XIT-100-BW and start up with the key, the processing always starts from the first stage. Please be informed that when the battery pack is removed during the operation of the terminal, the program will be executed from the begin-
ning regardless whether the resume function is enabled or disabled. Please be informed that when the back up battery is consumed, the pro-
gram will be executed from the beginning regardless whether the Resume function is enabled or disabled. With regard to charging the battery for backup, please refer to "1-7-5 Charging the Backup Battery"(P.1-21). 1-25 Chapter 1 Hardware 1-11 Screen Output Characters Welcat specific Double-byte characters 1-26 1-11 Screen Output Characters Single-byte characters 1-27 Chapter 2 Software 2 Chapter 2 Software 2-1 XIT-100-BW Software The XIT-100-BW Software consists of the following two types. System program Application program Controls the basic operation of the XIT-100-BW. It is equiva-
lent to an OS (operating system) of a personal computer, and is preinstalled in the XIT-100-BW. The System Menu, which sets the basic parameters for operation and performs various verifications, is a part of the system program. Used for user operations processing. This program is mainly used for scanning Barcodes, data transmission to a computer, etc. If you purchase "WebGlider-X", you can easily combine it with the WebGlider-X Browser to build a Web based sys-
tem. If you purchase "Handy5250", it allows you 5250 emu-
lation and configures the handy terminal system with high re-
liability of AS/400 host computer. Refer to "Chapter 3 System Menu" (P.3-2) for detailed information about the System Menu. For information about "WebGlider-X," see the online manual included with the product package. 2-1-1 Data Storage Information about the data storage (drive configuration) The XIT-100-BW has two drives for storing data. The S Drive and the F Drive. Drive Data Retention Use Maximum Capacity 64 files F drive S drive Non-volatile memory The contents of this drive will be retained after the backup battery is dis-
charged. Volatile Memory Once the battery pack is suddenly removed during operation or the backup battery is discharged the contents of the drive will be lost. Used to store all files, such as application, the database master files and normal data files, etc. S Drive Used to store tem-
porary files when an appli-
cation is running on. 64 files When the F Drive receives a file, the S Drive receives the file first then moves it to the F Drive. In case where the F Drive receives a file, confirm that there is enough storage space on both the S Drive and F drive beforehand. When receiving files if there is a file with identical name on the S drive, the old file will be erased. 2-2 2-1 XIT-100-BW Software File Naming The file names used by the XIT-100-BW are subject to the following restrictions. File name length A file name allowed to enter is up to 31byte long, including Characters that can be used. extension. Characters can be composed of as any combination of the fol-
lowing characters. Alphabet(A to Z) Numbers (0 to 9) Symbols(!#%&'()@^_{}~.) Single-byte space Other restrictions A space, or, "."(Period) is prohibited to use at the head of the file name. About extensions The XIT-100-BW recognizes files through extensions.
".OUT"
".WAV"
".MP3"
".SFL"
".BMP"
Recognizes as an application. Recognizes as audio data. Subject to format restrictions for the WAV file and MP3 file that can be played on XIT-100-BW. (P.3-47) SFL is a system original style text file. (P.3-47) Recognizes as a Bitmap image. The bitmap file displayed on XIT-100-BW is subject to format restrictions. (P.3-47) The files generated by the system and application A part of the System program and application program of the XIT-100-BW create a temporary file and a file to save the setup value. If these files could not be generated for such reasons that there are too many files, or no space in the drive etc., each program fails to work normally. System program generates a registry file in the F drive to save the Setup value of the System menu. Four files are created in this case, however, this is a hidden file and not displayed in the System menu. By using WebGlider-X browser following files are created in the S drive during HTTP communica-
tion. Since a file with the same name is overwritten, be sure to use a different name than the following file names. HTTP.LOG HTTPTEMP (with no extension) HEADTEMP (with no extension) When an application is programming, and SQLite Library is used, a temporary file will be created in the S drive during database operation. The file name will be created randomly to avoid overlapping with the existing file. 2-3 Chapter 2 Software 2-2 System menu Through the System Menu, you can make the XIT-100-BW fundamental operation settings, install the applica-
tion program and transmit data files, etc. Refer to "Chapter 3 System Menu" (P.3-2) for details about the System Menu. 2-4 Chapter 3 System menu 3 Chapter 3 System menu 3-1 Introduction The System menu is a part of the system program, which is preinstalled in the XIT-100-BW as one of the func-
tions that comprise the operating system. It also provides a platform for installing application programs and per-
forming environmental setup for the whole system. This chapter describes how to set up the XIT-100-BW and perform various verification checks, with primary focus on how to use the "System menu."
3-2 Save the System Parameter 3-2-1 Registry The system parameters that are set up in the System menu are called "Registry". In addition, as these registry files are not displayed in the System menu as these are hidden files. As the registry is saved in the F drive, it will be not erased even though the back up battery is worn out. Registry is classified into five categories as below. User Registry Security Registry Unique Registry System Registry Device Registry General set up value. Most part of the items setup in the System menu creates the User Registry. Security related setup value such as WEP key and SSID etc. Setup value unique to the terminal such as IP address and terminal ID, which generally does not overlap to the other terminals. Using a unique setup value used by the XIT-100-BW.The execu-
tion of Setup or reference from the System menu is not enabled. This is the item such as Battery level or radio signal level that is to refer the parameter that changes in real time during the operation of the terminal. The setup value that belongs to this device registry can only be referred to, but unable to setup. The four registries except for Device registry are saved in an independent file respectively. For this reason there are four files are always stored in the F drive of XIT-100-BW. As the registry is stored in the F drive, it will be not erased even if the battery is disconnected. The Device registry is not saved in a file, as it varies according to the operation status of the terminal. Please refer to "Appendix. A-1 System menu Factory Settings"(P.A-2) with regards to what menu the setup value belongs to. The Clone (P.3-77) allows the other terminal to copy the registry and duplicate the terminal with the same setup as that of the original. By using "initialize" Menu (P.3-75), the registry will be erased, restoring the terminal to the status of Factory Setup. 3-2 3-3 Key Names and Functions 3-3 Key Names and Functions This Chapter explains about keys and functions used in the System menu. In this Manual each key is described as follows. Press this key to read a barcode. In the system menu, F9 and F10 key also have the same function as a scan key. Used to confirm an op-
eration or the Selected menu item, Used to confirm input-
ted data. Ten key Used to enter assigned number and characters. Used to select the corre-
sponding menu item. Input Symbols and decimal points. When or is displayed, the corresponding key is pressed to display the sub menu or exe-
cute assigned functions (special features). Used to return to the previous menu. Used to clear all the characters entered. move the selected item When entering character move the cursor to the direction shown by the arrow. Change the upper-case/lower-
case of the entered character. key Switches the character input mode. Delete an entered char-
acter. Turns on/off the back light each time the key is pressed. When the battery level is lower than the regulated value, the backlight does not turn on. 3-3 Chapter 3 System menu Assigned key character list Key Numeric input mode Alphabet input mode 1 2 3 4 5 6 7 8 9 0 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
(space)
3-4 3-4 System Menu Operations 3-4 System Menu Operations Here explains the Standard Operation Method of the System menu. Select the target item from the menu Selecting a Menu Item Selected item becomes highlighted (colors reversed= selected). Move the cursor either by pressing rection (
) key. to to key, which corresponds to the item, or, by using the di-
confirm the selected item Press the The behavior after confirmation differs according to the item. key, and, confirm the selected item. Execute the corresponding function Show the decision [Yes] or [No] (check box) Next Menu is displayed. Sub menu is displayed. Cancel Selecting Press the key, to return to the previous operation. Screen display When the items in the Menu are not housed in a screen, the scroll bar for vertical direction is dis-
played on the right of the screen. In addition, when the item name exceeds 1 line, the tail of the item name is displayed being converted in " "
Input Barcode data Barcode Scanning Press the scan key and irradiates the laser to scan a barcode. The irradiation time of the laser and scanning behavior are set up with trigger mode. In addition, Bar-
code test menu is not subject to trigger mode. Barcode scanning condition The Barcode that can be scanned in the data input mode is as follows. NW-7, CODE39, JAN13/8, UPC-A/E, Industrial 2of5, ITF, CODE93, CODE128, RSS-14, RSS Limited 3-5 Chapter 3 System menu Input by the key Switching the Character Input mode XIT-100-BW allows inputting characters using numeric keys and The character allowed to enter is Numeric, Alphabet (upper-case/lower-case) and Symbols, changing input modes according to the character to enter.*1 key.
"Numeric input mode"
Numeric and decimal point are allowed to enter.
"Alphabet input mode"
Alphabet (upper-case/lower-case) and Symbols are allowed to enter. Each time the key is pressed, the input mode changes*
Numeric input Make the character input mode to numeric input mode( cursor: (rectangle)). Press key, and input corresponding numeric. Press the to key, and input decimal point. Alphabet input to key, and input the assigned alphabet. Make the character input mode to alphabet input mode( cursor(under bar)). Press When an assigned Alphabet on the same key is continuously entered, press the cursor, and input the next alphabet. Press the Lower-case character.*2
key, and alphabet at the cursor position changes ;Upper-case character key to move the Input the symbol key, or key, and input the assigned symbol. Make the character input mode to alphabet input mode( cursor: _ (under bar)). Press the When an assigned symbol on the same key is continuously entered, press the cursor, and input the next symbol. When the cursor is at the end of the entered data, press the right of the cursor.*2 key to move the key, and a space is inserted to the Confirm the entered data. Press the key. Delete the character*3 Press the Press the key, and delete the character at the cursor by 1 character. key, and delete all characters. Cancel the input In such an item that deleting characters is not allowed (refer to *3), press the key, and stop the in-
put immediately. In such an item that deleting characters is allowed, after deleting all characters en-
tered and press the key. Others When the input characters are filled over the field length, the cursor returns to the top.
* The item that the kind of characters allowed to enter is restricted ( exampleterminal ID is nu-
meric only )cannot change the Input mode.
* The Characters allowed to enter may be restricted according to the item.
* In the item of which format to enter is fixed(exampleIP address) the character cannot be deleted. In this Manual the Input Format fixed items are shown with the icon in the right. 3-6 3-4 System Menu Operations Other operations Returning to the previous menu. Press the key. Check box operation key is pressed, the status of Select /Not Select switches. By applying or removing checks in the square box, making the item selected/not selected. Each time the Each time the The check box is also applied when selecting many items at the same time. key is pressed ,[Yes]/[No] switches. Radio buttun operation The item the inside of the small circle is dotted shows that it is currently enabled. Radio button is used to select one item from many items. Message box operation When two buttons are displayed in the lower part of the box; [Yes]/[No] etc., press select the button by using the direction (
confirm. Press the key to select the right button. In such a case with one button like "OK", press the or,
) key (Highlighted), and then press the key or key. to key, or key to Level meter operation. Setup value adjustment by stages. Move the slider Up and Down by value. Press the key to cancel setup. Turning ON/ OFF the backlight.
key. And then, press the key to confirm the level Each time by pressing the less than the regulated value, the backlight does not turn ON. key, the backlight turns ON/ OFF. However in case the battery level is Accessing to the Sub menu or function. When the Sub menu or execute the function. or is displayed in the lower part of the screen, press the corresponding key to display Modifying the indicator when operating The indicator (buzzer/audio/vibrator/LED) that works when operating allows itself to be modified to user's original setup. With regard to the modification Method, please refer to"Indicator func-
tion"(P.3-69). By modifying this setup users' are allowed to create their original indicator easily. In addition, there are some operations that the indicator is not applied. 3-7 Chapter 3 System menu 3-5 Battery Level When the battery level of the battery pack lowered, operation is restricted or the power may turn OFF. Checking the current battery level From the System menu, select"8:Manage", and then "1:Battery level". Restricted operation when the battery level is low. Some operations of the System menu are restricted, when the voltage level is less than the regulation level (the level differs according to the operation) at the time of execution. In this Manual, the operation that will be restricted is shown with the icon. Battery Alert The Display below and the buzzer inform the user of the battery shortage. Approximately after 5 seconds, the power is forcibly turned OFF. 3-8 3-6 Starting the System Menu 3-6 Starting the System Menu 3-6-1 How to Start the System menu 1. Once the XIT-100-BW has been correctly installed with a battery pack and if the current state is key for approximately 1 second. The power will turn ON and the System menu OFF, press the will be started. 2. The System menu is displayed immediately after the opening screen. If an application is set for " Auto execute" (P.3-15), hold down the scan key (excluding F9 and F10), and then press the key to start the System menu. 3-6-2 Executing a DHCP Request If the "Startup type"(P3-35)is setup at[application boot], [System menu boot], the DHCP request will be executed every time of booting. If the system is in the state where wireless communications with an access point is possible and if the DHCP server and FTP server of the "WebGlider-X " Net-
work Manager have been started, the various environmental setting values and specified files will be downloaded to the XIT-100-BW and automatic setup will be perform via the TCP/IP network. After the DHCP request has been executed, the applications set for "Auto exe-
cute" if any, will start. (P.3-15) 3-6-3 Starting State for Wireless LAN Operation Immediately after starting, the XIT-100-BW's wireless LAN communication unit is set to a resumed state. If the wireless communications related menu is selected immediately after starting, the XIT-100-BW will be ready for communication within 0.5 to 1 second. 3-9 Chapter 3 System menu 3-6-4 Executing Setup Wizard At the initial startup of the terminal, the setup wizard is executed to perform the minimum setup of the request for communication between the terminal and the server. Select either[Yes]or [No]. Select [Yes], then the wizard will be executed to perform the setup of WLAN and TCP/IP. Select [No], then the System menu will start up. When selecting [No] to skip the Setup Wizard, or, completing the setup to the last moment by executing Setup Wizard, the Setup Wizard will not startup from next time and after. Each item to be entered in the Setup Wizard can be set up each by each in the System menu. In addition, Setup Wizard can be arbitrarily executed from the System menu (P.3-81). 3-10 3-6 Starting the System Menu With the Setup Wizard, each item is setup respectively according to the flow of the following Chart. The ac-
companying item differs by the branch of the selection. This is only performed by Wizard Execute when starting up the terminal. When "Wizard Execute" is per-
formed from the System menu (P.3-81). It returns to the System menu without executing DHCP. WLAN authentication method is not allowed to setup by the wizard. Especially IEEE802.1X requires receiving the files such as Certificate etc., complicating the setup, please perform the setup manually. 3-11
*1 Chapter 3 System menu 3-6-5 WLAN Security Alert When the WLAN Encryption Method is disabled, the dialog to alert the setup is displayed at the time of starting up. Select either from [Yes] or [No]
Select [Yes], moves to "2:WLAN". Select [No], System menu is displayed. When the resume is enabled, this dialog is not displayed. 3-12 3-7 System Menu List 3-7 System Menu List System menu is configured as a structural architecture that is classified for respective functions. 3-13 Chapter 3 System menu Please refer to the "System menu Factory Settings" (Appendix A-2) for information about the System menu factory settings. 3-14 3-8 System Setup Menu 3-8 System Setup Menu The setup for convenient functions to facilitate your XIT-100-BW. 1. From System menu, select "1:System". Select the item to setup. Auto execute Clock Resume Password Auto wake up Auto power off 3-8-1 Setting the programs for Automatic Launch You can set programs to launch automatically when the power is turned ON. In the factory settings, the System menu is set to launch automatically. When the DHCP function is enabled, these settings can be made automati-
cally. In the case to have the DHCP function enabled, refer to the
"WebGlider-X" Manual for details 1. From the System Setting Menu, select "1:Auto execute". From the list, select "System menu" or "application program". The current program name is displayed with dotted radio button. key, and information related to the Selected applica-
Press the tion program is displayed. Press the key, and return to the previous Menu. 3-15 Chapter 3 System menu 3-8-2 Clock This function is to confirm the current time, and set up the time. In addition to Manual Setup, setting up the clock via the "Server Setting" to adjust the time of the terminal to that of the host computer is possible, when the DHCP function is enabled. Current Time 1. From the System Setup Menu, select "2:Clock"
Current Time is displayed. Select the item to setup. Manual setting Server setting Manual setting 1. Input the time data. Server setting Press the Press the time. key, and confirm the time. key to cancel setting and return to current Server setting, confirm the following beforehand. WLAN communication setup(SSID, Security etc.) between the terminal and the access point is correctly setup. The power of the access point and the host computer is ON. The access point and the host computer is correctly setup and connected. The access point is normally operating. DHCP server of the "WebGlider-X" Network manager is running. 3-16 3-8 System Setup Menu 1. Receiving the time data from the DHCP of "WebGlider-X" Network Manager. Press key or key to return to check the current time. When receiving is failed, the screen on the left is displayed.
[Select RETRY], to receive the Time data from the server again. Select [CANCEL], or Press the to Current time. key to cancel setup and return 3-8-3 Resume (resume function) The XIT-100-BW supports a resume function. The resume function can be enabled through the System menu and if selected, the next time the key is pressed on the XIT-100-BW, the resume function will be used. Resume mode ON after the XIT-100-BW is powered OFF, the next time the key is pressed, it will resume operation where it was just before the power was turned OFF. For details of the resume function, please refer to the "1-10 Resume function"(P.1-25). Resume mode ON After the XIT100B is powered OFF, the next time the where it was just before the power was turned OFF. (Power ON, pressing the the scan key to cancel resume mode) key is pressed, it will resume operation key while pressing Resume Fail Resume setup will fail when the power OFF by removing the bat-
tery and without pressing the key. 3-17 Chapter 3 System menu Resume mode OFF After the XIT-100-BW is powered OFF, the next time the pressed, it will begin operation from the start. When the application is setup to " Auto Execute", the assigned appli-
cation will startup. key is In the case where the battery is disconnected while the power is ON, the operation will begin from the start regardless of the resume mode settings. In order to enable the resume function, turn ON/OFF the power by pressing the key. 3-8-4 Password The password to avoid unnecessary running on of the System menu will be setup. By setting a password, the third person other than the system administrator unable to confirm or modify the setup contents. In case a password is setup, the password confirmation will be performed at the time of starting up of the System menu. The System menu will not start up unless the password is entered. However, when the power OFF by pressing the key, with resume function enabled, while System menu is displayed, the password check will not performed when the terminal will restart from the System menu. Be sure to take notes of the encryption number, and keep it so that you may not forget it. In case you forget the number, please contact our sales department. 1. From the System setup, select "4:Password". Select the item to setup. Set Clear 3-18 3-8 System Setup Menu Password setting 1. Input a new password. Password should be alphanumeric characters from 4 to 30, Up-
per-case character/Lower-case character are distinguished. Input a new password, then, press the key. 2. Input the password again. After the password is entered, confirm by pressing the key. Clearing a Password 1. From the confirmation dialog, select[Yes]. The setup password is erased. Select [No], or press the key, and clear to stop. 3-19 Chapter 3 System menu 3-8-5 Auto wake up Auto wake up is a function to start up the terminal automatically according to the preset schedule. By combining Auto wake up and DHCP Execute running on, which allow the application and the master file automatically up-
dated before starting operation. Auto wake up function is enabled only when the terminal is closed by the key. The terminal will not start up, even at the preset Auto wake up time, when after replacing the battery or forced termination due to a low battery. Schedule confirmation 1. From the System setup, select "5:Auto wake up". Currently setup schedule is displayed. Select the item to setup. Set Clear Schedule setting 1. Select Schedule accrual cycle. Selected from among every day (time is specified), every week
(week and time are specified), and every month (date and time are specified). Date is set from "01" to "31", time for 24 hours style. When setting has completed, then return to Schedule confirma-
tion. Press the tion. key to stop setting and return to Schedule confirma-
Input the time in 24 hour-style (00:00 to 2359). Thus complete the setup, and return to Schedule confirmation. 3-20 3-8 System Setup Menu Schedule Clearing 1. From the confirmation dialog, select[Yes]. The setup Schedule is erased. Select [No], or Press the key to stop clearing. 3-8-6 Auto power off Auto power off is a function to make the power OFF automatically when there is no operation performed for a certain period. 1. From the System setup, then select "6:Auto power off". Input the Auto power off time. The time allowed to setup is from 0060 seconds to 3600 seconds. In addition, when set to 0000 seconds, the Auto power off is disabled. Press the key, and, setup value related guidance is displayed. 3-21 Chapter 3 System menu 3-9 WLAN Menu Wireless LAN related setup is performed. 1. From the System menu, select "2:WLAN". Select the item to setup. SSID Roaming level Doze mode Security Advanced MAC address 3-9-1 SSID SSID setup. The characters allowed to enter are single-byte alphanumeric characters whose number should be up to 32, and Upper-case character/Lower-case character is distinguished. When DHCP function is enabled, automatic setup is possible, but this is not recommended as security problems may occur. 1. From the WLAN, select "1:SSID". Input the SSID. SSID should be in alphanumeric character up to 32 charac-
ters, and Upper-case character/Lower-case character distin-
guished. 3-22 3-9 WLAN Menu 3-9-2 Roaming level Roaming means a function, which switches the access point by choosing the access point with stronger radio signal when the terminal moves. The roaming level created as the judgment value to judge whether to perform the switching. When DHCP function is enabled, automatic setting is possible. The roaming is performs only be-
tween the access points with identical SSID. 1. From the WLAN, select "2:Roaming level". Slow Normal Fast roaming is difficult to perform. roaming is easy to perform. 3-9-3 Doze mode The time during which the WLAN switches into Doze mode after transmission finished. The shorter this time is the less consumption of the battery pack becomes, however, the responsiveness of WLAN decreases. When DHCP function is enabled, automatic setting is also possible. The WLAN response time varies according to the beacon cycle and DTIM setting of the access point. For details about the beacon and DTIM, please refer to the access point's Manual. 1. From the WLAN, select "3:Doze mode". Select the item to setup. In the case to have the DHCP function enabled, please refer to the
"WebGlider-X" Manual for details 3-23 Chapter 3 System menu 3-9-4 Security Security related setting of WLAN is performed. 1. From the WLAN menu, select "4:Security". Select the item to setup. Encryption Authentication Attention Encryption 1. Select the item to setup. Method WEP PSK-TKIP Method 1. Select the item to setup. Select the item to setup. In the Authentication Method using "EAP"(P.3-28), communication cannot be performed when "Disabled", "WEP (40bit)" or "WEP
(128bit)" is setup. 3-24 3-9 WLAN Menu WEP(Wired Equivalent Privacy) Since IEEE802.11b is a general wireless standard, it may be easily intercepted by a third person. The danger of data being intercepted between an access point and a terminal (XIT-100-BW) is avoidable by using WEP, which is the standard of encryption of wireless communication. XIT-100-BW is compliant with two kinds of WEP keys (common key), "40 bits (also called 64 bits)"
and "128 bits."
1. Select the item to setup. From the sub menu, select the item to setup. TxKey_ID Select the ID used for transmission from KEY1- KEY4 set in the next paragraph " KEY setup."
This becomes effective if the WEP settings are set to other than "Disabled."
Communication is possible only if the contents of both the WEP key of selected Tx KEY_ID and the access point WEP key are the same, and if the contents of both the Transmit KEY WEP key set on the access point and the terminal's WEP key are the same. For example, when the Tx KEY_ID of a terminal is set to "2," the contents of the terminal WEP key 2 and the contents of the access point WEP key 2 need to be the same. On the other hand, when an access point Transmit key is set to "3," the contents of the access point WEP key 3 and the contents of the terminal WEP key 3 need to be the same. KEY Setup Setting the contents of each WEP key (1, 2, 3, 4). Characters which can be used are "0" - "9", "A" -
"F" and "a" - "f." When a 40 bits is Selected for "WEP," the WEP is a fixed 10 characters. When 128 bits is Selected, it is a fixed 26 characters. The number of characters that are actually input is always 26. Therefore, when 40 bits is Selected, the first 10 characters of the 26 characters are ap-
plied. If a trigger key is pressed, the setup can be done by scanning a barcode. Each WEP key setup can be overwritten but cannot be edited. On entering the KEY setup screen, it displays "00000." for security purposes. 3-25 Chapter 3 System menu PSK-TKIP When PSK-TKIP is selected by encryption method, input the En-
cryption key, and perform the same setup as that of the access point. When setup is performed in ASCII Characters, input the characters from 8 to 63. When the set up is performed by 16-digit number, input up to 64 characters. When using PSK-TKIP, set the Authentication Method (P.3-28) to
"Open". About TKIP function XIT-100-BW stores "PSK-TKIP" as WLAN Security function. PSK-TKIP PSK PSK means Pre-Shared Key. Before the wireless connection is performed between the access point and the terminal the keys of the same encryption key are setup. This key should go under strict management to avoid being known by the third person. In this sense, the key setup in WEP is PSK. TKIP TKIP (Temporal key Integrity Protocol) is a part of the Encryption Standard for IEEE802.11i wireless LAN using an temporary key. This is a strengthened function of WEP by using encryption algorithm RC4. The temporary key is not merely encrypted by RC4, but by performing Key mixed processing in two steps to execute encryption for each packet with different keys. PSK-TKIP In this case, the PSK same as that of the access point is setup to the XIT-100-BW, and TKIP is used as Encryption Method. In PSK-TKIP Method, PSK is not directly made into the en-
cryption key but by using random numbers for each cycles of connection between each access point and the terminal or by using random number periodically thus creating a temporary key. Due to this processing, some seconds delay occurs at wireless connection between the access point compared to "Disabled" or "WEP". TKIP setup Group Key( Broadcast/Multicast Key ) When TKIP is used as the encryption method of XIT-100-BW, the Broadcast /Multicast Packet transmitted from the access point to the entire wireless terminal, encryption is made in the manner of encryption key called Group. According to the Encryption Method of the Group Key setup at the access point (TKIP, WEP128bit, WEP40bit), the Group Key Encryption Method of XIT-100-BW should be setup. (Refer to "TKIP Encryption Method"). TKIP Encryption Method In there are "TKIP",
"TKIP+WEP128bit" and "TKIP+WEP40bit". These setup are confirmed according to what is used as the Group Key. Being depend on the setup of the access point, please confirm the setup in line with the manual for the access point. related Encryption Method of XIT-100-BW, the TKIP 3-26 3-9 WLAN Menu Encryption Method of XIT-100-BW is as follows. TKIP Setup when the Group Key is TKIP. When one SSID setup is made at the access point, most of them are this setup. TKIP+WEP128bit Setup when the Group Key is WEP128bit. Many SSID of the access point are setup, when WEP128bitis setup as the Group Key, the terminal is setup same as this setup (This is used when you want to mix it at the same access point same terminal running by WEP128bit). TKIP+WEP40bit Setup when the Group Key is WEP40bit. When many SSID of the access point's setup, and WEP40bit is setup as a Group Key, the terminal is setup in this style (This is used if you want to use this in the terminal of the same access point running at WEP40bit). Authentication Select the item to setup. 3-27 Chapter 3 System menu Method Open frame request from a
"Open Authentication" system. If an authentication terminal
(XIT-100-BW) is received, an access point will reply with an authentication response frame, which will permit data commu-
nications. When WEP is valid, authentication is possible but data com-
munications cannot be performed if both WEP keys do not match. Shared
"Shared Key Authentication" system. If a terminal performs an authentication request, an access point will transmit a non-encrypted identity request authentica-
tion text character string (hereinafter called as "challenge code"). Then, the terminal replies a challenge code encrypted using the WEP key. The access point decrypts the challenge code via the WEP key and checks to see if it is the same as the transmitted challenge code and if the same, permits authentica-
tion. EAP
"EAP"(IEEE802.1X) Authentication system. If this authentication method is used, Certificate, Private key, user information setting etc. is needed. There is a limitation also in the environment (Certification Authority (CA), authen-
tication (RADIUS) server etc.) that can be used. Therefore, when using the "EAP" authentication method, please contact our sales department. If the challenge code before and after encryption is intercepted by a third person, the WEP key is easily determined. The "Shared Key Authentication" system thus creates a security weak point and should not be used whenever possible. Some access points do not disclose their authentication type. In this case, please try "Open Authentication," and if connection is impos-
sible, try "Shared Key Authentication."
EAP setup When using the EAP (IEEE802.1X) authentication, the required items are set. After setup, perform the "wireless/ping test" (P.3-84), and confirm that the communication by EAP authentication is enabled. Select the item to setup. 3-28 3-9 WLAN Menu 1. Select the mode. EAP-TLS Server certificate for server authentication, and client certifi-
cate for client authentication are the necessary authentication method. The necessary items for setting is as follows. CA root certificate Client certificate Private key User name EAP-PEAP-MSCHAPv2 Server certificate for server authentication, while user name, password for client authentication are the necessary authenti-
cation Method. The necessary items for setting is as follows. CA root Certificate User name Password 2. Certificate file is setup. Each certificate file is received via FTP (P.3-36) or Bluetooth (P.3-61). CA root certificate(file) The CA root certificate issued by the server certificate agency required for server authentication. This does not support the layered chain of certificate. Press the key to clear. Client certificate(file) Client certificate is necessary for client authentication. Press the key to clear. Select from received files.
(Press the key to refer the file Properties.) Press the key to clear the setup contents. 3-29 Chapter 3 System menu 3. Private key setting. Private key(file) is received via FTP (P.3-36), or Bluetooth (P.3-61). File Private key is in contrast to the client Open key included in the client certificate. This private key is very important for security reason. Encryption should be made on the private key file, and manage so that the password is not known to the third person. Password Single-byte alphanumeric characters from 0 to 31 characters Upper-case character/Lower-case characters distinguished for setup. For security purpose, the input password after entered is converted and displayed as the hidden character (*). Select from the received files.
(Press the key to refer the file properties.) Press the key to clear the setup contents. 4. Set up user information. User Name User name is used for authentication. From 62 single-byte alphanumeric characters, it is set by dis-
tinguishing Upper-case character/Lower-case character. Password Password is used for authentication From 0 to 31 single-byte alphanumeric characters, it is set by distinguishing Upper-case character/Lower-case character. For security purpose, the entered password is displayed being con-
verted as a hidden character" *". 3-30 3-9 WLAN Menu 5. Setup the detail. This setup usually is not modified. At starting up authentication Time out When WLAN start up, it waits the authentication to complete up to the second setup here. possible setup value :15 to 120 seconds Attention The default is set to "Display". In the case when the terminal is started up without WLAN security setting, "WLAN Security setting" attention screen is displayed. By setting this attention to OFF, this message is not displayed at starting up even when WLAN security setting is disabled. It is not recommended to set this Attention to setting to OFF, for security reason. Be sure to perform security setting when using WLAN communication. 3-9-5 Advanced WLAN communication Advanced setting 1. From the WLAN, select "5Advanced". Select the item to set. 3-31 Chapter 3 System menu Rate control Setup the transmission rate. When DHCP function (P.3-34) is used, the automatic setup is enabled. Select any from the following. In addition, in the far distance, the high-speed communication cannot be performed, if the transmission rate fixed with 5.5Mbps or more, the possible transmission area of the terminal becomes narrow. Auto Automatically modified to a proper transmission speed according to the distance between the terminal and the access point. 1Mbps Transmission speed is 1Mbps fixed. 2Mbps Transmission speed is 2Mbps fixed. 1or2M Transmission speed is automatically changed only at 1Mbps or 2Mbps. 5.5M Transmission speed is 5.5Mbps fixed. 11M Transmission speed is 11Mbps fixed. RTS Threshold This determines whether an RTS packet is transmitted before transmission of a data packet. When the size of a data packet is larger than the set value, an RTS packet is transmitted, and RTS-CTS control is performed. When a large number of terminals are connected to the same access point, or terminals cannot detect each other because they are dispersed remotely even if detection of an access point is possible, RTS-CTS control becomes effective. Although RTS-CTS control is effective in this case, the throughput reduces. Usually set it to the default value (2347 bytes). Setting range0 to 2347 bytes 3-9-6 MAC address MAC address (hardware unique address) is displayed. MAC address cannot be changed. 1. From the WLAN, select "6MAC address". 3-32
1 2 | User Manual 2 of 2 | Users Manual | 3.21 MiB |
3-10 Network Menu
Network related setting such as TCP/IP. 1. From the System menu, select "3:Network". Select the item to setup.
Set an IP address and other details for TCP/IP communications. Automatic setup is possible when the DHCP function is enabled. 1. From the Network, select "1:TCP/IP". Current setting contents are displayed. Select the item to setup. 2. Input the address. Input the number from 000 to 255 to the field segmented by the period (example192.168.254.254).
* The Display is an example of "IP address". "NetMask" and
"Gateway" is operated in the same way. 3-33 Chapter 3 System menu
Set the IP address assigned by the network administrator. Set a unique IP address to each of the XIT-100-BW terminals connected to the same network.
Set the subnet mask assigned by the network administrator. Since a subnet mask specifies which network you belong to, it should set up along with the IP address.
Set the address of the default gateway. Setup is required when connecting to a different network through a router.
The maximum length of IP packet. 1500 octets (bytes) is common for Ethernet. In such cases as being used over the routers, this value should be modified according to the communication me-
dia. Please ask the network administrator about the value settings for different items.
Set the DHCP client function that is used for automatic setup of TCP/IP and various set items. 1. From the Network menu, select "2:DHCP."
Select the item to setup.
3-34 3-10 Network Menu
1. Select the item to setup.
DHCP is not executed when the terminal started up.
is file selected application DHCP is executed before the application is executed. The
<System menu>[1:System], and then[2:Auto execute], DHCP function is executed before application , after the terminal started up. In addition, when the application is started up from <File menu>, DHCP is not executed.
from DHCP is executed before System menu is started up. The Sys-
tem menu is selected from <System menu>[1:System], and then[1:Auto execute], DHCP function is executed before Sys-
tem menu is started up , after the terminal started up.
Following information unique to the terminal is setup so as not to be modified, before executing DHCP function.
DHCP server port is setup (Factory setup08067). If you do not execute the automatic setup, which is unique to the XIT-100-BW, and want to use exist-
ing server only to perform the assigning of IP address, the value is modified (the well known port is 67).
Press the key, and, DHCP is executed immediately, regardless of "Startup type"(P.3-35). 3-35 Chapter 3 System menu
Set up for using the FTP client function, as described below. Automatic setup is possible when the DHCP func-
tion is enabled. 1. From the Network, select "3:FTP". Select the item to setup.
Set up the host name for FTP server. 1. Select from either IP, or, URL.
The IP address setup at 2:IP" is set as FTP server.
The host specified at "3: host name" is set as FTP server. The host name can not contain the space character.
3-36 3-10 Network Menu
Specify the FTP server login user name using up to 18 alphanumeric characters, and up-
per-case/lower-case should be distinguished. 1. Input the User name. User name should not include the space.
Specify the FTP server login password using up to 20 alphanumeric characters, and up-
per-case/lower-case should be distinguished. 1. Input the Password. The Password is converted to a hidden character (*) and is displayed for security purpose. Password should not include the space.
3-37 Chapter 3 System menu
Specify FTP server control port number. The well-known port is 21.
The default is Passive mode. If the FTP server does not support Passive mode, change it to the Active mode.
/(root) In some FTP server, the User name folder is specified as root folder.
/(user name) The folder in the root folder with the same as the user name of the FTP server is specified as the current folder. If FTP function (file transmission or reception) is executed without setting the user name, the error screen appears.
/(Specified) The relative path setup at the "specified folder" which is to be explained later becomes the cur-
rent folder.
When selected "/(Specified)" in the folder above, the character string setup here are added to the FTP method "CWD". As the setup character string communicates directly by FTP communica-
tion, please setup the corresponding character string to the server.
(Example) "dir1/dir2/dir3"
The specified folder cannot include the space. 3-38 3-10 Network Menu
Set the DNS server address, as described below. Automatic setup is possible when the DHCP function (P.3-34) is enabled. 1. From the Network, select "4:DNS". 2. Select the item to setup.
Set the IP address for the Primary server.
Set the IP address for the Secondary server.
Specify the control port number for the DNS server. The well-known port is 53.
Setup range is from 1 to 99 seconds. Set the response packet waiting time.
When 0 is set, only one packet is transmitted without RETRY.
Setup range is from 0 to 9999 min. When 0 is setup, the cache function is disabled. The MAX value allowed to enter to the cache table is 8. When the entered number is over the MAX value, a new entry will be performed after discarding the old entry. 3-39 Chapter 3 System menu
Make the various SNMP settings. Automatic setup is possible when the DHCP function (P.3-34) is enabled. 1. From the Network, select "5SNMP". Select the item to setup.
1. Input the community name and the manager IP address.
The operations permitted for a community name are read only. GET and GET-NEXT requests are supported under a community name. When a SET request is sent using a community name, an authen-
tication trap is transmitted. A community name can be specified using a maximum of 16 alphanumeric characters.
Set the SNMP manager's IP address, which permits the use of the community name set under the
"Community name" option. If "000.000.000.000" is set as the IP address, this community name is permitted on all the SNMP managers. 3-40
3-10 Network Menu 1. Input the community name and the manager IP address.
The operations permitted for the community name are "Read-Write". GET, GET-NEXT and SET request are supported under a community name. The community name can be specified using a maximum of 16 alphanumeric characters.
Set the SNMP manager's IP address, which permits The use of the community name set under the
[community name]option. If "000.000.000.000" is set as the SNMP manager's IP address, this com-
munity name is permitted on all the SNMP managers.
1. Input a community name and a manager IP address.
Set a community name for the Trap. A community name can be specified using a maximum of 16 alphanu-
meric characters.
Set the SNMP manager's IP address to which the Trap should be transmitted. Trap is not transmitted if the IP address of "000.000.000.000" has been set. 3-41 Chapter 3 System menu
Set the action of authentication trap to either "send" or "don't send" when access is recognized except from the community name and SNMP manager's IP address set in "1: Community (R/Only)" and "2:
Community (R/W)." This Trap is sent to the SNMP manager, which is set in "2:Target address."
The port number to communicate with SNMP manager. The well-known port is 161.
The port number to transmit the Trap. The well-known port is 162.
The number of times Trap transmission retrial.
XIT-100-BW can be managed by using Our "WebGlider-X"(WBG-001W).
SNMP-PDU(Protocol Data Unit) conforms to SNMPv1.
XIT-100-BWsupports the management of the objects in the following MIB group.
[1.3.6.1.2.1.1]
[1.3.6.1.2.1.2]
[1.3.6.1.2.1.4]
[1.3.6.1.2.1.5]
[1.3.6.1.2.1.6]
[1.3.6.1.2.1.7]
[1.3.6.1.2.1.11]
[1.3.6.1.4.1.12392] Welcat Enterprise MIB MIB2-System MIB2-Interfaces MIB2-IP MIB2-ICMP MIB2-TCP MIB2-UDP MIB2-SNMP Welcat Enterprise MIB is described by ASN.1 format. Welcat Enterprise MIB is included in the optional "WebGlider-X". (About details, please con-
tact our sales department.) 3-42 3-10 Network Menu
Cold Start Warm Start Link up Link down Authentication Cold Start Transmitted after MIB is initialized and the communications starts. MIB is initialized when the XIT-100-BW has been turned ON us-
ing the PW key. Note that MIB is not initialized when the XIT-100-BW has been turned ON in the resume mode. Warm Start Transmitted when communication starts except Cold Start.*1 Link up Transmitted when XIT-100-BW synchronizes with an access point. However, a Link Up is not transmitted when the XIT-100-BW synchronizes with an access point for the first time (When a Cold Start or a Warm Start is transmitted). When the XIT-100-BW newly enters a ser-
vice area of an access point and synchronizes, or when it synchronizes with a new access point while roaming, a Link Up is transmitted (in the same timing as signal SIGRFU_INSYNC). Link down Transmitted when the communication ends. However, it is not transmitted when the XIT-100-BW is outside the service area of an access point. Transmitted when a third person tries to access the XIT-100-BW with an invalid community. This authentication trap is sent to the IP address set through the System menu "Trap Manager IP address" (P.3-41). However, this is transmitted only when the value "send" is set through the System menu "Illegal access Trap" (P.3-42).
*1 MIB is not initialized even if the " XIT-100-BW " setup corresponding to MIB (IP address, subnet mask, default gateway, etc.) has been changed. In this case, a Warm Start is transmitted instead of a Cold Start. When initializing MIB, restart the terminal. 3-43 Chapter 3 System menu
Receiving files via WLAN, or Bluetooth. The XIT-100-BW can receive files transmitted from a host computer via WLAN, or Bluetooth. Before receiving a file, please check the following. The received files are all created in the F drive.
The communication setting (IP address, SSID, WEP etc.) between the XIT-100-BW and the Access point are correctly set up.
The power of the access point and host computer is ON.
The access point and host computer is correctly setup or connected.
The access point is normally operating.
FTP server is running on the host computer.
FTP setup (host name, user name etc.) of XIT-100-BW is correctly setup.
The power of the host computer is ON.
The "BluePorter(WLF-001:optional)" on the host computer is started up.
The default device of XIT-100-BW is setup on the host computer at the receiving side. (only in the case selected from the file list)
Wait only is enabled.
The default device of XIT-100-BW is setup on the XIT-100-BW at the receiving side. 1. From the System menu, select "4:Receive". Select the device to use.
3-44 3-11 Receiving Menu 2. Selecting receiving method. Select "1: Select from list " to obtain the file list from the transmis-
sion side. The receiver side can select the file to receive from the list. Select "2:Wait(PC)" or "3:Wait(XIT), then get into receiving wait-
ing status immediately. If it is the transmission from the host com-
puter from XIT, Select
"3:Wait(XIT)". The receiving file depends on the transmission side. select "2:Wait(PC)", when is it
3. Acquire the file list, and select receiving file. Apply checks to the check box of the receiving file. Press the key, and Receiving Confirmation dialog is displayed. In this case, if there is no file that the check is applied, Selected file is received. Select from[Yes][No]. In addition, Press the key, and [No] is selected. Press the key, and Sub menu to operate the file lists displayed.
Selected file name is displayed.
Apply checks to all the check boxes of the file list.
Remove checks from all the check boxes of the file list. 4. Receiving start. Receiving status is displayed. When there is a same file name as that of receiving file, overwriting confirmation dialog is displayed. Select[Yes]or [No]. In addition, press the key, and [No] is selected. 3-45 Chapter 3 System menu 5. Receiving is completed. When many files are checked,"(the number of success/ the number of checked)" is displayed in the Message box. Press the key, or key. 3-46 3-12 File Menu
By searching the targeted file, varieties of operations such as transmission and Deletion are performed. Select the file for operation from the classified file list in each drive. The files are recognized by the extensions (3 characters following after the period of the file name), and classi-
fied as below.
OUT Application WAV, MP3, SFL Audio BMP Others Bitmap Data Operation is that can be executed are as follows. There are operations that are related to some specific files and the operation enabled in all files.
Execute*1 Play*1*3 Viewer*2 Properties Upload Delete Test Starting up the application. Only the application files can be operated. Play audio file. Only audio files can be operated. Bitmap images displayed. Only bitmap files can be operated. Various kind of properties related to the file are displayed. Uploading a file. Deleting a file. Check if a file is broken or not. All checks applied. Apply checks on all check boxes in the file list. All checks removed Remove all checks of the check box in the list.
*1 The file in the S drive Operation is disabled.
*2 Supported Bitmap file is as follows. Format Size Windows Bitmap monochrome image 132128 pixel fixed
*3 Supported audio file is as follows. Extension Format WAV Windows Standard WAVE Format Audio sampling rate 8000/11025/16000/22050/44100/48000[Hz]
Channels Monaural Audio samples size Audio style Extension Format 16bit PCM MP3 MPEG-1 Audio Layer-3 Audio sampling rate 44100/48000[Hz]
3-47 Chapter 3 System menu Bit rate Channels Extension Format MAX items Explanation 32/40/48/56/64/80/96/112/128/160/192/224/256/320(kbps) Monaural/Stereo SFL Audio file list (text style) 32 By using SFL file, many audios and files can be played continuously. In the file list, the file name is cited by line feeding to the MAX 32 items. The cited audio file should be stored in the terminal beforehand. The file names written in the file list are all played only once. When an Error occurred during playing, the audio file play will stop and will not play any more. It is impossible to cite other SFL file inside the SFL file. Description example ALARM_MELODY.WAV(Changing line) LOCATION_3F_2.WAV(Changing line) SHIP_ERROR.WAV 1. From the System menu, select "5:file ". Select the kind of the file for Operation. Select "All types ", regard-
less of the kind of the file all files stored in the drives targeted. 2. Selecting a drive. F Drive becomes the current drive. When there is no file stored in the F Drive, S Drive will be the cur-
rent drive. Each time by pressing the key, the current drive changes. 3-48 3-12 File Menu 3. File operation. File alone check box operation (apply checks /remove checks) is per-
formed by the key. For other operation, press the the Operation. key, From the Sub menu, Select
1. From the Sub menu, select "Execute".
When an SFL file application to be executed is not registered in the Automatic Launch, register confirmation dialog is displayed. In addition, Press the key, and [No] is selected. After selecting, execute the program. To end the application, perform the operation specified for each application. After termination, whether the System menu is displayed again or, the power of the ter-
minal turns off is depends on the application. When the battery lost its power, the alarm appears and the power of the terminal turns OFF. If you want to stop the application by force, press the key continuously for 10 seconds while it is running. 3-49 Chapter 3 System menu
1. From the sub menu, select "Play".
Press the key to stop and playing.
1. From the Sub menu, select "Viewer".
Press any key to return to the previous operation.
1. From the Sub menu, select "Properties".
Following properties are displayed.
File name
File type
File size
Last modified
Library version(application only) Press any key, to return to the previous operation.
3-50 3-12 File Menu
When uploading, please check the following beforehand.
The communication setting (IP address, SSID, WEP etc.) between the XIT-100-BW and the Access point are correctly set up.
The power of the access point and host computer is ON.
The access point and host computer is correctly setup or connected.
The access point is normally operating.
FTP server is running on the host computer.
FTP setup (host name, user name etc.) of XIT-100-BW is correctly setup.
The power of the host computer is ON.
The "BluePorter(WLF-001:optional)" on the host computer is started up.
The default device of XIT-100-BW is setup on the host computer at the receiving side.
The default device of XIT-100-BW is setup on the XIT-100-BW at the receiving side. 1. From the sub menu, select "Upload". Upload the file with whose check box is checked. However, when there is no file whose check box is checked, Selected file is uploaded. 2. Select the device to use. 3-51 Chapter 3 System menu 3. Upload start. Upload status is displayed. 4. Upload is completed. When many files are checked, (the number of upload success / the number of checked items)" is displayed in the "Message box". Press the key, or key.
1. From the sub menu, select "Delete". Delete the file whose check box is checked. However, if there is no checked file, Selected file is deleted. Confirmation dialog is displayed. Select[Yes]or [No]. In addition, Press the key, and [No] is selected. 3-52
3-12 File Menu Test the file whose check box is checked. However, if there is no checked file, Selected file is tested. When the tested file is broken, file delete confirmation dialog is dis-
played. Select[Yes][No]. In addition, press the key, and [No] is selected. When[Yes]is selected, the file is deleted immediately. When [No] is selected, nothing will be performed. After the Select, restart the next file testing.
1. From the Sub menu, select "All checks applied". Check all the check boxes. 3-53 Chapter 3 System menu
Remove the check from all the check boxes. 3-54 3-13 ID Menu
Setup the ID number for identification. Setup the unique number for each terminal. When DHCP function is en-
abled automatic setup is also possible. 1. From the System menu, select "6:ID". Input the terminal ID. The number of ID allowed to set is from 000 to 999. 3-55 Chapter 3 System menu
Setup the hardware device such as Barcode and key. The Device Menu is further classified for each devices. 1. From the System menu, select "7:device". Select the item to setup.
1. From the Device Menu, select "1:Barcode". Select the item to setup.
3-56 3-14 Device Menu
This mode is used to setup the operational condition of the laser scanner on the System menu or the XIT-100-BW browser. This setup is only enabled with the application using "Trigger mode" for barcode scanning. WebGlider-X browser is one of the applications using trigger mode. 1. Select the item to setup. Select the item to setup.
Setup the operation of the scan key and the irradiation pattern of the laser. A barcode can be scanned when the irradiation of the laser is turned ON 1. From the sub menu, select the item.
Press the scan key, and the laser irradiates.
Press the scan key, and the laser blinks. Press again, the laser irra-
diates.
Press the scan key, and the laser blinks , release the scan key, the laser irradiates.
Regardless of scan key operation, the laser irradiates automati-
cally. 3-57 Chapter 3 System menu
Setup for saving the power consumption when scanning. 1. From the sub menu, select the item.
When a Barcode is scanned the laser stops automatically and the power supply to the scanner part stops as well. The consumed power gets small, but it takes time to start the next scanning.
When a Barcode is scanned the laser stops automatically but the power supply to the scanner part continues as well. The consumed power is large compared to the Full, but it can perform the next scanning smoothly.
Power saving mode is not used.
Setup the time to turn OFF the laser automatically. 1. Input the time. The time allowed to setup is from 00 to 60 seconds. In addition, when 00 second is setup, the laser keeps irradiating without stop. 3-58 3-14 Device Menu
Setup the permissible range of the Barcode scanning. When the Decode level is set to "strict", the barcode label checked strictly. For this reason the label of poor quality get difficult to scan, but the possibility of miss scanning be-
comes low. On the other hand, when the Decode level is set to "loose", the barcode label of comparatively poor quality can be scanned, but the possibility of miss scanning becomes high. Be sure to check the digit number, data etc in the check digit of the software when the "loose" is set. 1. Decode level Adjustment. The level can be adjusted to 3 stages, "Strict", " Normal", and Loose". The relationship between level value and easiness for scan-
ning is as follows. The scan level and miss scanning level are proportionate.
Strict Normal Loose Strict (difficult to miss scan)
Loose (easy to miss scan) Press the played. key, and the guidance for setup value is dis-
When the level is going to setup to "loose", the guidance for attention displayed. Se-
lect[Yes][No].In addition, press the key, to select [No]. about miss scanning is 3-59 Chapter 3 System menu
Setup the irradiation angle of the laser. 1. Select from either Wide or Narrow.
The irradiation angle of the laser widens.
The irradiation angle of the laser becomes narrow.
Scan setup of White/ black Reversed Barcode 1. Select from either Prohibition, or, Permission.
Normally, the barcode with black bar and white space only scanned.
The barcode with reversed white and black of bar and space only scanned . 3-60 3-14 Device Menu
Press and hold the direction (
to
) key, the direction key is allowed to enter itself repeatedly. The time (Key repeat delay): From the time when the press and hold started until it get into the first repeated entering, and the time (Key repeat rate): until the entering repeated.
(example) repeat delay:1 second, repeat rate:500milli seconds 1. From the Device menu, select "2: key". Current setup contents are displayed. Setup allowed time is from 0100 to 1000milli seconds. In addition, when 0000milli seconds setup repeated entering is pro-
hibited. Press the key, and, the guidance is for setup value is displayed.
1. From the Device menu, select "3:Bluetooth". Select the item to setup.
3-61 Chapter 3 System menu
Local device setup. 1. Select the item to setup.
As "BD Address" is fixed, setup contents cannot be changed.
The setup contents in each item are not saves as it is. In order to save the setup contents, press the key, and select
[Yes] in the Save confirmation dialog. key or In addition, Press the key, and [No] is selected.
1. Input the name of the Bluetooth device. For device name, the alphanumeric characters MAX 30 characters, and the Upper-case character/Lower-case character is distinguished. 3-62 3-14 Device Menu
Perform the authentication related setup when connecting. 1. Operate the check box to enable the authentication. When a check box is checked, the authentication is performed in case the local device received connect request from a Remote device. Only the Remote device with enabled authentication will be permit-
ted to connect. PIN (Personal Identification Number) code is a password used for authentication. For this code, 16 digit characters (0 to 9, A to F) and MAX 16 digits can be entered. As a security measure, entered PIN code is displayed being converted into a hidden character (*). 2. PIN code setup
1. Check the firmware version of the built in Bluetooth device. Press the key, to return to the previous operation. 3-63 Chapter 3 System menu
Remote device setup. 1. Select the item to setup.
Remote device properties to connect can be registered MAX 7 items. Once registered beforehand, you don't have to set the device properties for each connection. 1. Select the item number to register Select the item number, setup the device properties in order. When device properties have already registered, the device name is displayed to the right of the item number. When the device is not registered, [(No Device)] is displayed to the right of the item number.
(Recognized as registered when the device name is of 1 character more, and the BD address is other than "00:00:00:00:00:00"). The device whose item number is displayed with to its left is a default device. In the System menu when connecting via Bluetooth, default device is connected to. Press the key, and sub menu is displayed.
Selected device to register is setup as a default device.
Erase the registered device properties. 3-64 3-14 Device Menu 2. Select the item to setup.
The operation procedure of device name for security is same as that of the local device. Press the key to search the Remote device. To setup the de-
tected Remote devices the registered device is also possible.
1. Input the BD Address. BD address is a device unique hardware address. It is the fixed length of 16 digit character (0 to 9, A to F) 12 dig-
its.
Searches the Remote device. To setup the detected Remote device as the registered device is also pos-
sible.
1. Search start. Press the key, and search to stop. 3-65 Chapter 3 System menu 2. The search result list is displayed. The device name list of the detected remote device is displayed.
Press the BD address are displayed. key, and Selected Remote device's device name and Press the key, to return to the previous operation. 3. Select detected remote device. Press the address are displayed. key, and Selected Remote device's device name, BD Press the key to return to the previous operation. 4. Select the registered number of the registered device. When the already registered number is selected, overwriting confir-
mation dialog is displayed. Select [Yes][No]. In addition, press the key, and [No] is selected. 3-66 3-14 Device Menu
Set the upper limit of the number of Remote devices detected by device search. 1. Input the number of devices for search. The number of devices allowed to setup is from 1 to 9. The more the number of devices for search is the longer the search time becomes. 3-67 Chapter 3 System menu
1. From the Device, select "4:Display". Select the item to setup.
1. Display Contrast Adjustment. The contrast of the display can be adjusted from 1 to 8. Press the key for Up, key for Down, then the slider moves. The contrast changes in real time in line with the slider's upward and downward movement, the status of the contrast level can be checked immediately. The relationship between level value and contrast is as follows.
8 1
High (thick) Low (thin)
1. Operate the check box to set high luminosity. When check is applied the luminosity when the backlight ON becomes high luminosity. However, in that case check the consumed power becomes large com-
pared to the status when the check is removed (standard luminosity). When starts the setup the backlight turns ON automatically, the lu-
minosity changes in real time according to the status of the check. However, when the battery level is less than the regulated value, the backlight will not turn ON. 3-68 3-14 Device Menu
Setup the device such as Sound, LED and Vibrator to alert the worker's attention. 1. From the Device, select "5:Tone/Vibrator". Select the item to setup.
1. Adjust Speaker volume. It is adjustable from 1 to 8. move the slider. key for Up, key for Down to As the sound volume changes in real time in line with the Up and Down movement of the slider, the status of the level value can be checked immediately. The relationship between the level value and sound volume is as fol-
lows.
8 1 Max Min Set to 1, if no sound is desired.
Indicator means the combination of four devices (buzzer/audio /vibrator/LED) that is used to alert the worker's attention. By using this indicator allows the worker to know the current status more intuitively. What indicator is used in what situation is set up by the application. In addition, in the System menu, the "pattern 3" indicator for each case will be applied. For example,
When confirmed, one high tone sounds somewhat short and the LED green turns ON.
When an error occurred, vibrating the Vibrator, beep a low-pitch sound three times and turn ON the green LED. And so on, the terminal allows the user varieties of setting according to the user's working environment. 3-69 Chapter 3 System menu There are 5 scenes that represent working such as pressing the key (click) and confirming etc. And one user's scene, these 6scenes are provided with three patterns respectively. 1. Select the indicator to set. The icon to show the setup status of the indicator is displayed in right of the lower part on the display.
Buzzer is setup.
Audio is setup.
Vibrator is setup.
LED is setup. Press the key, and sub menu is displayed.
Current indicator can be experienced.
Select pattern setup contents are discarded to return to the ini-
tial value.
Discarding all setup patterns of all scenes and return to the ini-
tial value. After selecting device, setup the operational condition of the device in order. 2. Select the device to setup. 3-70 3-14 Device Menu
In the operation condition, there are two kinds, one is common to all devices and the other is unique to the device. 1. Enable check box operation (common to all devices). The switch to turn ON/OFF the operation of the device. When checked, the device operates, and when the check is removed the device does not operate unconditional to other setups. This setup is displayed as an icon. Press the key, and sub menu is displayed.
Current indicator can be experienced
Discarding setup contents of the pattern and return to the initial value. In addition, when the Menu is displayed in the left of the lower part of the display, the operation procedure is common to all the op-
erational condition of devices. 2. Input the frequency (buzzer only) Setting range is from 0000 to 9999Hz. The contents of the function key guidance displayed in the left of the lower part of the display changes during the frequency is entered. Press the played. key, and sub menu of the frequency samples are dis-
Fine-tuning the value based on the samples facilitates the setup. 3-71 Chapter 3 System menu 3. Selecting a file name (audio only). Select the audio file from the file list. Press the played. key, and properties related to the selected file is dis-
Select the "built in audio ". The audio file list that is stored before-
hand in the system area of the terminal is displayed.
4. Color Select (LED only). From sub menu, select the item. 5. Input the ON time (buzzer/Vibrator/LED). Operation time of the device for one performance. Setting range I from 00000 to 99999milli seconds. If 00000milli second is setup the device keeps operating. 6. Input the OFF time (buzzer/Vibrator/LED). OFF time of the device for one performance. The setup range is from00000 to 99999milli seconds. If 00000milli second is setup the operation stops after the period specified by ON time (milli seconds). 3-72 3-14 Device Menu 7. Input the number of times to repeat (Common to all devices). The number of times to repeat the operation on and off. The setup range is from 00 to 99. If 00 is set, it repeats until the device is operated.
Setup whether to play the sound or not when the key at the terminal is pressed. The sound can be se-
lected from "Single Beep sound" and "Numeric read out audio ". Click sound is played immediately when the key is pressed. When a sound played by application or indicator, the latter sound interrupt the previous sound. According to the timing, the interruption makes the sound somewhat mixed. 1. Select the sound pattern played when the key is pressed.
Key Click sound is not played.
For all keys the beep sound is played when any key is pressed.
When numeric keys are pressed the numeric is called out in audio (in Japanese). When other key is pressed Beep sound is played.
Only when the numeric keys are pressed numeric is called out in audio. When other keys are pressed, no sound is played. 3-73 Chapter 3 System menu
Checking the standard properties of XIT-100-BW and improvement and maintenance of the performance. 1. Select the item to setup. Select the item to setup.
Check the Battery level of the battery pack. Just look at the Battery level as a reminder. 1. From the Management select "1:Battery level". Battery level is displayed in 6 stages. 3-74 3-15 Manage Menu
The handy terminal system program (OS) version is displayed. 1. From the Management, select "2:System versions". OS version is displayed.
Initializing the Registry and the drive. When the initialization is performed, the setup contents will return to the Factory setup and all files will be de-
leted. When you perform the initialization take deepest cares with this understanding. 1. From the Management, select "3:initialize". Check the item that you want to initialize. If no item is checked, initialization cannot be executed. Press the key, and execute confirmation dialog is displayed. Select [Yes] or [No]. In addition, press the lected. key, and [No] is se-
3-75 Chapter 3 System menu Press the key, and sub menu is displayed.
Apply checks to all check boxes.
Remove all checks from the check boxes. 2. Initialization start. The checked items are initialized in order. 3. Initialization is completed. Press the key, or key. When the Registry is initialized, turn off the power.
3-76
Copying the contents on the Registry and F drive of the other XIT-100-BW, duplication is created. 3-15 Manage Menu 1. From the Management, select "4:Clone". In the case of to copy XIT-100-BW, select "1:Master ". In the case of to be duplicated on XIT-100-BW, select "2:Copy".
3-77 Chapter 3 System menu
Setup the "Copy XIT-100-BW" on the default device of the Master beforehand 1. Select the item to clone. After confirming that the Copy terminal is in the condition to be able to "Clone", press the key to start Clone. Press the key, and sub menu is displayed.
Apply checks to all check boxes.
Remove all checks from check boxes. 2. Clone is completed. Press the key or key. 3-78 3-15 Manage Menu
1. Initializing itself. Execute confirmation dialog is displayed. Select from either [Yes] or
[No]. In addition, press the key, and [No] is selected. 2. It is in the state the Clone is enabled. Press the key or key to start Clone. 3. Confirm master display. At the Copy terminal side, it cannot confirm that the Clone has com-
pleted, be sure to confirm that the transfer has completed on the dis-
play at the Master file. If the transfer from the Master file has not completes, execute the Clone again. Press the key or key. 4. Turn OFF the power. Press the key or key. 3-79 Chapter 3 System menu
Confirmation of various properties and maintenance for the drive is performed. 1. From the Management, select "5:Drive". Selecting a drive. 2. The properties of the drive are displayed. Following properties is displayed.
F drive can be optimized by performing defrag. Press the key, and a dialog is displayed.
The unnecessary area generated in the process of writing and/or deleting files is physically deleted.
In addition to normal execute, rearranging the acquired free area to a continuous area. It takes some seconds to some 10 seconds to complete Deep Execute depending on the status of the drive. Usually, Normal Execute is recommended.
3-80 3-15 Manage Menu
Setup to suppress the consumption of the battery when the XIT-100-BW is not used for a long period. 1. From the Management, select "6:Mothball". Execute confirmation dialog is displayed. Select [Yes] or [No]. Then, press the key, and [No] is selected. 2. Preparation for prolonged storage is complete. Press the key or key. Turn OFF the Power.
The wizard executed at the initial boot of the terminal can be called back again. In order to perform communica-
tion between the terminal and the server, the minimum necessary setting is enabled. 1. From the Management, select "7:Wizard". Select [Yes] or [No]. Select [Yes], then perform the setup of WLAN and perform the TCP/IP setup to execute the wizard. Select [No] to return to the pre-
vious screen. See"3-6-4 Executing Setup Wizard"(P.3-10), for details. 3-81 Chapter 3 System menu
Hardware device test. 1. From the System menu, elect "9:Test". Select the item to setup.
2. Select target device.
Test for Wireless Communications and the test for IP Network communication. 1. From the test, select "1:WLAN". 3-82 3-16 Test Menu
Setup the execute condition of the ping command. Wireless test is performed by ping. 1. Select "1:Configuration".
Specifies the IP address of the targeted device to confirm the communication.
Select the size of the data packet (in bytes) to be transmitted. permissible value 32, 64, 128, 256, 512, 1024, 1472
Time out time is setup by 1 seconds unit. permissible value 1 to 255 seconds
Set the number of attempts that can be made at transmitting the ping. Setup enabled value :1 to 255 times When 0 is specified, transmission of the ping command will continue until the key is pressed. 3-83 Chapter 3 System menu
WLAN test is performed by executing the ping command. The ping packet is continuously transmitted to the Host IP address setup at "Configuration". Displayed contents are the result of ping command, the MAC address of the synchronized access point, communication quality (LinkQ), the received ra-
dio signal strength(ASL), applied channels and the transmission speed. 1. Select "2:WLAN/ping test".
<1st line> The title of this test.
<2nd line> Host IP address to be communication tested
<4th line> The result is displayed. When succeeded Result time is displayed. (Unit: msec) Time out When interrupted by the
"ping Timeout" is displayed.
"stopped" is displayed. key
<5th line > Transmitted packet number(counted up one by one) and packet size.
<6th line> LinkQ indicator is displayed. LinkQ (means the communication quality to the access point) is displayed.
<7th line> Synchronized channel and the transmission speed are dis-
played.
<8th line> ASL indicator ASL (means the strength of the radio signal received from the access point) is displayed.
<10th line> MAC address of the access point while wireless commu-
nications is displayed.
3-84 3-16 Test Menu
To search the access point matches the SSID setup on the terminal. When the SSID of the terminal is setup to "ANY", it is possible to search all the access points around there.
Displayed contents as a result of searching are MAC address, channel, SSID. 1. Select "3:AP Search". 2. The result of searching is displayed after several seconds to some ten seconds.
<1st line>
The title of the test result.
<3rd line or after> The MAC address of the detected access point and the channel number.
<10th line>
The key guidance that displays SSID. 3. Press the key, and the SSID set up at the selected access point is displayed. 3-85 Chapter 3 System menu 4. Select an access point, the confirmation screen is displayed to set the SSID setup on the access point to the terminal. Confirmation screen is displayed to allow the SSID setup on the access point to the terminal.
By using other terminal and Bluetooth, one to one communication is performed. 1. From the Test, select "2:Bluetooth". Select the connecting method with Bluetooth device. Master has the leadership on connection, and the Slave obey the Master's direction. The connection only performed between Master and Slave. In addition, Master and Slave are only temporary relationship on the connecting stage. After the connection the relationship between the Master and Slave will be dissolved.
2. Communication test start. Press the key, upload the corresponding key data and display on the screen (local echo) at the same time. When the data is received, it appears highlighted on the display. 3-86 3-16 Test Menu
Barcode scanning test perform. In addition, this barcode scanning test is not subject to trigger mode. 1. From the test menu, select "3:Barcode". Barcode is scanned in a normal scanning mode. The scanned Barcode, the kind of Barcode, and the digit number are displayed. Press and hold the scan key for 1 second to get into the continual scan mode. While the scan key is pressed, the laser irradiates, and continues scanning the barcodes. Release the scan key to return to the ordinary scan mode. In addition to the scanned Barcode, the kind of Barcode, and the digit number, scan success rate is also displayed. Press the key to convert the character code to display.
displayed in ASCII Character code.
displayed in hexadecimal number. For example 16 digit con-
verted from "5"to"35", "m" to "6D", 1 character is displayed as 16 digit positive 2 characters. Each time by pressing the key, the display switches. 3-87 Chapter 3 System menu
Press the key to allow setting varieties of barcode options. In addition, this setup only enabled during the barcode testing.
Setup whether to check the check digit.
The check of check digit is disabled.
The check of check digit is enabled.
Setup the scanning condition of add-on code of JAN/EAN/UPC.
Add-on code scanning disabled.
Both can be scanned unconditional whether add-on code is added.
JAN/EAN/UPC with add-on code only can be scanned.
Setup the scanning condition of RSS Stacked.
RSS stacked scanning is disabled.
Scanning RSS Stacked is enabled. 3-88 3-16 Test Menu
Display test. 1. From the Test, select "4:Display". Test the function of LCD. When test starts the backlight turns ON automatically. However, when the Battery level is low it does not turn ON. Each time by pressing the key except for the play contents switches like slides. key, 4 kinds of dis-
1. 12 dot font-various double width character
2. 16 dot font-various double width character
3. The display is highlighted from four corners to the center(the key does not work until the Display is Highlighted entirely)
4. Welcat logo When all the display ends, the backlight turns OFF to return to the previous operation. 3-89 Chapter 3 System menu
The key input test are performed with the indicator(buzzer/vibrator/LED/audio play) tests. Press the key, and display the icon on the partition of the center got Highlighted (
key only reversed), and the icon corresponds to the key appears under the partition line (local eco). And the indicator corresponding to each key operates. The indicator assigned to each key is as follows.
to
, Scan key (
, F9, F10)
Green (SCAN) Red (ALRAM)
Orange (SCAN)
Red (SCAN) Sound Red (SCAN) Voice (Japanese) Red (SCAN) Voice (Japanese) Red (SCAN) Voice (Japanese) Red (SCAN) Voice (Japanese) Red (SCAN) Voice (Japanese) Red (SCAN) Voice (Japanese) Red (SCAN) Voice (Japanese) The test will end when either the key is pressed twice, or all keys are pressed. Such operations as power off by tests have finished. key or backlight adjustment by key are enabled until all 3-90
Chapter4 FAQ
FAQ (Frequently Asked Questions) This chapter lists frequently asked questions, problems and operations that need to be performed to solve prob-
lems, and reference pages for items in this manual.
Please start the system menu using the following Method. 1. Remove the battery pack 2. Wait 10 seconds. Install the battery pack 3. Hold down the scan key then press the key.
4-2 4-1 FAQ
From the System menu, select "1System setup", and then select "1:Auto execute" to set the System menu for automatic launch.
From the System Menu, select "1:System", then "1:Auto execute " to set the desired application for automatic launch. ----(P.3-15)
From the System Menu"5File", select "2Application " then select "Execute" from "Sub Menu" to run.----(P.3-49)
Some application settings prohibit a specific kind of Barcode from being scanned.
If the filter of the Barcode sensor is dirty, the Barcode may not be scanned correctly. Please wipe the filter with a dry soft cloth.
If the barcode quality is bad, it may not scanned correctly, change the setting of the decode level and scan again.
From the System Menu, select "8:Manage" , then Select "5drive" to check the drive----(P.3-80) 4-3 Chapter4 FAQ
If the LAN cable has fallen out or a link is not established, some access points do not perform wireless communications.
Please set the access point SSID and terminal SSID the same. When the terminal SSID is set to "ANY" (blank), it may be unable to connect because of the access point functions. Refer to the access point manual for more information.
Please set the access point Authentication System and terminal Authentication System settings the same. If in "SHARED" mode, please check the WEP settings.
XIT-100-BW's Preamble only support "Long" mode, please change the Preamble settings to
"Long" mode.
Are the WEP keys the same? ("Null," "40bits," "128bits") Do the WEP's Tx KEY_ID and the WEP key match? (P.3-25)
In the case where a non-interfering channel is set, a maximum of 4 access points can be used in the one area.
Please check whether there is no equipment, such as a microwave oven or other WLANs etc, which can cause interference. Also, since a computer may act as a noise generation source, move the access point and termi-
nal away from the computer (1m or more).
Check it to see if the terminal can connect to the computer by using the ping command etc. 4-4 4-1 FAQ
Does the Power turn ON?
Is the connecting enabled?
Connect the PC and XIT-100-BW (P.1-9)
Communication between the XIT-100-BW terminals (P.3-4446)
Bluetooth Clone (P.3-77)
Bluetooth Test (P.3-86)
You can use WLAN and Bluetooth at the same time, however the communication may be delayed due to mutual interference between wirelesses.
Create some free space on the F Drive and S Drive by deleting some files then start again.
When applications other than the communication software are being used, the computer may run out of resources and cause the file transmission and reception to fail. Close as many appli-
cations not needed for communication as possible, and then try again. 4-5 Chapter4 FAQ
Automatic setup of a terminal can be performed by using the DHCP server function of the "
WebGlider-X "
When the voltage level of the battery pack is low, the XIT-100-BW is unable to handle some func-
tions. Is the battery pack charged? ----(P.3-74)
Either delete the file, or transmit the file to the host computer to recover the data. ----(P.3-503-53)
This is displayed when a system program is not able to specify the cause of an error. Possible causes include failures in hardware, system program or application, external factors like strong static elec-
key tricity, and user errors. If a system error message is displayed, the power will be shut off if is pressed. At the next startup, XIT-100-BW tries to restore as much as possible. Please turn ON the power again. 4-6
Appendix A System menu Factory Settings
Auto execute System menu or application Enable, Disable System menu Disable Resume Password Auto wake up Auto power off SSID Roaming level Doze mode Encryption Method Alphanumeric characters from 4 to 30, Up-
per-case character/Lower-case character are dis-
tinguished. Specify any among Month, Week, and Day 0000, or 0060 to 3600(seconds) 0600 (seconds) Alphanumeric characters up to 32, Upper-case character/Lower-case character are distinguished. XIT Slow, Normal, Fast Quick, 1 second, None Disabled, WEP(40Bit), WEP(128Bit), TKIP, TKIP+WEP128bit, TKIP+WEP40bit Normal 1 second Disabled WEP Tx keyID KEY-1, KEY-2, KEY-3, KEY-4 KEY-1 WEP key setting PSK-TKIP Setting the contents of each WEP key (1, 2, 3, 4). Characters which can be used are "0" - "9", "A" -
"F" and "a" - "f." When a 40 bits is Selected for
"WEP," the WEP is a fixed 10 characters. When 128 bits is selected, it is a fixed 26 characters. In ASCII characters, input the characters from 8 to 63. By 16 digit number, input up to 64 charac-
ters. Authentication Method Open, Shared, EAP Open EAP mode EAP-TLS, EAP-PEAP-MSCHAPv2 EAP-TLS CA root Certificate Client Certificate Private key (File) Private key (Password) Select a file Select a file Select a file Alphanumeric characters up to 31, Upper-case character/Lower-case character are distinguished. WLAN authentication user name Alphanumeric characters up to 62, Upper-case character/Lower-case character are distinguished. WLAN authentication Pass-
word Alphanumeric characters up to 31, Upper-case character/Lower-case character are distinguished. At starting up authentication Time out 15 to 120 60 seconds Attention Rate control Display, Not Display Display Auto, 1Mbps, 2Mbps, 1Mbps or 2Mbps, 5.5Mbps, 11Mbps Auto RTS_Threshold 0000 to 2347 2347(bytes) A-2 Appendix. A-1 System menu Factory Settings
IP address NetMask Gateway MTU Any value of IP address style Any value of IP address style Any value of IP address style 0064 to 1500 000.000.000.000 000.000.000.000 000.000.000.000 1500(octets) DHCP Startup type Disabled, Application boot, System menu boot Disabled DHCP Update protect IP address, NetMask, Gateway, ID (The plural can be selected) Not selected DHCP Server port 00001 to 65534 FTP Server address Method Address, Name 08067 Address FTP Address FTP Name FTP User name FTP Password Any value of IP address style 000.000.000.000 Alphanumeric and symbol characters up to 62, Upper-case character/Lower-case character are distinguished. Alphanumeric and symbol characters up to 18, Upper-case character/Lower-case character are distinguished. Alphanumeric and symbol characters up to 20, Upper-case character/Lower-case character are distinguished. FTP Server port FTP Mode 00001 to 65534 Passive, Active FTP Current folder
/(Root), /(User name), /(Specified) FTP Specified folder Alphanumeric characters up to 62, Upper-case
/Lower-case distinguished DNS Primary DNS Secondary Any value of IP address style Any value of IP address style DNS Server port 00001 to 65534 DNS Time out time DNS Trial count 01 to 99 0 to 9 Cache time 0000 to 9999 00021 Passive
/(Root) 000.000.000.000 000.000.000.000 00053 03(seconds) 1 0003(min) SNMP Community(R/Only) Community name Alphanumeric characters up to 16, Upper-case
/Lower-case distinguished public SNMP Community(R/Only) Manager IP address Any value of IP address style 000.000.000.000 SNMP Community(R/W) Com-
munity name Alphanumeric characters up to 16, Upper-case
/Lower-case distinguished private SNMP Community(R/W) Man-
ager IP address Any value of IP address style 000.000.000.000 SNMP Trap Community name Alphanumeric characters up to 16, Upper-case Welcat
/Lower-case distinguished SNMP Trap Manager IP ad-
dress Any value of IP address style 000.000.000.000 A-3 Appendix A System menu Factory Settings
SNMP Authentication Trap Send, Not send SNMP Agent port 00001 to 65534 SNMP Trapport 00001 to 65534 ID 000 to 999 Barcode Trigger operation Normal, Double, Release, Auto Barcode Power saving Full, Quick, None Barcode Irradiation time 00 to 60 Barcode Decode level Loose, Normal, Strict Key repeat delay 0000 or, from 0100 to 1000 Key repeat rate 0000 or, from 0100 to 1000 Not send 00161 00162 000 Normal Full 20 (seconds) Normal 0500(milliseconds) 0100(milliseconds) Bluetooth local device Device name Alphanumeric and symbol characters up to 30, Upper-case /Lower-case distinguished XIT-100 Bluetooth local device Pairing Enable, Disable Disable Bluetooth local device PIN code 16 digit characters (0 to 9, A to F) up to 16 Bluetooth Remote device 1 to 7 device name Alphanumeric and symbol characters up to 30, Upper-case /Lower-case distinguished No name Bluetooth Remote device 1 to 7 BD address 16 digit characters (0 to 9, A to F) up to 12 00:00:00:00:00:00 Bluetooth Remote device 1 to 7 Pairing Enable, Disable Bluetooth Remote device 1 to 7 PIN code 16 digit characters (0 to 9, A to F) up to 16 Bluetooth Remote device sear-
choption 1 to 9 Display contrast Level 1 to 8 Backlight Luminosity High, Low Volume Click Sound Level 1 to 8 None, Beep, Beep + Audio, Audio Disable 9 Level 4 High Level 8 None A-4
Appendix. B Sample Barcode
(notes) It is not likely to be able to read because of low printing quality (Expansion, Reduction, Dirt, etc.). B-2 Appendix. B-1 Sample Barcode
(notes) It is not likely to be able to read because of low printing quality (Expansion, Reduction, Dirt, etc.). B-3 Appendix. B Sample Barcode
(notes) It is not likely to be able to read because of low printing quality (Expansion, Reduction, Dirt, etc.). B-4 Appendix. B-1 Sample Barcode
(notes) It is not likely to be able to read because of low printing quality (Expansion, Reduction, Dirt, etc.). B-5 Appendix. B Sample Barcode
(notes) It is not likely to be able to read because of low printing quality (Expansion, Reduction, Dirt, etc.). B-6
Index
Access point ................................................. xiv, 1-7 Access point search........................................... 3-85 Active mode ...................................................... 3-38 Ad-hoc mode....................................................... 1-7 Advanced (FTP)................................................ 3-37 Advanced (SNMP)............................................ 3-42 Advanced(WLAN Security).............................. 3-31 Advanced(WLAN)............................................ 3-31 ALARM LED ..................................................... 1-2 AP search .......................................................... 3-85 Application program ........................................... 2-2 At starting up authentication Time out (Factory settings).......................................................... A-2 Attention ........................................................... 3-31 Attention (Factory settings) ............................... A-2 Authentication Method ..................................... 3-28 Authentication Method (Factory settings).......... A-2 Auto execute ..................................................... 3-15 Auto execute (Factory settings) ......................... A-2 Auto power off .................................................. 3-21 Auto power off (Factory settings) ...................... A-2 Auto wake up .................................................... 3-20 Schedule clear ............................................. 3-21 Schedule confirmation................................. 3-20 Schedule setting........................................... 3-20 Auto wake up (Factory settings) ........................ A-2 Auto-power-off function ..................................... 4-2
Back space key.................................................... 1-3 Backlight Luminosity........................................ 3-68 Backlight Luminosity (Factory settings)............ A-4 Backup battery .................................. xiv, 1-20, 1-21 Barcode ............................................................. 3-56 Barcode Decode level (Factory settings) ........... A-4 Barcode Irradiation time (Factory settings) ....... A-4 Barcode Power saving (Factory settings)........... A-4 Barcode Trigger operation (Factory settings)..... A-4 Barcode window ................................................. 1-2 Battery Alert........................................................ 3-8 Battery cover ....................................................... 1-3 Battery cover lock lever ...................................... 1-3 Battery for Backup ............................................ 1-23 Battery level ...............................................3-8, 3-74 Battery pack ......................... xiv, 1-3, 1-4, 1-16, 4-2 charging ....................................................... 1-18 Installing...................................................... 1-21 Removing .................................................... 1-20 Replacing..................................................... 1-21 Worn out ...................................................... 1-21 BluePorter .................................................... xiv, 1-5 I-2 Bluetooth local device Device name (Factory settings).......................................................... A-4 Bluetooth local device Pairing (Factory settings)
....................................................................... A-4 Bluetooth local device PIN code (Factory settings)
....................................................................... A-4 Bluetooth Remote device 1 to 7 BD address
(Factory settings) ........................................... A-4 Bluetooth Remote device 1 to 7 device name
(Factory settings) ........................................... A-4 Bluetooth Remote device 1 to 7 Pairing (Factory settings).......................................................... A-4 Bluetooth Remote device 1 to 7 PIN code (Factory settings).......................................................... A-4 Bluetooth Remote device searchoption (Factory settings).......................................................... A-4 Broken file ........................................................ 3-53
CA root certificate............................................. 3-29 CA root Certificate (Factory settings) ................ A-2 Cache time (Factory settings) ............................ A-3 Cancellation key ................................................. 1-2 Certificate file ................................................... 3-29 Charger.............................................................. 1-16 Charging.....................................................1-16, 4-2 Battery pack ................................................ 1-17 Charging Error .................................................. 1-18 Charging jack ...................................................... 1-3 Charging specification ...................................... 1-16 Click Sound (Factory settings)........................... A-4 Client Certificate............................................... 3-29 Client Certificate (Factory settings) ................... A-2 Clock................................................................. 3-16 current time ................................................. 3-16 Manual setting ............................................. 3-16 Server setting............................................... 3-16 Clone................................................................. 3-77 CODE128(Code set A) (Sample Barcode)......... B-5 CODE128(Code set B) (Sample Barcode)......... B-5 CODE128(Code set C) (Sample Barcode)......... B-5 CODE39 (C/D) (Sample Barcode) .................... B-2 CODE39 (No C/D) (Sample Barcode)............... B-3 Common key..................................................... 3-25 Community(R/Only) ......................................... 3-40 Community(R/W) ............................................. 3-41 Contrast............................................................. 3-68 Current time ...................................................... 3-16
Data communication Method Bluetooth communications............................ 1-9 WLAN communications................................ 1-8 Data communication/preparation of Bluetooth communication ............................. 1-8 WLAN communication ................................. 1-7 Data storage ...............................................1-22, 2-2 Dead Zone......................................................... 1-14 Decode level...................................................... 3-59 Dedicated charger ............................................. 1-16 Default device ..................................................... xiv Default gateway .............................................. Device Registry................................................... 3-2 DHCP................................................................ 3-34 DHCP client function ........................................ 3-34 DHCP Execute .................................................. 3-35 DHCP Request .................................................... 3-9 DHCP Server port (Factory settings) ................. A-3 DHCP Startup type (Factory settings)................ A-3 DHCP Update protect (Factory settings)............ A-3 Direction key..................................................... 3-61 Display contrast (Factory settings)..................... A-4 Display of ALARM LED (during wireless communications)........................................... 1-12 Display of SCAN LED (during terminal charging)
...................................................................... 1-12 DNS .................................................................. 3-39 DNS Primary (Factory settings)......................... A-3 DNS Secondary (Factory settings)..................... A-3 DNS Server port (Factory settings).................... A-3 DNS Time out time (Factory settings) ............... A-3 DNS Trial count (Factory settings) .................... A-3 Doze mode ........................................................ 3-23 Doze mode (Factory settings) ............................ A-2 Drive ................................................................. 3-80
EAN128(Code set A) (Sample Barcode) ........... B-6 EAN128(Code set B) (Sample Barcode) ........... B-6 EAN128(Code set C) (Sample Barcode) ........... B-6 EAP mode (Factory settings) ............................. A-2 EAP setting ....................................................... 3-28 EAP-PEAP-MSCHAPv2 .................................. 3-29 EAP-TLS .......................................................... 3-29 Electrodes /cleaning .......................................... 1-21 Encryption......................................................... 3-24 Encryption Method ........................................... 3-24 Encryption Method (Factory settings)................ A-2 Enter key ............................................................. 1-2 Extension ...................................................2-3, 3-47 Index F9 key ................................................................. 1-2 File name ............................................................ 2-3 File receiving .................................................... 3-44 Folder ................................................................ 3-38 FTP ................................................................... 3-36 FTP Address (Factory settings) .......................... A-3 FTP Current folder (Factory settings) ................ A-3 FTP Mode (Factory settings) ............................. A-3 FTP Name (Factory settings) ............................. A-3 FTP Password (Factory settings) ....................... A-3 FTP Server address Method (Factory settings) .. A-3 FTP Server port (Factory settings) ..................... A-3 FTP Specified folder (Factory settings) ............. A-3 FTP User name (Factory settings)...................... A-3 Function keys...................................................... 1-2
Gateway .......................................................... Gateway (Factory settings) ................................ A-3
Hand strap ........................................................... 1-3 Handy5250...................................................1-5, 2-2 Hardware device ............................................... 3-56 Hardware device testing.................................... 3-82 HBC-51...................................................... xiv, 1-20 Host name ......................................................... 3-36
ID ...................................................................... 3-55 ID (Factory settings) .......................................... A-4 Inclination of a Barcode.................................... 1-14 Indicator ............................................................ 3-69 Indicator function.............................................. 3-69 Infrastructure mode............................................. 1-7 Initialize ............................................................ 3-75 IP address ........................................................ IP address (Factory settings) .............................. A-3 ITF (C/D) (Sample Barcode) ............................. B-4 ITF (No C/D) (Sample Barcode) ....................... B-4 ITF(Add on version ITF-6) (Sample Barcode) .. B-5 ITF(Extended ITF-16) (Sample Barcode).......... B-4 ITF(Standard ITF-14) (Sample Barcode)........... B-4
JAN13 (Sample Barcode) .................................. B-2 JAN8 (Sample Barcode) .................................... B-2
F drive ................................................. xiv, 1-22, 2-2 F10 key ............................................................... 1-2 Key...................................................................... 3-3 Key Character assigns......................................... 3-4 Key Click Sound ............................................... 3-73 Key repeat delay (Factory settings) ................... A-4 I-3 Index Key repeat rate (Factory settings) ...................... A-4 KEY setting.....................................................
Laser light irradiation angle .............................. 1-13 LCD .................................................................... 1-2 Local device ............................................... xiv, 3-62 Luminosity ........................................................ 3-68
MAC address .................................................... 3-32 Manual setting(Clock)....................................... 3-16 Margin............................................................... 1-15 Memory Back Up Backup battery............................................. 1-23 Battery pack................................................. 1-22 MTU................................................................ MTU (Factory settings)...................................... A-3 Multi Charger...........................................1-16, 1-18
NetMask.......................................................... NetMask (Factory settings) ................................ A-3 Network setting ................................................. 3-33 NW-7 (C/D) (Sample Barcode).......................... B-3 NW-7 (HEX) (Sample Barcode) ........................ B-3 NW-7 (No C/D) (Sample Barcode).................... B-3
Open authentication .......................................... 3-28 OS version......................................................... 3-75
Passive mode..................................................... 3-38 Password ........................................................... 3-18 Clear ............................................................ 3-19 Setting ......................................................... 3-19 Password (Factory settings) ............................... A-2 Password (FTP)................................................. 3-37 Pitch .................................................................. 1-14 Power Switch ...................................................... 1-2 Private key ........................................................ 3-30 Private key (File) (Factory settings)................... A-2 Private key (Password) (Factory settings).......... A-2 Product plate ....................................................... 1-3 Product specifications ....................................... 1-10 Prolonged storage.............................................. 3-81 Battery ......................................................... 1-24 Terminal ...................................................... 1-24 PSK-TKIP ......................................................... 3-26 PSK-TKIP (Factory settings) ............................. A-2 I-4 QC-001 ............................................................. 1-16 QC-002 .................................................... 1-16, 1-18
Rate control....................................................... 3-32 Rate control (Factory settings)........................... A-2 Readable angle .................................................. 1-14 Receive Method ................................................ 3-45 Receiving .......................................................... 3-44 Registry............................................................... 3-2 Remote device............................................ xiv, 3-64 Resume ............................................................. 3-17 Disabled....................................................... 3-18 Enabled........................................................ 3-17 Fail .............................................................. 3-17 Resume (Factory settings).................................. A-2 Resume function ............................................... 1-25 Reverse Barcode ............................................... 3-60 Roaming level ................................................... 3-23 Roaming level (Factory settings) ....................... A-2 RTS Threshold .................................................. 3-32 RTS Threshold (Factory settings) ...................... A-2
S drive................................................. xiv, 1-22, 2-2 Scan depth......................................................... 1-13 Scan key....................................................... xiv, 1-2 SCAN LED .......................................1-2, 1-12, 1-16 Scanning angle.................................................. 3-60 Scanning Specifications .................................... 1-13 Screen ........................................................3-68, 4-2 Screen output characters double-byte characters................................. 1-26 single-byte characters .................................. 1-27 Security (WLAN) ............................................. 3-24 Security Registry................................................. 3-2 Serial number seal............................................... 1-3 Server address ................................................... 3-36 Server port (DHCP) .......................................... 3-35 Server port (FTP) .............................................. 3-38 Server setting(Clock) ........................................ 3-16 Setting Wizard................................................... 3-10 Shared key authentication ................................. 3-28 Shift key.............................................................. 1-3 Single Charger .................................................. 1-16 Skew ................................................................. 1-14 SNMP ...................................................... 3-40, 3-42 SNMP Agent port (Factory settings).................. A-4 SNMP Authentication Trap (Factory settings) ... A-4 SNMP Community(R/Only) Community name
(Factory settings) ........................................... A-3 SNMP Community(R/Only) Manager IP address
(Factory settings) ........................................... A-3 SNMP Community(R/W) Community name
(Factory settings) ........................................... A-3 SNMP Community(R/W) Manager IP address
(Factory settings) ........................................... A-3 SNMP Trap Community name (Factory settings)
....................................................................... A-3 SNMP Trap Manager IP address (Factory settings)
....................................................................... A-3 SNMP Trapport (Factory settings) ..................... A-4 Software .............................................................. 2-2 Sound .......................................................3-56, 3-69 Sound volume ................................................... 3-69 Speaker................................................................ 1-3 Specular reflection ............................................ 1-14 SSID.................................................................. 3-22 SSID (Factory settings) ...................................... A-2 Startup type ....................................................... 3-35 Subnet mask .................................................... Supported audio file .......................................... 3-47 Supported bitmap file........................................ 3-47 System menu .......................... xiv, 2-2, 2-4, 3-2, 4-3 Standard Operation........................................ 3-5 Startup ........................................................... 3-9 System menu factory settings............................. A-2 System menu List.............................................. 3-13 System program ........................................... xiv, 2-2 System Registry .................................................. 3-2 System version .................................................. 3-75
TCP/IP .............................................................. 3-33 Temporary file..................................................... 2-3 Terminal .............................................................. xiv Test (Barcode) ................................................... 3-87 Test (Bluetooth)................................................. 3-86 Test (Display).................................................... 3-89 Test (Indicator).................................................. 3-90 Test (Key).......................................................... 3-90 Test (WLAN) .................................................... 3-82 Tilt..................................................................... 1-15 Trap ................................................................... 3-43 Trap setup.......................................................... 3-41 Trigger mode..................................................... 3-57 Index TxKey_ID .......................................................
Unfilled space ................................................... 1-15 Unique Registry .................................................. 3-2 UPC-E (Sample Barcode) .................................. B-2 Update protect................................................... 3-35 User name ......................................................... 3-37 User Registry ...................................................... 3-2
Vibrator ............................................................. 3-69 Volume .............................................................. 3-69 Volume (Factory settings) .................................. A-4
WebGlider-X......................................... xiv, 1-5, 2-2 WebGlider-X browser ......................................... xiv Welcat Enterprise MIB...................................... 3-42 Well known port (DHCP) ................................. 3-35 Well known port(FTP) ...................................... 3-38 WEP.................................................................. 3-25 WEP key ........................................................... 3-25 WEP key setting (Factory settings).................... A-2 WEP Tx keyID (Factory settings) ...................... A-2 Wireless function ................................................ 1-6 Wireless LAN ................................................... 3-22 Wizard...................................................... 3-10, 3-81 WLAN ................................................ xiv, 1-7, 3-22 WLAN authentication Password (Factory settings)
....................................................................... A-2 WLAN authentication user name (Factory settings)
....................................................................... A-2 WLAN/ping testing........................................... 3-84
XIT-100-BW's Software ..................................... 2-2 I-5
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2005-12-20 | 2402 ~ 2480 | DSS - Part 15 Spread Spectrum Transmitter | Original Equipment |
2 | 2412 ~ 2462 | DTS - Digital Transmission System |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2005-12-20
|
||||
1 2 | Applicant's complete, legal business name |
Welcat, Inc.
|
||||
1 2 | FCC Registration Number (FRN) |
0009204363
|
||||
1 2 | Physical Address |
5F Miyako Gotanda Bldg. West Wing
|
||||
1 2 |
Tokyo, N/A 141-0032
|
|||||
1 2 |
Japan
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
w******@us.ul.com
|
||||
1 2 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 2 | Grantee Code |
Q98
|
||||
1 2 | Equipment Product Code |
XIT100BW
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
M******** Y********
|
||||
1 2 | Title |
R&D Dept. Chief Clerk
|
||||
1 2 | Telephone Number |
81-3-********
|
||||
1 2 | Fax Number |
81-3-********
|
||||
1 2 |
m******@welcat.co.jp
|
|||||
app s | Technical Contact | |||||
1 2 | Firm Name |
UL Apex Co., Ltd.
|
||||
1 2 | Name |
N**** S****
|
||||
1 2 | Physical Address |
4383-326 Asama-cho
|
||||
1 2 |
Mie-ken, 516-0021
|
|||||
1 2 |
Japan
|
|||||
1 2 | Telephone Number |
81-59********
|
||||
1 2 | Fax Number |
81-59********
|
||||
1 2 |
n******@jp.ul.com
|
|||||
app s | Non Technical Contact | |||||
1 2 | Firm Name |
UL Apex Co., Ltd.
|
||||
1 2 | Name |
K******** K********
|
||||
1 2 | Physical Address |
4383-326 Asama-cho
|
||||
1 2 |
Mie-ken, 516-0021
|
|||||
1 2 |
Japan
|
|||||
1 2 | Telephone Number |
81-59********
|
||||
1 2 | Fax Number |
81-59********
|
||||
1 2 |
k******@jp.ul.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DSS - Part 15 Spread Spectrum Transmitter | ||||
1 2 | DTS - Digital Transmission System | |||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Barcode Reader with 802.11b&Bluetooth Transmitters | ||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Original Equipment | ||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Power output listed is conducted. The antennas shown in this filing must not be co-located or operated in conjunction with any other antenna or transmitter. Users are to refer to product manual for RF exposure information. Maximum measured SAR value: 0.610 W/kg (body) | ||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
UL Japan, Inc
|
||||
1 2 | Name |
M****** F****
|
||||
1 2 | Telephone Number |
81-59********
|
||||
1 2 | Fax Number |
81-59********
|
||||
1 2 |
m******@jp.ul.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2402.00000000 | 2480.00000000 | 0.0012000 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | 2412.00000000 | 2462.00000000 | 0.1260000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC