DT-X10 Series Software Manual
Transcription
DT-X10 Series Software Manual
DT-X10 Series Software Manual (Version 1.08) CASIO Computer Co., Ltd. Copyright ©2005. All rights reserved. September 2005 Table of Contents Chapter 1 1.1 1.2 1.3 Chapter 2 2.1 2.2 2.3 2.3.1 2.3.2 2.3.3 2.4 2.4.1 2.4.2 2.5 2.5.1 Chapter 3 3.1 3.2 3.3 3.4 Chapter 4 4.1 4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 4.1.6 4.1.7 4.1.8 4.2 4.2.1 4.2.2 4.2.3 4.2.4 4.3 4.3.1 4.4 4.4.1 4.4.2 Chapter 5 5.1 Editorial Record Overview Product Development Concept Target Markets And Their Applications Features Applications Operation Images System Configurations By Application Operation By User Basic Operations Operation With Multiple Options Intended Application By Device Installation Phases Initial Installation Upgrading The System Application Software Development Development In Microsoft Environment Features Available Models And Options Basic Specifications Software Configuration External View Functions Basic Functions Microsoft WindowsCE 4.1 .NET Version 4.0 Display Functions Key Functions Touchpanel Functions Sound Functions Memory Management Functions (RAM/RFA/FROM) LED Functions C-MOS Imager Functions Communication Functions Basic Specifications IrDA Communication Bluetooth Communication USB Communication PC Card Basic Specifications Power Control Power Management Functions Charge/Power Supply Functions Application Programs/Tools Microsoft Application Programs 2 4 5 5 6 7 8 8 10 11 11 12 14 17 17 21 22 22 25 27 28 30 32 33 33 33 33 36 42 43 45 46 47 52 52 53 54 55 56 56 59 59 64 65 65 5.2 5.2.1 5.2.2 5.2.3 5.2.4 5.2.5 5.2.6 5.2.7 5.2.8 5.2.9 5.2.10 5.2.11 5.3 5.3.1 5.3.2 5.3.3 5.3.4 5.3.5 Chapter 6 6.1 6.2 Chapter 7 7.1 7.2 Chapter 8 8.1 8.2 8.3 8.4 Casio Original Application Programs (1) Card Backup Utility Automatic Recovery Tool FLCE Contrast/Backlight Utility Automatic Setup Copy To Another Terminal User Notification Message List Welcome Wizard Diagnosis Browser Mailer Casio Original Application Programs (2) FCHKCE Wireless LAN Bluetooth Setup Tool LMWIN (Host Utility) C-MOS Imager Applications Security Security Setup Copy Protect For Distributor’s Software Development Environment Development Environment With Microsoft Tools Local Fonts Precautions On Using C-MOS Imager Imaging Performance By Camera’s Optical Operability Imaging Performance By Print Quality Imaging Performance By Settings Troubleshooting 68 71 74 80 94 95 96 98 98 98 99 100 102 102 107 108 117 118 137 137 137 138 138 140 143 144 147 151 154 No part of this document may be produced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of CASIO Computer Co., Ltd. in Tokyo Japan. Information in this document is subject to change without advance notice. CASIO Computer Co., Ltd. makes no representations or warranties with respect to the contents or use of this manual and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. CASIO is registered trademark of CASIO Computer Co., Ltd. in Japan. Other product names mentioned in this reference manual may be trademarks or registered trademarks of their respective companies. © 2005 CASIO Computer Co., Ltd. All rights reserved. 3 Editorial Record Manual Version no. 1.00 1.01 1.02 1.03 1.04 1.05 1.06 1.07 1.08 Date edited April 2003 May 2003 July 2003 August 2003 August 2003 October 2003 October 2003 November 2003 September 2005 Page 111 all 115 34 all Content Original version Chapter 8 is added. Chapter 5.3.2 “Automatic Recovery Tool” is newly added. Table 4.3 on page 35 is revised. Description about Windows NT 4.0 is added “RF wireless” is changed to “Wireless LAN”. Chapter 7.2 “Local Fonts” is newly added. Fig. 4.1 is corrected. Chapter 5.3.5 “C-MOS Imager Applications” is added. The description about the new models of DT-X10M30RC2 and DT-X10M30URC2 is added. 4 1. Overview This reference manual describes a product overview of the DT-X10 series handheld terminals. 1.1 Product Development Concept CASIO has extended its product line-up by adding this high-performance handheld terminal, which is compatible with various communication systems and has a built-in C-MOS Imager. • • • Acquire new users and fulfill replacement demands from the transport industry. With the DT-X10 series being the successor to the DT-800 series, fulfill replacement demand for inventory search/ordering terminals and factory automation terminals that use wireless communication. Develop new market that may emerge as a result of incorporating the C-MOS Imager. The following models of the series are available to meet various needs in the world’s transport industry. Table 1.1 Model DT-X10M30U DT-X10M30URC DT-X10M30URC2 DT-X10M30E DT-X10M30RC DT-X10M30RC2 Note: *ETSI *FCC **ETSI **FCC Wireless LAN IEEE802.11b No * FCC ** FCC No * ETSI ** ETSI PCMCIA C-MOS Imager Bluetooth Yes No No Yes No No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes : Wireless LAN (IEEE802.11b) module, no. WCF201BERWP100, produced by INTEL Corporation which is compliant with the ETSI standard is integrated. : Wireless LAN (IEEE802.11b) module, no. WCF2011BEWWP100, produced by INTEL Corporation which is compliant with the FCC standard is integrated. : Wireless LAN (IEEE802.11b) module, no. 6180120, produced by Toyota Industries Corporation which is compliant with the ETSI standard is integrated. : Wireless LAN (IEEE802.11b) module, no. 6180110, produced by Toyota Industries Corporation which is complaint with the FCC standard is integrated. 5 1.2 Target Markets And Their Applications This DT-X10 series has the following three strategic positions in its field: • High-performance model identified as being in the data collection category, that is compatible with various communication systems, and that incorporates a C-MOS Imager. • Derivative model of the data collection category resulting from the change in market needs. • Successor model to maintain and support DT-800 users (resources). Table 1.2 Target Market Transport and Distribution • Assembling/Delivery • Sorting • Process control/Warehouse control Applications • Covers 2D symbologies, for which it will soon be essential to take the size and increased amount of information into account. Real-time data transmission/reception (WWLAN, Wireless LAN) between each local operation and the center. Uses the touch panel in the confirmation operation to enter signature. • • Compatibility with DT-800 series There is a difference between the DT-800 series and the DT-X10 series application development environments, as shown below. The compatibility of source file and application file are not available. Table 1.3 Development Environment Development tool OS CPU RAM Disk DT-800 Series DT-X10 Series SH series CPU compiler MS-DOS Ver. 3.3 80386SX 640 KB (main) + 3MB (protect) 3 MB 6 Visual Studio .NET 2003 Embedded Visual C++ 4.0 + SP1 Windows 2000 (Service Pack 2),WindowsXP Professional Pentium II 266 MHz or faster 128 MB or more 1.7 GB or more 1.3 Features Incorporates .NET technology • • • Uses WindowsCE .NET 4.1 Operating System. Makes effective use of .NET resources developed by other corporations. Employment of Embedded OS makes it possible to build a flexible WindowsCE system. Enhanced communicating functions • • • • • Covers GPRS/Wireless LAN, etc. by using various communication cards. Built in Bluetooth Ver 1.1 module. The target transfer rate of the wireless LAN is 5 Mbps, which is the maximum rate of communication for peer-to-peer connection with PC. The following protocol stacks are available for Bluetooth interface: GAP (Generic Access), SDP (Service Discovery), SPS (Serial Port), Dialup Network, File Transfer. Security function (WEP 128 bits) Superb scanning capability • • • • With the installed C-MOS Imager it is possible to read 2D symbologies/1D symbologies and OCR fonts. Image capturing function (2 to 256 monochromatic tones). 1D symbology scanning performance is comparable to the DT800. Multi-step symbol read function. Support of outstanding development environment Ample Microsoft development tools provided for easy application development and an advanced debug environment. High expandability The standard PCMCIA slot makes it possible to use various standard peripheral cards. Aiming to a full compliance with the “Restriction of the use of certain Hazardous Substances in electronic equipment (RoHS)” set mandatory on July 1 2006 The following products have been assembled with devices, components and parts manufactured using Lead (Pb) free solder. • DT-X10M30RC2 • DT-X10M30URC2 7 2. Applications This chapter describes some of the usage scenarios for the DT-X10 series. 2.1 Operation Images 1. Operation by end users Points to be considered in the application; • Correct operation method to independently use the terminal. • Correct operation method and restrictions to use multiple devices. • Operation method of each option. Fig. 2.1 2. Operation for introducing the system Points to be considered in the application; • Initial introduction method (including all options). • Upgrade of system components (Service Packs). Data Fig. 2.2 3. Operation for development Points to be considered in the application; • Basic development method and device configuration in the Microsoft development environment. Fig. 2.3 4. Operation for maintenance Fig. 2.4 8 Points to be considered in the application; • Maintenance method for user side. • Maintenance method for service/sales representative side. • Maintenance method for development side. 5. Operation for production Fig. 2.5 9 Points to be considered in the application; • Basic manufacturing procedure/inspection measures in the production department. 2.2 System Configuration By Application 1. Terminal for automobile drivers • Transmits in real time data inputted at a customer to the center. Receives/sends instruction E-mails to/from the center. WWAN card • Car charger IrDA or Bluetooth Mobile printer Fig. 2.6 2. Terminal for warehouse Wireless LAN card Charger • Transmits in real time data inputted at the office via wireless LAN. IrDA or Bluetooth Mobile printer Fig. 2.7 3. Terminal for WAN and LAN WWAN card Wireless LAN card Charger • Transmits in real-time data inputted in the field through WWAN, and at the office through wireless LAN. IrDA or Bluetooth Mobile printer Fig. 2.8 4. Conventional-type terminal • Temporarily stores inputted data in this terminal without using a communication card, then batch downloads it to a connected PC. Cradle IrDA or Bluetooth Mobile printer Fig. 2.9 10 2.3 Operation By User Assuming actual operation is performed by the end user, this chapter describes the method of use and restrictions that apply to the terminal, including the optional devices. 2.3.1 Basic Operations • • • • • • For operating the touchpanel it is recommended to use the accompanied stylus, since direct operation with your fingers may cause a malfunction or soil the screen. The Trigger keys are designed and built so that the terminal can be held by single hand to read symbols. The numeric keys should always be operated by fingers. When replacing the battery pack, first turn off the terminal power then open the battery compartment lid to perform battery replacement. Do not operate the RESET switch on the terminal unless the terminal freezes, etc. There is no guarantee that data currently held will be retained if the RESET switch is pressed during normal operation. 11 2.3.2 Operation With Multiple Options Since many built-in devices and externally connected optional devices may co-exist, the user must observe some precautions and restrictions when using them concurrently. Optional devices available for the DT-X10 A -PCMCIA・Wireless LAN CARD ・GPRS CARD B -CF- (Expansion slot) ・FROM CARD ・Wireless LAN CARD ・GPRS CARD ・Device recommended by CASIO D -IrDA・Connecting Bridge Satellite Cradles ・Connecting HTs ・Printer -Bluetooth・Printer ・Cellular phone C -Charge terminals・Cradle-type Battery Charger ・Connecting to Bridge Satellite Cradle Fig. 2.10 A, B, C, and D can all be physically connected at the same time, since their connection ports are different from one another. Devices included in the same boxes A, B, C and D above cannot be used concurrently. The following describes the conditions that must be observed to use multiple devices at the same time. Table 2.1 Possible concurrent connection with multiple devices PCMCIA Application Terminal used by driver Terminal used in warehouse Terminal used for others CF (Expansion slot) Bluetooth --------------- Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes --- Yes Yes Yes WWAN FROM Wireless WWAN LAN card card card LAN card card ------Yes Yes ----- Yes Yes Yes --------- --Yes ----Yes --Yes ----Yes ----Yes --- --- --- --- --- Notes • Due to power supply restrictions, concurrent connection with multiple devices may not be possible. • “WWAN” represents World Wide Area Network. 12 Charge IrDA Wireless terminal Switching over process for LAN devices As shown in Table 2.1, multiple LAN devices can be installed (i.e. the drivers are loaded) at one time in this terminal. However, for actual communication, it is necessary to switch to the specific device as required. The following explains the switching procedure: Table 2.2 Device Wireless LAN card Wireless LAN card LAN card LAN card Slot CF slot PCMCIA slot CF slot PCMCIA slot Feature/Protocol 802.11b 802.11b LAN connection via 10BASE-T networking LAN connection via 10BASE-T networking Remark Switching procedure An API will be provided which enables the switch over of LAN devices from an application. This does not use registry settings and it is therefore possible to switch over instantly without performing a reset. For further details, refer to DT-X10 Series Library Manual for the functions, CLBCardDetectDisable, CLBCardDetectEnable and CLBCardDetectGet. Automatic switching between WWAN and Wireless LAN (seamless roaming) If both WWAN and Wireless LAN are to be used, a function to change over is not supported by the OS. The application should use the procedure above to switch over. 13 2.3.3 Intended Application By Device Table 2.3 Device PCMCIA CF Bluetooth IrDA FROM card Modem card LAN card Wireless LAN card Printer Cellular phone Battery charge on Cradle Connecting to Bridge Satellite Cradle Connecting HTs -Yes Yes Yes ---- Yes -Yes Yes ---- ----Yes Yes -- ----Yes --- Charge terminal ------Yes -- -- -- Yes Yes -- -- Yes Yes -- FROM Card Used as the storage memory. Since it has a memory configuration that does not require any backup battery, which differs from the RAM disk installed in the terminal, it can store data even when the terminal battery power has been consumed. In addition, it can easily be removed and replaced so that handling of data with the CF card can be easily performed. • Real-time data storage (the access speed is lower than RAM disk.) • Storage of large-volume data such as master file, etc., that is never updated • Batch installation (with SETUP function) • Self-execution on startup by reset (with SETUP function) • Self-execution at Power ON (with AUTORUN function) • Possible to plug/unplug while terminal power is on. • Stops accessing to secure data when the back lid is opened. • Power OFF is suspended until the recovery process is completed if the Power key is pressed during access. • Improved speed for saving data into the card Modem Card Used to enable modular communication via a modem connected to telephone line. • Modem card for modular connection via cable • Modem CARD with built-in fixed antenna • Modem CARD with built-in adjustable antenna • Real-time upload/download of information • Send and receive mail • Call-in function (function to inform the user that mail is received) • Security function (VPN (PPTP)) • To secure data, access is stopped when the back lid is opened. • Disables Power OFF if the Power key is pressed during communication. • Sets up APO (disabled) to default to avoid interruption of in-progress communication. 14 LAN Card Used to perform communication by connecting to the 10BASE-T Ethernet environment. • Permanent LAN connection (operating the terminal as desktop unit) • Independent LAN connection (connecting the LAN cable or LAN card as required) • Real-time upload/download of information • Send and receive mail • Security function (VPN (PPTP)) • To secure data, access is stopped when the back lid is opened. • The application should implement the function to disable Power OFF when Power key is pressed during communication. • Possible to re-establish communication automatically when the terminal is restored through the resume operation. • Sets up APO (disabled) to default to avoid interruption of in-progress communication. Integrated Wireless LAN Card (applicable to DT-X10M30RC, M30URC, M30RC2, and M30URC2 models) Used to communicate in wireless LAN that is compatible with IEEE802.11b. • Real-time upload/download of information • Send and receive mail • Security function (VPN (PPTP), WEP128/64bit) • To secure data, access is stopped when the back lid is opened. • The application should implement the function to disable Power OFF when Power key is pressed during communication. • Possible to re-establish communication automatically when the terminal is restored through the resume operation. • Sets up APO (disabled) to default to avoid interruption of in-progress communication. • Transmission rate speed is 5 Mbps. Printer It is possible to send print data to any IrDA-compatible printer or Bluetooth-compatible printer. The Bluetooth serial profile is supported by the terminal. Cellular Phone It is possible to dial-up any Bluetooth-compatible cellular phone without using cable. The Bluetooth dial-up profile is supported by the terminal. Cradle-type Battery Charger This is the Cradle-type Battery Charger on which the terminal is mounted for charging the installed battery. As long as it is used indoor, it is possible to install it on a wall (Wall-mounted configuration). 15 Bridge Satellite Cradle It features with two types of serial interface, RS-232C and USB, for connection with a PC. This cradle supplies power to the terminal as well as charging the battery pack. By connecting cradle-to-cradle with the RS-422 it is possible to chain-connect a maximum of 8 handheld terminals. Application 1 Data Data Data Database Between Bridge Satellite Cradle and HT : FIR (4Mbps) Fig. 2.11 Connection via RS-232C / USB interfaces Application 2 Data Data Data Database Between Bridge Satellite Cradle and HT: FIR (4Mbps) ・・・・・ Fig. 2.12 Via RS-422 interface Via RS-232C / USB interfaces Between Terminals The use of HT-to-HT connection is assumed for maintenance and development. HT to HT connection via cable is not supported. • Using the IrDA or Bluetooth capabilities, build a child terminal using a terminal as a parent terminal. 16 2.4 Installation Phases There are two system introduction methods, initial installation and update. 2.4.1 Initial Installation The initial installation of the system is divided into two kinds of operation, which are copying applications and setting up the network environment. 1. Introduction of application First, build a parent terminal using either of the following methods: • Connect the Bridge Satellite Cradle and copy application from PC. • Use a PCMCIA/CF card to copy application (it is also possible to setup the registry at the same time if using the Setup Tool). • Connect the terminal via LAN to copy application from PC. • Connect the terminal via USB to copy application from PC. • Use the setup tool to establish communication and security environments. With either of the following methods build child terminals: • Use the copy tool of the terminal to copy applications in the parent terminal via IrDA. • Use the backup tool to copy applications in the parent terminal onto the PCMCIA/CF card, and then insert the card into the target child terminal to restore the environment of the parent terminal. Introduction with Bridge Satellite Cradle Introduce application after making connection with the Bridge Satellite Cradles. Connecting Bridge Satellite Cradles ・・・・・ USB/RS-232C RS-422 Fig. 2.13 17 HOST SYSTEM • LMWIN • ActiveSync (not operable for daisy chain connection) Introduction by HT-to-HT transfer Use the terminal, into which the system has been already installed, as a parent terminal and introduce the system with the copy tool residing in the terminal. Fig. 2.14 Introduction with PCMCIA/CF Card The system introduction is easily performed by simply introducing the system with a PCMCIA/CF card and PC, etc., and resetting the terminal after inserting the card into appropriate slot of the terminal. (For this operation use the Setup function and the Backup tool in the terminal.) With this introduction method, if there are a sufficient number of cards, even a batch introduction to many terminals is possible. System delivery also becomes easy. Fig. 2.15 18 2. Setting up the network environment Set up the network environment for each of the terminals with the following procedure. 1. Initiate the setup tool and define the network environment. 2. Initiate the security tool and define the security environment. Setting up network environment Initiate the setup tool to define the network environment. Figure 2.16 shows an example of setup for Wireless LAN. Fig. 2.16 19 Setting up the security environment Initiate the security tool to define the security environment. The following window (Fig. 2.17) shows an example of security setup for Wireless LAN. Fig. 2.17 3. System restoration with the back-up function A handheld terminal into which the system has already been introduced may sometimes be required to re-introduce the system. In this case, provided that the PCMCIA/CF card that was created at the time of the introduction and if the user frequently backed up data used by applications, it is possible to restore the system operation to the state that it was in at the time of the back-up using the same PCMCIA/CF card and backup data stored in the Flash ROM. 20 2.4.2 Upgrading The System The following pieces of software/firmware may be required to upgrade in future. Objects of updating Development environment/HOST system Application development environment Up/downloader DT-X10 series FROM OS Driver Utility : Integrated basic OS: WindowsCE .NET 4.1 Embedded : Integrated basic driver : Integrated utilities, Add-on utilities Operational specifications for update Table 2.4 Item Category Development Application environment/Host development environment HT : Microsoft eMbedded Visual C++4.0 +SP1/ CASIO Lib : Microsoft Visual Studio .NET 2003 : ActiveSync3.5 / LMWIN Product Embedded VC++ 4.0+SP1 Visual Studio .NET 2003 CASIO library - System library - Bluetooth library - C-MOS Imager library - Export SDK Up/download ActiveSync 3.5 LMWIN FROM OS Basic OS Drivers (integrated) Standard driver Buzzer Supplied by --Supplied with DLL files. Required to be installed in development environment at the user side. To be announced. Downloading from CASIO web. Supplied with OS file Provider Microsoft CASIO Microsoft CASIO Supplied with driver files. C-MOS Imager Bluetooth FROM driver Utilities(pre-installed) Microsoft APL FLCE FCHKCE Auto Setup CF Backup tool Welcome Contrast/Backlight Diagnosis Bluetooth C-MOS Imager Copy files to another HT 21 --Supplied with utility files. Microsoft CASIO 2.5 Application Software Development 2.5.1 Development In Microsoft Environment Table 2.5 Development platform Development environment Microsoft Windows 2000 SP2 or later edition (English) Microsoft Windows XP Professional RCI or later edition (English) CPU: Pentium II 266 MHz or later version RAM : 128 MB or more HDD: 1.7 GB or more eMbedded Visual C++ 4.0 + SP1 or Visual Studio .NET 2003 with Visual Basic Dedicated SDK and library for DT-X10 series Development language for application development The development environment has been completely switched from that using eMbedded Visual C++ and eMbedded Visual Basic tool has been added to eMbedded Visual C++ and Visual Studio .NET 2003. • eMbedded Visual C++ 4.0 +SP1 development environment eMbedded Visual Tools 3.0 (eVB and eVC++3.0) cannot be used to develop applications for DT-X10. You now have the choice of using either embedded Visual C++ 4.0 + SP1 or Visual Studio .NET 2003. If you use Visual Studio, you can choose between C# and Visual Basic .NET as your development language. The development tool is now exactly the same one as developers use for developing normal Windows applications. To obtain the eMbedded Visual C++ 4.0 + SP1 development tool, download it free of charge from the Microsoft home page (as was done for eMbedded Visual C++ 3.0). Applications developed with eMbedded Visual C++ 4.0 + SP1 are expected to run at a higher speed than those which are created in an environment using Visual Basic of Visual Studio .NET. This is because the codes to be compiled with eMbedded Visual C++ 4.0 +SP1are compiled as native codes of the target CPU. As a result, they can theoretically be executed at a higher speed than those that are created in the Visual Studio .NET environment, which generates intermediate codes. • Development environment that uses Visual Studio .NET 2003 and Compact Framework A tool called eMbedded Visual Basic 3.0 has been previously provided for application development, but in accordance with modifications to WindowsCE .NET 4.1, the development environment for using Visual Basic as a single unit will no longer be supported. As the development environment has changed, Visual Basic, C++ and C# should have the same types of variables. And, in the conventional environment, a structure could not be passed as an argument when using Win32 API, resulting in that only a limited number of functions could be used. As this problem has been solved, any function created with C++ can now be used from Visual Basic. Codes generated from this development environment are compiled into the intermediate language for .NET Compact Framework. As a result, the effective execution speed will be somewhat slower than that which results from Visual C++ 4.0 native code. 22 • Summary of the application development environment Application eMbedded Visual C++ 4.0 +SP1 CASIO Library Visual Studio .NET 2003 Visual Basic .NET Visual C# .NET Visual C++ .NET Available later .NET Compact Framework (Common language runtime) CASIO API Group WindowsCE .NET 4.1 Embedded (WindowsCE .NET) Although the development tool has been modified, the development method remains the same. Fig. 2.18 Note: It is not possible to develop applications for CASIO IT-700 and IT-70 series with eMbedded Visual C++ 4.0. • Precautions for creating a user application Application programs should be stored in FlashDisk. Important files such as log files, setting files, data files and database should be stored in FlashDisk also. The caution comes from the fact that data in RAM will be held only for approximately 10 minutes when the battery pack runs out. Therefore, all important data and programs should be stored and backed up in FlashDisk by the application program. Regarding files which must be resident under Windows folder to work, those files should be backed up in FlashDisk by Backup Tool. When the battery pack’s voltage is low, WM_POWERBROADCAST (PBT_APMBATTRYLOW) message will be issued by the system. Upon receiving this message application must save current data into FROM and terminate the task running. 23 Porting application developed for IT-700/IT-70 into DT-X10 • Applications developed with eMbedded Visual Basic Applications developed with eMbedded Visual Basic 3.0 can be copied into the terminal by the following procedure: 1. Because an application created with eMbedded Visual Basic 3.0 uses variable types and form classes identical to those of Visual Basic 6.0, the copy of a ready-made application is easier than its new creation using Visual Studio .NET 2003 with Visual Basic. 2. There is a specific conversion wizard provided in Visual Studio .NET for converting from Visual Basic 6.0 to WindowsCE .NET 4.1. With this function perform your copy task semi-automatically. The reason why such a large scale modification is required is that Microsoft has not included support for the old Visual Basic runtimes in WindowsCE .NET 4.1. However, the DT-X10 series includes support for the much more powerful .NET Compact Framework and therefore applications created using Visual Basic .NET in the new version of Visual Studio can run without problems. • Applications developed with eMbedded Visual C++ 3.0 Applications developed with eMbedded Visual C++ 3.0 can be ported through the following procedure: 1. Create a new empty project with eMbedded Visual C++ 4.0 +SP1. When creating an application that uses MFC, make sure to select a project that also uses the MFC. 2. Add all the source files, header files and resource files of eMbedded Visual C++ 3.0 that have already been created to the created project. 3. Set the configuration to STANDARDSDK using eMbedded Visual C++ 4.0 +SP1 and build it with ArmV4T for the CPU. 4. If a SHELL function-dependent API of the Pocket PC is used, an error may occur during compile. If this is the case, rebuild the code after removing the portion that caused the error by commenting it out. In general, the SHELL function serves as the face of each OS. Therefore, since the provided displays are different between this system and the Pocket PC, some APIs may not be properly supported. 5. With the above operations the porting is complete. 24 3. Features This chapter outlines the specifications of the DT-X10 series including optional devices. For information about function/specification details refer to the subsequent chapters. DT-X10 Series • • • Latest Microsoft WindowsCE OS installed (WindowsCE .NET 4.1 eMbedded) C-MOS Imager, Bluetooth, and PCMCIA slots are standard features. Models with/without Wireless LAN are provided (see the table below). Fig. 3.1 Table 3.1 Model DT-X10M30U DT-X10M30URC DT-X10M30URC2 DT-X10M30E DT-X10M30RC DT-X10M30RC2 Wireless LAN IEEE802.11b No FCC FCC No ETSI ETSI C-MOS Imager Yes Yes Yes Yes Yes Yes PCMCIA Yes No No Yes No No Bluetooth Yes Yes Yes Yes Yes Yes Options • Cradle for connecting multiple Bridge Satellite Cradles Connection of Bridge Satellite cradles: Serial connection/Maximum 8 units can be chained. RS-232C / USB Fig. 3.2 RS-422 25 • Battery recharging system: Cradle-type Battery Charger/Dual Battery Charger Cradle-type Battery Charger Dual Battery Chargers AC adaptor AC adaptor Two types of battery pack, standard and large-capacity, are available. Fig. 3.3 • CF Interface: FROM CARD 32MB 64MB 128MB 192MB Fig. 3.4 • PCMCIA / CF Interface: LAN CARD /Modem CARD LAN/MODEM card PC PC Phone line Network PC PC MODEM Card GPRS LAN card Wireless LAN Card Fig. 3.5 • • IrDA Printer: Recommended IrDA printers only. Wireless LAN Access-Point: Recommended Access-Points only. 26 Homes 3.1 Available Models And Options Table 3.2 List of the models and dedicated options Product Description DT-X10 32 MB, C-MOS imager, Bluetooth 32 MB, C-MOS Imager, Bluetooth, Wireless LAN 32 MB, C-MOS Imager, Bluetooth, Wireless LAN 32 MB, C-MOS Imager, Bluetooth 32 MB, C-MOS Imager, Bluetooth, Wireless LAN 32 MB, C-MOS Imager, Bluetooth, Wireless LAN Cradle Bridge Satellite Cradle Lithium-Ion Lithium-Ion battery pack (standard size) battery Lithium-Ion battery pack (large size) Battery charger Dual battery charger Car mounted battery charger Cradle-type battery charger AC adaptor (for DT-160IOE) AC adaptor (for DT-5022CHG) Car power adaptor (for DT-167CHGE) Communication card cover CF card extension unit CASIO PCMCIA card GPRS/GSM card recommended GPRS/GSM/LAN combo card options GPRS/GSM/LAN combo card CF card Model no. DT-X10M30E DT-X10M30RC (13 channels) DT-X10M30RC2 (13 channels) DT-X10M30U DT-X10M30URC (11 channels) DT-X10M30URC2 (11 channels) DT-160IOE DT-5023BAT DT-5025LBAT DT-5022CHG DT-167CHGE DT-169CHGE AD-S42120AE MPC-577ADP DT-827CAC DT-893LTCV, DT-892TCV DT-894CFU Globetrotter by OPTION D211 by NOKIA D311 by NOKIA CDMA card MerlinC201CDMA by Novatel Wireless Wireless LAN card Aironet 350 by CISCO Wireless LAN card WDF2011B Intel Wireless LAN card LA-4137 by Symbol FX-DS110-APL by Contec Access-Point AP-1000 by ORiNOCO Bluetooth printer Petit Lapan by SATO Note: The recommended options are for use with the DT-X10 series handheld terminals. Each product must be purchased from the respective authorized sales channels near by you. CASIO will not distribute any of the products. 27 3.2 Basic Specifications The following table shows basic hardware and software specifications of the terminal. Table 3.3 Item Specification CPU, Memory CPU PXA255 Application Processor (Xscale) (run at 200 MHz or 300 MHz) System ROM 32 MB (StrataFlash) User FROM 29.5MB (256 Mbits NAND) System RAM 32 MB (128 Mbits SDRAM) Display Color LCD Device 2-way TFT LCD (64K colors) No. of dots Dot pitch Contrast Visibility angle No. of maxi. display characters Types of display characters Display character size LED Indicator For charge control status For general use Keyboard Numeric keys Function keys Imager trigger keys Others Touchpanel Imager CMOS Imager Audio Buzzer Remark For OS For apps and files For main memory For indoor and outdoor use 240 (W) x 320 (H) 74 um 10 grades 30 (W) x 40 (H) WindowsCE supported character fonts Scalable fonts With 8-dot font mode Charge notification 3 colors (red, green, orange) LED 3 colors (red, green, orange) LED Data reception notification/scanning confirmation/User notification 0 to 9, ENT, CLR keys F1 to F4 keys Trigger keys (right/left sides) Arrow up, down, left, right, PW, Program, Fn keys Method Resolution Operation 12 4 2 7 Analogue 240 x 320 pixels Stylus 1D/ 2D symbologies, OCR fonts, image captures Continue. 28 Key code input with software input panel Handwriting recognition input Interface IrDA Serial Card slot no. 1 IrDA Ver. 1.1 USB PCMCIA Wireless LAN card Card slot no. 2 Wireless Interface Reset switch Reset switch Timer RTC Count Accuracy Alarm DT-X10M30E, M30U DT-X10M30RC, M30RC2, M30URC, M30URC2 CF expansion slot (option) Bluetooth integrated Year/Month/Date/Hour/Minute/Second/Leap-year Countable up to February 6th 2116 ±60 seconds per month Alarm/Wake-up function 29 3.3 Software Configuration Pre-installed software The following application programs and drivers are factory-installed in the ROM of the terminal. Table 3.4 Category Basic OS Appended Drivers Microsoft application Casio application Software WindowsCE4.1 Embedded Display Key Touchpanel Audio PCMCIA Communication GWE Buzzer FROM Driver C-MOS Imager Driver Bluetooth Driver Wireless LAN driver File Explorer ActiveSync Client HandWriting Control panel SIP SHELL Mail Description Basic operating system Color TFT Key Touchpanel Wave reply/record Card socket FIR/USB Battery/LED Beep sound Integrated flash memory is used as storage. C-MOS Imager Bluetooth Wireless LAN Explorer ActiveSync Hand writing System Auxiliary input Shell e-mail program (see note) Internet Explorer Browser with Ver. 5.5 (see note) FLCE Communication utility FCHKE File check utility Auto Setup Program to execute program when reset switch is pushed or a card is inserted. CARD BackUp Card backup tool Contrast/Backlight Setting the contrast and backlight Buzzer setting Tool to set volume of the buzzer Calculator Four arithmetic calculation utility Welcome Wizard Setting user information Wireless LAN Power Setup Tool Tool to set the power of Wireless LAN module C-MOS Imager sample program Scanning symbols, capturing images, setting the parameters, and the demonstration. Bluetooth Setup Tool Bluetooth setup tool utility HTs Copy Tool Utility for copying between terminals 30 Notes: • Mailer and Internet Explorer use respective modules supplied by Microsoft. • Wireless LAN driver and the setting tool are pre-installed in DT-X10M30RC, M30RC2, M30URC, and M30URC2. • Storage Manager by Microsoft in the Control panel will be used to format FlashDisk. Software to be installed The following pieces of software are ones that must be installed in the RAM of the terminal prior to use of each function. They are not pre-integrated in the terminal. Table 3.5 Category Driver Software ATA Disk Security driver Application GPRS driver GPRS setup utility Description Encrypted disk driver (will be supplied according to the customer’s order) With call wakeup function GPRS connection utility Supported Libraries (C Libraries) This is a group of libraries supported to implement CASIO-original functions, in addition to those which are supported as the Microsoft SDK. C-MOS Imager Library (C Library) This library supports controlling the C-MOS Imager. Bluetooth Library (C Library) This library supports controlling the power supply to the integrated Bluetooth module and the protocol. It can be used with Visual Basic. Refer to DT-X10 Library Manual for detail. Host Utility Utility software used on the Host (PC) side for uploading/downloading files and data linkage includes the following: Table 3.6 Category HOST Utility Function LMWIN (Ver. 5.00 or later) Description CASIO’s file transfer application ActiveSync (Ver. 3.5 or later) Data link software available from Microsoft Export SDK This is an SDK that allows users to develop application programs for the DT-X10 series operating under the Microsoft environment. Table 3.7 Category SDK Function DT-X10_SDK.msi Description Software development kit 31 3.4 External View Notification/confirmation LED (2 LEDs) RESET switch (on the back of the terminal) 3.5-inch Color LCD Touchpanel Power key Trigger keys (Left and Right sides) ↑ ← → ↓ Fn Fn key Fig. 3.6 Cursor keys (Up, Down, Right and Left) □ ○ BL ABC DEF 1 2 3 GHI JKL MNO 4 5 6 PQRS TUV WXYZ 7 8 9 CLR 0 BS - F1 F2 ・ F3 Alpha Programmable key Ten key (0 to 9 keys) Function keys F4 The external view of above does not show the exact shape of the DT-X10 series. 32 4. Functions This chapter describes the functional specifications of the terminal and optional devices. 4.1 Basic Functions 4.1.1 Microsoft WindowsCE 4.1 .NET Version 4.0 This terminal has WindowsCE 4.1 Embedded installed, which is the latest Microsoft WindowsCE OS Version 4.0. Features • Interfaces easy to use • Employs .NET technology. • Enhances communication ability. • Large capacity memory • Provides an advanced development environment. • High expandability Microsoft applications such as PocketWORD, PocketEXCEL are not installed due to the embedded OS. 4.1.2 Display Functions A two-way TFT color display is installed. Table 4.1 Basic display panel specification Color Size X direction 65,536 colors 2-way TFT (16 bpp, Red: 5 bits, Green: 6 bits, Blue: 5 bits) 240 pixels Y direction 320 pixels Contrast • Can be set to one of 9 levels (Default = 5). • Can be set in application with ExtEscape API function. • Setup values can be modified in the Contrast and Brightness properties. Backlight intensity • The backlight intensity can be set to one of 9 levels according to whether external power or battery power is being used. (Default = 9 for external power or 7 for battery power) • It is possible to set up in application with ExtEscape API function. • The contrast adjustment setup values can be modified in the Contrast and Brightness properties. • When the minimum value is set, the backlight is set to OFF. 33 Features supported by ExtEscape API function The following features are supported by ExtEscape API function. • Contrast adjustment in application • Backlight adjustment in application • Power management for the display Backlight Automatic Dimmer (Only applicable when the terminal is powered by battery pack.) • When the terminal is powered by the battery pack and left as it is without any key pressed or input made on the touchpanel (idle state), the backlight will be automatically dimmed for power saving. (Backlight Automatic Dimmer is only functional when powered by battery pack and does not work when powered via Cradle or battery charger.) • When the terminal is dimmed automatically, the dim state will be cancelled by pressing a key or input on the touchpanel and it returns to normal brightness. • It is possible to set whether Automatic Dimmer is ON or OFF or time to become dim (Default = 1 minute) by Brightness Properties in Control Panel. The brightness when dimmed can be set by Auto Display Dimming (8 steps, default: 3rd step) in Brightness (Battery). It is not possible to set the dimmed brightness brighter than the normal brightness set for battery operation. Automatic Backlight OFF (in both cases powered by battery pack and via Cradle/Battery charger) • When the terminal is powered by the battery pack and left as it is without any a key pressed or input on the touchpanel (idle state), the backlight will be automatically turned OFF for power saving. • When the backlight is OFF automatically, Automatic Backlight OFF state will be cancelled by a key pressed or input made on the touchpanel and the backlight returns to normal brightness. • It is possible to set whether Automatic Backlight OFF is ON or OFF or time to become OFF (Default = 5 minutes) by Brightness Properties in the Control Panel. If both Automatic Backlight Dimmer and Automatic Backlight OFF are set during battery operation, either function which sets less time will be valid. Example 1 Automatic Backlight Dimmer : 1 minute Automatic Backlight OFF : 5 minutes After 1 minute Backlight will be dimmed and then after 4 minutes Backlight will be OFF. Example 2 Automatic Backlight Dimmer : 5 minutes Automatic Backlight OFF : 1 minute After 1 minute Backlight will be OFF and no dimming. Backlight brightness control by thermal sensor (in both cases powered by battery pack and via Cradle/Battery charger) • When the thermal censer detects high temperature of the terminal, brightness of Backlight will be restricted automatically. • There are two kinds of restrictions. The first one is to restrict steps of brightness control (9 steps) to up to 8 steps. The second one is to restrict steps of brightness control up to 6 steps. • If the brightness of normal condition or dimmed brightness set by Automatic Backlight Dimmer (only battery operation) is set greater than brightness which is beyond the range of the restricted steps, brightness will be restricted automatically to the inside of the restricted range. However, when the temperature drops and restriction is released, brightness will recover to the normal setting level automatically. • It is possible to confirm if the restriction is effective or not by checking the following registry. [ HKEY_LOCAL_MACHINE\Drivers\Display\CM7200F1 ] DispSensorLevel : DWORD (0:Nomal, 1, 2) 34 180 degree rotation of the screen • A screen rotated by 180 degrees is supported. The axis of the touchpanel is also rotated naturally. • It is possible to rotate the screen with ExtEscape API function in the application. • It is also possible to rotate the screen using the System Library in the application. • A screen rotated by 90 degrees or 270 degrees is not supported. • A screen rotated with Microsoft ChangeDisplaySettingsEx function is not supported. 35 4.1.3 Key Functions Keyboard Layout The following figure shows the keyboard layout on the terminal. ↑ ← → ↓ FNC □ ○ ABC DEF 1 2 3 GHI JKL MNO 4 5 6 PQRS TUV WXYZ 7 8 9 CLR 0 ENT BS - ・ Alpha F1 F2 F3 F4 Fig. 4.1 Key mode display The current key mode (Lock, Function, Upper-case Alphabet, Lower-case Alphabet) can be displayed in the task tray. L F 1 A a Fig. 4.2 Editing the Turnover keys Press the Input Switch key (Alpha key) to edit the Turnover keys displayed in the window. Abc Fig. 4.3 The “Left” and “Right” keys of the cursor keys (4 keys to move the cursor) can be used to move the cursor left and right to edit input character string. 36 Operation keys consist of Control keys, Cursor keys, Trigger keys, Numeric keys, and Function keys. The Power key/Trigger keys can be used as boot-up key under the power-off condition. An optional application or function can be assigned to each of F1 to F4 keys. Control keys/Programmable key Table 4.2 Special Description Key function Special key function (toggle) FNC -- PW -- Program mable -- Remark The Fn key operation will be disabled when another key input is made. The minimum time Turns OFF the power if the key is pressed longer than a specified period of time when the power is ON. setting is 500 If this function is disabled, user application will be supplied with milliseconds. a message. (Default = 1 second) [HKEY_LOCAL_MACHINE\Drivers\BuiltIn\pmc] PowerKeySenseTime : DWORD (unit : 500 milliseconds) Turns ON the power if the key is pressed longer than a specified period of time when the power is OFF. Returns the VK code set in the registry (Default: VK_F25). [HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP \KEYBD] ProgKeyCode : DWORD Cursor keys Table 4.3 Key ← → ↑ ↓ Special function None When Fn key is pressed None When Fn key is pressed. None When Fn key is pressed. None When Fn key is pressed. 37 Description Moves the cursor (to left). Moves the cursor (to left). Moves the cursor (to right). Moves the cursor (to right). Moves the cursor (to up). Moves the cursor (to up). Moves the cursor (to down). Moves the cursor (to down). Function keys Table 4.4 Key F1 F2 F3 Special function None When Fn key is pressed. None When Fn key is pressed. None When Fn key is pressed. None F4 When Fn key is pressed. Description Deletes one character to the left of the cursor position. Initiates Application 1. [ HKEY_LOCAL_MACHINE\Software\Microsoft\Shell\Keys\40C1 ] Default = sz “―“ Initiates Application 2. [ HKEY_LOCAL_MACHINE\Software\Microsoft\Shell\Keys\40C2 ] Default = sz “.” Initiates Application 3. [ HKEY_LOCAL_MACHINE\Software\Microsoft\Shell\Keys\40C3 ] Default = sz Input switch-over key Toggling in order of Numeric → Alphabet (upper-case) → Alphabet (lower-case) → Numeric. Initiates Application 4. [ HKEY_LOCAL_MACHINE\Software\Microsoft\Shell\Keys\40C4 ] Default = sz Note: The specific program in the card can be invoked only when the following conditions are met. • PC (CF) card is installed in the slot. • The program is saved in a specific folder described below. \\PX798diag\diag.exe (Possible to set up in the registry.) Trigger keys Table 4.5 Key Special function T1/T2 -- Description Starts reading symbols. Can be set so that the user is informed of the fact the key is pressed. Turns ON the power if the key is pressed longer than the specified period of time when the power is OFF. Setting turning ON the power by key The Power key, Trigger keys, and Programmable key can be assigned to turn ON the power (turning ON the power and then invoking application software). Application and function can be freely assigned to other keys on the keyboard. Setting the prohibition on turning ON the power by key The function to turn ON the power by Trigger keys after the power has been turned OFF can be disabled. Using the System Library, turning ON the power by Trigger keys can be set enabled or disabled. The default setting is “Disable turning ON the power”. 38 Table 4.6 Ten key Key Special function None When Fn key is being pressed. 0 1 2 3 4 5 6 Description None “0” Display/non-display of SIP ‘<,>?/{[]} None “1” Turns ON/OFF the backlight. None None “2” Decreases the contrast. ABC abc “3” When Fn key is being pressed. Increases the contrast. A a None When Fn key is pressed. A a None When Fn key is being pressed. A a When Input switch-over key is being pressed. A DEF a def “4” Initiates calibration. GHI ghi “5” Darkens the backlight. JKL jkl “6” Brightens the backlight. MNO mno “7” Initiates application [ HKEY_LOCAL_MACHINE\HARDWARE\DEVICEM AP\KEYBD ]Fn7LaunchPath : SZ PQRS pqrs “8” Initiates application [ HKEY_LOCAL_MACHINE\HARDWARE\DEVICEM AP\KEYBD ]Fn8LaunchPath : SZ TUV tuv None When Fn key is pressed. A a None When Fn key is pressed. A a None When Fn key is being pressed. A a None When Fn key is pressed. 7 When Input switch-over key is being pressed None When Fn key is being pressed. A a When Input switch-over key is being pressed. A a 8 Continue. 39 9 None When Fn key is being pressed. A a ENT CLR None When Fn key is being pressed. None When Fn key is being pressed. When Input switch-over key is being pressed A a “9” Initiates application [ HKEY_LOCAL_MACHINE\HARDWARE\DEVICEM AP\KEYBD ]CardLaunchPath : SZ WXYZ wxyz Returns. No effect. Deletes one character. Performs as ESC. !@#$%~&*() _~’+=|\:;” • Repeatable keys Only “0” to “9” keys can be held down and used to repeat an effect. In order to have the same effect on the cursor keys, the registry must be set as follows. After changing the registry be sure to perform a reset on the terminal. Registry location Key Name Setting Value : HKEY_CURRENT_USER\ControlPanel\Keybd : RepeatCursor : DWORD: 0 (“Repeat”) / 1 (“Does not repeat”) • Click sound The key click sound can be in effect by using the library for buzzer output in the key driver. A sound for a key is emitted when the key is pressed, not when it is released. A key click sound will not be in effect while the key is held down (i.e. being repeated). • Disabling the Fn key operation If pressed together with the Fn key, a key that effects each special operation can be disabled individually through the registry settings. Registry location : HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\KEYBD Key Name Setting Value "DisableFn9" dword:0 / 1 enable/disable "DisableFn8" dword:0 / 1 enable/disable "DisableFn7" dword:0 / 1 enable/disable "DisableFn6" dword:0 / 1 enable/disable "DisableFn5" dword:0 / 1 enable/disable "DisableFn4" dword:0 / 1 enable/disable "DisableFn3" dword:0 / 1 enable/disable "DisableFn2" dword:0 / 1 enable/disable "DisableFn1" dword:0 / 1 enable/disable "DisableFn0" dword:0 / 1 enable/disable "DisableFnCLR" dword:0 / 1 enable/disable "DisableFnF4" dword:0 / 1 enable/disable "DisableFnF3" dword:0 / 1 enable/disable "DisableFnF2" dword:0 / 1 enable/disable "DisableFnF1" dword:0 / 1 enable/disable In order to make the setting effective, performing a reset on the terminal is necessary after changing the registry. 40 • Notification of the Fn key being pressed When the Fn key is pressed, the current Fn mode/canceled status can also be notified to application. • Preventing Power OFF by key and notification of it being pressed It is possible to disable turning OFF the power with a specific key using the registry settings. However, the power must be turned OFF with SoftOff API function in application program. • Disabling the Power OFF key for specified period right after turning on the power Since right after turning ON the Power the specific Power OFF key continues to be disabled for a specified period of time as set in the registry (Default = 5 seconds). • Setting the time period while the Power key is held down The user can set a duration of time for which the Power key should be held down until it takes effect. The default values are approx. 1 second for ON, and approx. 1 second for OFF. These can be set at 500 milliseconds increment. • Enabling/locking the Input switch-over key operation It is possible to enable or lock (fix) the Input switch-over key operation in application. • Notification of the Input switch-over key being pressed When the Input switch-over key is pressed, it is possible to post notification of this fact by issuing WM_USER+0x506 message to application. • Enabling/disabling key lock Key lock operation of each key except the Power key and Trigger keys can be enabled or disabled. • Changing the key mode transition Transition of the key mode can be changed. For example, in the transition of key mode [1] → [A] → [a], if [A] is set to disabled the transition will be carried out in order of [1] → [a] → [1]. The transition can be changed in application using the System Library. • Disabling the interrupt by Trigger key The interrupt by Trigger key can be set disabled. Once it has been set disabled, a key input by other key can be accepted by the system even if the Trigger key is being pressed down. This setting can be made in application using the System Library. 41 4.1.4 Touchpanel Functions • Basic specification Input actions through the touchpanel are permitted over the entire screen area. However, before putting this touchpanel into use, the user is required to calibrate it. The touchpanel has a resolution as shown below, which makes it possible for an application to obtain touch coordinates so that the pointing device can be controlled with the obtained coordinates. The tap sound will be issued through the library function, which is provided in the touchpanel driver for buzzer output. Table 4.7 Resolution X direction 240 dots Y direction 320 dots 100 to 150 points will be samples per second. Sampling cycle : 6 milliseconds (2 milliseconds x 3 times) / 150 points Chattering remove time : Back chattering 50 milliseconds only (5 times continuously with 10 milliseconds span) • Tap and hold It is possible to display a pop up menu corresponding to the tapped object like Pocket PC by tapping and holding. • Rotation of the touchpanel When the screen is rotated by 180 degrees, the touchpanel is also rotated by 180 degrees accordingly. 42 4.1.5 Sound Functions Audio • Specifications As the audio function, WAV replay from the dedicated earphone set and voice recording are supported. Stereo data is first converted into monaural and then output via earphone set. Playback Table 4.8 KHz Sampling frequency 8 11.025 12 16 22.05 24 32 44.1 48 Monaural Yes Yes Yes Yes Yes Yes Yes Yes Yes Stereo Yes Yes Yes Yes Yes Yes Yes Yes Yes A sampling frequency other than the above will not be supported. Stereo/monaural There is no stereo effect because the earphone is monaural. 8 or 16 bit. Record Table 4.9 Sampling frequency KHz Monaural 8 11.025 12 16 22.05 24 32 44.1 48 Yes Yes Yes Yes Yes Yes Yes Yes Yes A sampling frequency other than the above will not be supported. Stereo/monaural Only monaural input from the microphone. 8 or 16 bit. • Software Mixer Software Mixer of Microsoft is implemented in the terminal. With this feature, multiple sounds output by multiple applications can be mixed and output. The output sound is in 44.1 KHz, 16 bits and stereo. 43 Buzzer Based on the buzzer sound any optional sound such as read complete, key click, tap, alarm, and warning sounds can be output. However, as they will not be output to the earphone set, use PlaySound function from the audio driver as necessary. • Buzzer Attribute The attributes of the buzzer sound and their default values are shown in the following table. Table 4.10 Buzzer attributes and default values Sound Tap Key click Alarm Warning Scanning confirmation User-defined Frequency (Hz) 2200 2600 2800 3000 3100 -- Time (ms) 25 50 150 100 75 -- Individual mute ON/OFF ON/OFF ON/OFF ON/OFF ON/OFF ON/OFF Attribute B_TAP B_CLICK B_ALARM B_WARNING B_SCANEND B_USERDEF • Setting the buzzer sound volume The sound volume can be set to one of three levels; High, Medium, and Low. Mute can be set to ON/OFF for each individual attribute. This setting can be also made in application with API function. In addition, the setting can be made at the Control Panel property, and the values are written in the registry. 44 4.1.6 Memory Management Functions (RAM/RFA/FROM) • RAM This memory, which has a capacity of 32 Mbytes, is used either as the program memory when the program is running or as the object storage device for storing temporary files, etc. Although the user can set this object storage memory freely, data may be lost due to low battery voltage, etc. Therefore, it should be only be used as a temporary area, and the FlashDisk must be used to store critical data files, etc. The disk capacity can be modified according to the settings made to the WindowsCE Control Panel. Table 4.11 Default Memory Program memory Storage memory Capacity (Initial condition) Approximately 10,600 KB Approximately 15,000 KB • RFA (FlashDisk) FlashDisk will emulate the disk’s sector portion under the file system of the OS. The disk is released as user disk and can be accessed as FlashDisk folder. The user disk is available to freely read/write user data such as user application, master data, transaction data, etc. Data on this disk, which differs from the RAM disk which requires backup power, can be guaranteed even when the terminal battery power is lost. Thus, it is recommended to use this disk to make a backup of data on the RAM disk before turning off the power. Formatting and control of FlashDisk can be done by Storage Manager in Control Panel. The capacity is 29.50 MB when formatted with default setting. The FlashDisk driver has an additional function to format the disk automatically when the disk cannot be recognized. There is a possibility that the FlashDisk driver will not mount the disk itself when the disk is not recognized. In this condition, it is not possible to format the disk with Storage Manage in Control Panel. Therefore, there is no way to mount the disk. In order to avoid this situation, the driver will format the disk when the disk is not recognized after a reset operation. A prompt will be displayed for confirmation purposes A user can select to format or not. • FROM (OS ROM) This FROM with physical size of 32 MB of memory space is to store the loader, OS, and diagnostic program. A part of this space can be used for storing the security information such as terminal IDs as well as data for detecting battery voltage, etc. Data cannot be written into this memory space. 45 4.1.7 LED Functions Objective LEDs to be controlled include those which are used for user notification, read confirmation of the imager, and call-in notification. The recharging complete LED at the right side of the terminal is not under software control. It is under hardware control. Right-side LED • Battery charging status Left-side LED • Notification • Confirmation of scanning • Call-in notification Fig. 4.4 • User notification This is used for posting notification of alarms, etc. It can be controlled from the OS side so that the LED is illuminated at a specific timing with CeSetUserNotification function. Read confirmation of the C-MOS Imager and call-in notification have the priority. Table 4.12 Scanning confirmation/Data receipt notification Item Flashing interval Period continuously On Specification In red, 1 second ON and 2 seconds OFF. 30 minutes (stops if VDET is detected.) Remark • C-MOS Imager-read User access is allowed through the dedicated library. Table 4.13 Item Successful read Read error Specification Lights green for specified period of time, then turns off. Lights red for specified period of time, then turns off. Remark • Call-in confirmation User access is permitted through the dedicated library. Reading a symbol with C-MOS Imager has the priority. Table 4.14 Item Call-in confirmation Period continuously ON Specification Flashes in amber, 1 second ON and 2 seconds OFF. 30 minutes (stops if VDET is detected.) 46 Remark 4.1.8 C-MOS Imager Functions With a monochrome C-MOS Imager, decoding and capturing of 1D symbologies and 2D symbologies as well as images are supported. Not only a C-MOS sensor, but also a red LED for illumination and green LED for aiming are integrated. Basic specifications • Decodable symbologies 1D symbologies - EAN/JAN - UPCA/E - Code39 - NW7/Codabar - Interleaved 2of5 (ITF) - Code93 - Code128 - MSI/Plessy - IATA - Code11 - RSS - ISBT 2 D symbologies - Code49 - PDF417 - MicroPDF - Codablock - Aztec - AztecMesa - QR Code - MaxiCode - DataMatrix (ECC000/050/080/100/140/200) - Composite - TLCode39 Postal codes - PostNet - Planet - Australian - BPO4State(British) - Canadian - Dutch - Japanese • Decodable OCRs - OCR A - OCR B - US Money 47 • Image capture Size Grayscale Image format : Maximum 640 x 480 pixels (partial cut-out or n-skip is possible). : 2 or 256 grayscales/pixel : BMP, JPEG • Signature cut-out function This function export decoded symbol data and signature (captured image) at the same time by reading symbol and signature at a time. The position and size of the signature are to be set in the application software by referring the position of the symbol. The function supports Code39, NW7(Codabar), Code128, PDF417 and Aztec symbologies. • Streaming function This is to display the image continuously by the C-MOS Imager. 48 List of readable 1D and 2D symbologies Table 4.15 Max. Symbology Read Min. (possible Check setting character value) Transmission of check character Output format Additional function 1D symbology EAN8 Enable/disable -- -- Enable/disable Enable/disable -- Appending 2 digits/5 digits EAN13 Enable/disable -- -- Enable/disable Enable/disable -- Appending 2 digits/5 digits UPCA Enable/disable -- -- Enable/disable Enable/disable Output Appending 2 digits/5 digits NS UPCE Code39 Enable/disable Enable/disable -0 -26 Enable/disable Enable/disable Enable/disable Enable/disable (48) Output Converting UPCA, NS appending 2 digits/5 digits Output Converting FullASCII, start/ appending code stop bits NW7/Codabar Enable/disable 2 30 Enable/disable Enable/disable (60) Output -- start/ stop bits Interleaved2of5 Enable/disable 4 (ITF) Code93 40 Enable/disable Enable/disable -- -- Enable/disable Disable -- -- Enable/disable Disable -- -- 30 Enable(3)*/dis Enable/disable -- -- (48) able 80 Enable(3)*/dis Enable/disable -- -- -- -- (80) Enable/disable 0 40 (80) Code128/EAN128 Enable/disable 0 MSI/Plessy Enable/disable 4 IATA Enable/disable 4 64 (80) able Code11 RSS Enable/disable Enable/disable 1 1 30 Enable(2)/disa (80) ble 40 -- (80) ISBT Enable/disable -- -- Enable/disable 1 81 -- -- -- -- Enable Disable -- -- Enable Disable -- -- Enable Disable -- -- Enable Disable -- Enable Disable -- 2D symbology Code49 (81) PDF417 Enable/disable 1 2000 (2750) MicroPDF Enable/disable 1 366 (2750) Codablock Enable/disable 0 Aztec Enable/disable 1 AztecMesa Enable/disable 1 200 (2048) 2000 Full/Compact (3750) 500 (3750) Continue. 49 -- QR Code Enable/disable 1 MaxiCode Enable/disable 1 2000 Enable Disable -- -- Enable Disable -- Carrier message Enable Disable -- ECC000/050/080/100/140/ (3500) 150 (150) DataMatrix Enable/disable 1 1500 (1500) Composite Enable/disable 1 200 300 -- -- (300) TLCode39 Enable/disable -- -- -- -- -- -- PostNet (USA) Enable/disable -- -- -- Enable/disable -- -- Planet Enable/disable -- -- -- -- -- -- Australian Enable/disable -- -- -- -- -- -- BPO4State (UK) Enable/disable -- -- -- -- -- -- OCR fonts Canadian Enable/disable -- -- -- -- -- -- Dutch Enable/disable -- -- -- -- -- -- Japanese Enable/disable -- -- -- -- -- -- OCR Enable/disable -- -- -- -- -- OCR A/B, US Money In the table above, the values of “Max.” are just references. Actual readable ranges will vary according to the conditions of the printed symbols (resolution, PCS, etc.) and surrounding circumstances. They are figured out by using sample symbols which are configured with only numeric. In case of symbols configured with alphanumeric, the respective values will be reduced to two thirds, or one third for symbols configured with Kanji fonts (Japanese fonts) and binary codes. 50 Special Functions • Related to decoding symbols Decode Centering Mode This function specifies the decoding area covered by the illumination LED. This function is useful if there are several symbols on one sheet or label and only one of them needs to be read. Multiple-step Scanning This function enables to decode continuously while the Trigger key is being pressed. The same decoded symbols cannot be decoded again. (Although there is a restriction in the number of symbols and data buffer size.) This function is useful if some symbols are printed on one sheet because it is not necessary to push the Trigger key repeatedly. Package Scanning This function enables to output decoded data altogether. The decoded symbols cannot be decoded again like multiple-step scanning. This function is useful when more than one symbol is to be read together like JAN code for books or product tag. • Related to scanning operation LED Intensity Adjustment This function adjusts intensity of the aiming LED and illumination LED of the C-MOS Imager. It is possible to adjust intensity according to the surrounding brightness and the distance between the symbol and the terminal. If the intensity is set to zero, the LED is off. Therefore, this setting is useful when used outdoor where the illumination LED is not needed, or when a stamp in red is to be read. Contrast Ratio Adjustment This function adjusts the contrast ratio of the captured image/symbols. This function is useful when the symbol part reflects light such as metal. 51 4.2 Communication Functions 4.2.1 Basic specifications • Port assignment Communication capability with infrared I/F is supported. Table 4.16 Assignment of COM ports COM Port COM2: COM3: COM4: COM5: COM7: Assignment Remark Card modem IrDA (IrCOMM) Card modem 2 Bluetooth (Virtual COM) USB • Concurrent connection of multiple devices The following explains the combination of COM ports, described above, that can be used at the same time. Wireless LAN and Bluetooth utilities cannot run at the same time, because they use the same frequency bandwidth. Table 4.17 COM2: COM2: COM3: COM4: COM5: COM7: Yes Yes Yes Yes COM3: Yes COM4: Yes Yes Yes Yes Yes Yes Yes COM5: Yes Yes Yes COM7: Yes Yes Yes Yes Yes Note: If multiple devices are connected for operation at the same time, transfer efficiency may be reduced or error occurrence rate may increase, since the terminal will have a larger process load applied. Therefore, whenever possible operate so that concurrent use of multiple devices is avoided. 52 4.2.2 IrDA Communication • COM3 Generally, COM3 is assigned to IrComm to enable FIR (up to 4 Mbps) communication. Table 4.18 Item Synchronization method Transfer rate (bps) Specification Start/stop method 9600, 19200, 38400, 57.6 K, 115.2 K, 576 K, 1152 K, 4 M Remark IrDA negotiation parameters can be set with the following registry entries. The setup content is represented in a bitmap format, as specified by IrDA protocol. Setup values should be set so as to be within the range required to support hardware such as the IrDA controller, etc. [HKEY_LOCAL_MACHINE\Comm\Irsir1\Parms] Table 4.19 Name “Baud” “maxTAT” “DataSize” “WinSize” “BOFs” “minTAT” “LinkDisc” Type dword dword dword dword dword dword dword Default Value 0x1FE 0x01 0x3F 0x7F 0x40 Specified later 0x7F Description Baud Rate Maximum Turn Around Time Data Size Window Size Additional BOFs Minimum Turn Around Time Link Disconnect/Threshold Time Notes: • The transfer rate cannot be set in application. • Connection with other equipment than the recommended IrDA equipment with the terminal will not be guaranteed. 53 4.2.3 Bluetooth Communication • COM5 This will operate as a virtual COM that is compatible with Bluetooth Ver. 1.1 ( http://www.bluetooth.org/ ). Table 4.20 Item Profile Physical transfer rate of Wireless LAN part Specification Serial profile 723.2 Kbps (maximum) In addition, it supports the following profiles. GAP : Generic access profile SPP : Serial port profile SDAP : Service discovery application profile FTP : File transfer profile OPP : Object push profile DUN : Dial-up networking profile. Client only LAP : LAN access profile. Client only GOEP : Generic object exchange profile 54 Remark 4.2.4 USB Communication • COM7 The communication mode supports the full-speed mode (12 Mbps) through Universal Serial Bus Specification Revision 1.1 ( http://www.usb.org/ ). Communication from PC in the device mode is valid only for serial connection. This cannot be used for HT-to-HT transfer, modem connection and printer connection, etc. Table 4.21 Item Synchronization Transfer rate Specification Remark -12 Mbps Table 4.22 Target connection Item OS Software Specification Windows2000, Windows98 and other successor OS ActiveSync version 3.5 55 Remark 4.3 PC Card 4.3.1 Basic Specifications Two types of card slot are provided in the terminal; PCMCIA and removable CF slot. The PCMCIA slot is compatible with Type II 3.3/5.0V card conforming to PC CARD STANDARD Rel7.0. The CF slot is removable, and is compatible with CF Type II 3.3V card conforming to CFA Rev1.4. • Virtually plugging/unplugging a card Since the terminal is generally used with the WLAN card being installed (DT-X10M30RC, M30RC2, M30URC, M30URC2 only), the card driver is always called to supply power to the card at the same time when the terminal power is turned on. As the result, it is continuously supplied power even when the card is not accessed, thus accelerating the battery power consumption. So, in order to avoid this excessive power consumption, CASIO will provide an API that can virtually plug or unplug the card from user application. While the card is not used, this API can make an apparent condition as if the card is unplugged by disabling the card detection terminal, and, if required by the user, it returns the card detection terminal enabled. • Deleting the message when the card power is turned on A power supply message at the time when the card is inserted will not be issued. The user should be aware of this fact when accessing card. 56 • WAKE ON card functions WakeOnRing The WakeOnRing is a function to wake up the terminal while its power is turned off when a call-in signal arrives and then notifies the event of call-in to the modem card to the application program. Both setting for the PC card controller and setting for the modem controller are required in order to issue an interrupt signal when a call-in signal arrives. Regarding setting for the modem controller, setting is actually whether a RING signal in the modem card is sent out or not and this is set by AT commands. On the other hand, setting for the card controller is whether to drive the CF I/F STSCHG (Status Change) signal or not when the RING signal is valid. This setting is done by the register in the card controller. In the latter case, setting is done by the serial card driver and the setting method and explanation are described below. The former setting by AT commands should be performed by the user application. This method is not described in this manual. In the following description, the case that the serial card driver is operating and WakeOnRing is enabled is called WOR mode. Other cases are called Normal mode. DT-X10 3. Send call-in signal(RING) 4. STSCHTG/IREQ HAL Push Server 5. Cause for wakeup 2. Request of call-in PCMCIA driver Modem card driver Contents Server 6. Event Set WOR 1. Mail arrived/WEB modified Vertical application 7. Wakeup Contents 9. Receive new mail Read new web page Fig. 4.5 57 Child process WakeOnRing Specifications The serial card driver behaves under WOR and Normal modes as follows: WOR Mode 1. Supply power to the modem card regardless of the power ON/OFF status on the terminal. 2. When WakeOnRing call-in is generated in the modem card, an event of WakeOnRing (event with name, WakeOnRingEvent) will be issued. 3. When WakeOnRing call-in is generated in the modem card while the terminal’s power is off, wake on the terminal and then issue a WakeOnRing event. 4. When the card is ejected on WOR mode while the power is OFF, the terminal will be “Wake On”. However, WakeOnRing will not be issued and the HTSYS driver will broadcast the card insert/eject message (WM_USER+0x507). 5. While the terminal’s power is OFF on WOR mode, power supply to the card will not stop until the power supply to the card is stopped by generation of VDET3 due to low capacity of the battery. Normal Mode 1. The power to the modem card will be supplied while the application keeps the COM port of the mode open. When the COM port is closed, power supply to the card will be stopped. Setting of WOR mode The procedure to set WOR mode of the serial driver is as follows: 1. Mode setting will be done by setting CLB_BUTTON_ARRIVAL flag to the parameter of CLBSetBootableButtons function and calling this function. 2. 3. 4. Calling sequence: BOOL CLBSetBootableButtons ( DWORD dwBootableButtons ) Parameter: DWORD dwBootableButtons CLB_BUTTON_LEFTTRIGGER : Enable power ON by the left Trigger key CLB_BUTTON_RIGHTTRIGGER : Enable power ON by the right Trigger key CLB_BUTTON_INBOX : Enable power ON by mounting on the cradle CLB_BUTTON_ARRIVAL : Enable power ON by call-in signal CLB_BUTTON_NONE : Enable power ON by Wakeup Open the COM port (normally COM2) from the application. Issue AT commands to the modem card to set WakeOnRing operation. Close the COM port of the modem card. Resetting WOR mode The WOR mode of the serial card driver will be reset and returns to Normal mode if any of the following cases occurs. In order to set WOR mode again, repeat the procedure described above. 1. CLBSetBootableButtons function is called after resetting CLB_BUTTON_ARRIVAL flag in the parameter, and when the COM port of the modem card is opened and closed. Note: It is recommended that AT commands to reset WakeOnRing should be issued in the application. 2. When the terminal is reset. 3. When the modem card is ejected. 4. When VDET3 is generated while the power is OFF in the WOR mode. 58 4.4 Power Control 4.4.1 Power Management Functions Reset Control During normal use, meeting one of the following conditions will trigger the reset operation on the terminal. • Power ON reset This will occur when the battery back is installed and the power is turned ON that is neither being supplied power externally nor has the battery pack and memory backup battery installed, i.e. has no power whatsoever being supplied to it. The DRAM data storage memory (data stored by the user, database, applications installed on DRAM, etc.), the program execution memory, and the memory used by the driver will be “All-initialized (cleared)”. However, data in FROM can be retained without modification. • User reset This will occur if the Reset switch is pressed while the terminal is operating (power ON). Nothing will happen if the Reset switch is pressed while the power is OFF. With this operation the program execution memory in DRAM and the working data not saved will be “cleared”, and the data storage memory will be “retained”. Data in FROM will also be retained. • Full reset Press the Reset switch while holding down the Power key during power ON. At this moment, a confirmation message querying the user if it is OK to clear the memory will be displayed twice. Each confirmation must be made with either Trigger R key or Trigger L key. If the Trigger R key is pressed for both the first and repeated confirmation messages, the user memory (data storage memory and program execution memory) will be cleared as a result of the initialization. Memory Corruption Check The WindowsCE OS usually checks at the time of reset whether the RAM data has been corrupted, and, if it has, an attempt is made to unconditionally initialize the memory in question without notifying the user. To prevent the memory from being initialized without a notification being issued to the user, this system is designed to check the memory check data in the driver’s working area to detect the memory status before the OS process becomes active following the boot-up, and, if some part has been corrupted, a warning message is displayed on the screen. • Checking memory corruption Write a fixed character string (256 bytes) in the driver’s working area in RAM before a full-reset is attempted. Then, check this character string at every boot-up. If the contents are not consistent, the reset process will take place after the following message is displayed. • Message Message at the time of memory corruption will be as follows. “A problem with memory contents has been found. Press the Trigger R key to continue with the reset procedure, which restores normal system operation. Note that if the system determines that user memory cannot be repaired, it will delete all user data currently in memory. See the User’s Guide for details about initializing memory.” 59 Causes of Power ON Power ON causes include the following: 1. The terminal power is turned ON if the Power key is pressed. 2. According to the alarm function, the power is automatically turned ON at a specified time. 3. If the terminal is mounted on the Bridge Satellite Cradle, the power is automatically turned ON. (This applies only the case where the power is supplied from the Cradle.) 4. It is also possible to turn ON the power by pressing one of the Trigger keys. 5. The moment when a call-in signal arrives, the power is turned ON, if the communication card is mounted and the card power is on. Notes: • For the above causes 3 and 5 it is also possible to control (Disable) turning ON the power via the CASIO API of application program. • For the above cause 4 it is also possible to control (Enable) turning ON the power via the CASIO API of application program. Conditions under which Power ON is disabled An attempt of powering ON will be rejected when the following conditions are checked and found to be true. 1. Battery pack’s voltage is reduced to a level insufficient for start-up. 2. When the battery cover lock is released. Causes of Power OFF Power OFF causes include the following: 1. The terminal power is turned OFF if the power key is pressed while the terminal power is ON (Disabling this setting is also permitted). 2. According to the setting made with software, the power will be automatically turned OFF (APO) if any action (pressing a key, tapping on the touchpanel, accessing disk, card or communication) has not been sensed for a specified period of time. 3. The power will be automatically turned OFF due to a low battery pack’s voltage (VDET2/VDET3). 4. The power will be turned OFF if the battery cover lock is released. 5. The power will be automatically turned OFF if a voltage drop occurs from an overload of the CF card. Power OFF time When VDET2, VDET CF, or VDET3 is detected, the terminal power will be automatically turned OFF within a specified period of time. Case of resume OFF due to VDET2 or VDET CF : 200 milliseconds Case of emergency OFF due to VDET3 : 300 microseconds 60 Power Save Control The following modes of the power-saving control are provided. • Idle Where the system has no application to execute and waits for any event to occur, the CPU enters in the idle state to save the power. The peripheral devices are continuously operating. • APO (Auto Power OFF) If any action (of pressing a key or tapping on the touchpanel) has not been sensed for a specified period of time, the terminal power will be automatically turned OFF. Enabling/disabling the APO function can be set using a method of software. The APO time can be set on the Control panel. • Dim function and ABO (Auto Backlight OFF) function If any action (of pressing a key or tapping on the touchpanel) has not been sensed for a specified period of time, the backlight will be automatically dimmed and then turned off. Whether to enable or disable and the time settings of ABO function and the dim function can be modified through the property in the Setup window or the Contrast & Brightness utility. 61 Power State Control The terminal takes the following power states. Table 4.23 State Discharge RTC backup Sleep mode Run mode Idle mode Turbo mode Description Condition in which the battery pack runs down and the super capacitor has fully discharged. Both RAM and RTC cannot be backed up. Condition in which only RTC is backed up. RAM contents are not retained. The terminal is OFF and the peripheral devices connected also stop. Both RAM and RTC are backed up. Condition where the system and applications are running (at 200 MHz). Both the terminal and applications have nothing to execute and wait for any event to occur. The peripheral devices are operating. Sets the CPU clock frequency to the high-speed rate (300 MHz). Image of the Power State Control : Discharge Battery pack/Memory battery Insertion Sub-battery discharged Main Battery discharged RTC backup Power ON/Wakeup Power ON Run Mode Sleep Mode Power OFF/VDET2/VDET3 BcoverOpen Interrupt Turbo bit On Turbo bit Off No Activity Idle Mode Turbo Mode Fig. 4.6 CPU Clock Frequency Control The method of moving to the Turbo mode can be set by each user, and the CPU clock frequency can be switched from 200 MHz to 300 MHz. (The CPU temperature is always monitored by the thermostat in order to prohibit switching to 300 MHz when the temperature reaches to 80 degrees centigrade.). 62 Low Voltage Monitoring Control There are four low voltage detection levels with the terminal’s hardware. For the RAM retaining period effective at each detection level refer to the reference manual. Table 4.24 Level Description Operation Next boot-up method VDET1 Low battery pack voltage warning Low battery pack voltage -----warning display VDET2 Low battery pack voltage resulting in Power OFF Resume (a warning appears at OFF the start-up.) VDET3 Low battery pack voltage resulting in Critical OFF Warm boot (a warning appears emergency OFF at the start-up.) VDETCF Low CF voltage resulting in OFF Power OFF Resume (a warning appears at the start-up.) 1. Battery Pack Table 4.25 Status Level • • AC Notation External power Charge Charging Normal 1 2 3 Main battery Good Low Very low Description Condition where the external power is supplied and the recharging is completed. Condition where the external power is supplied and the recharging is in progress. Condition where the system is powered by the battery pack. Condition where the battery pack is fully charged or has enough power. Condition where the battery pack capacity is less than half. When VDET1 is detected. Conditions and levels of the battery pack Basically, the battery condition will be checked every 5 seconds. As long as the power management property is displayed, the battery condition is checked every second. After averaging the ten times of the AD converter data in the past regarding the supply voltage, determine the three levels of warning displays; “Remains very low (10% or less)”, “Low (25% or less), and “OK (75% to 100%)”. When VDET1 occurs, this value has fallen to 10%. Precautions when using standard battery pack (DT-5023BAT) While the terminal is operating with the standard battery pack, operating a wireless LAN card installed in the PCMCIA slot will shorten the life of the battery. Observe the battery level while operating such the card. 2. User notification If it is required to monitor the voltage in user application program, use GetSystemPowerStatusEx2 function of Win32 API to fetch the value. When VDET1 occurs, PBT_APMBATTERYLOW will be issued through WM_POWERBROADCAST message. 63 4.4.2 Charge/Power Supply Functions The dedicated battery packs (option; DT-5023BAT, DT-5025LBAT) can be charged with the optional dual battery charger (DT-5022CHG). In addition, power supply and battery charge can be achieved if the terminal is mounted on the Cradle-type Battery Charger or the Bridge Satellite Cradle. Charging Time Table 4.26 Option Dual battery charger DT-5022CHG Cradle-type battery DT-169CHGE charger Bridge Satellite Cradle DT-160IOE Power supply No Yes DT-5023BAT Approx. 2.5 hours Approx. 2.5 hours DT-5025LBAT Approx.5 hours Approx.5 hours Yes Approx. 2.5 hours Approx.5 hours Note: For the exact charging time of the battery packs with each option refer to the DT-X10 Series Hardware Manual. 64 5. Application Programs/Tools 5.1 Microsoft Application Programs Microsoft application programs and modules installed in the terminal are as follows. Table 5.1 Software File Explorer ActiveSync Client OBEX XML VPN EAP JScript Network redirector SIP HandWriting Description Explorer ActiveSync ObjectExchangeProtocol MSXML3.0 VirtualProvateNetwork(PPTP) ExtensibleAuthenticationProtocol Jscript5.5 To share the network with PC. Software keyboard Hand writing • File Explorer This is a file management program provided by Microsoft. • Connecting the Terminal to PC using ActiveSync Follow the steps below to connect the terminal to PC via USB interface. 1. Access the menus in order of Start → Setting → Control Panel to open the control panel. 2. Select Connection with PC in the control panel. 3. Make sure the connection with PC designates “USB”. If not, click the change button and select USB in the list box and tap OK button. Tap OK button in the connection dialogue of PC to close the setting. 4. When the connection with PC is established using a USB cable, ActiveSync will start up automatically. In case your PC requests a new driver, install the USB driver that is released by Casio. 5. In case ActiveSync will not start up automatically in the step above, start up repllog.exe in Windows folder to connect the terminal to PC. Note: For connecting the terminal to PC via the Bridge Satellite Cradle using ActiveSync, refer to “Up/Download Manual” separately available. • File synchronization in ActiveSync The synchronization file with PC can be stored in the My Documents folder of the terminal. Synchronization with OutLook application program (Job, Schedule, Contacts) is not possible. 65 • ActiveSync connection via LAN The steps to connect the terminal to PC via LAN are as follows: 1. Establish partnership using IrDA, serial and cradle. 2. Take out the cable and run LAN. 3. Access the menus in order of Start → Program → Communication and select LAN ActiveSync. 4. A dialog will be displayed. Select Network connection. • SIP This is a software keyboard provided by Microsoft. • HandWriting This is an input keyboard provided by Microsoft for hand writing. • PC Connection This is a tool in the Control Panel to set up the settings required to connect the terminal to PC. • Remove Programs This is a tool in the Control Panel to delete installed programs in the terminal. • System This is a tool in the Control Panel to set up the properties of the system, memory allocation, naming device and general. • Stylus This is a tool in the Control Panel to adjust the speed of double taps with the stylus and to perform the calibration on touchpanel. • Dial This is a tool in the Control Panel to set up a dial pattern for communication via phone line. • Network and Dial-up Connection This is a tool in the Control Panel to set up the password used to enter before starting up the terminal. • Power Management This is a tool in the Control Panel to set a period of time for turning off the power automatically if the terminal is not being accessed for a while, to set up the power save mode, and to check the remaining battery capacity. • Volume & Sounds This is a tool in the Control Panel to set up the sound volume, to set an event when to turn on the buzzer, and to set an attribute of the sound. • Display This is a tool in the Control Panel to set up the properties of display, background, appearance, etc. • Owner This is a tool in the Control Panel to set up the owner’s information. 66 • Certificates This is a tool in the Control Panel to edit trusted certificates list. • Regional Settings This is a tool in the Control Panel to set the properties about region, number, currency, date and time. • Date/Time This is a tool in the Control Panel to set date and time. • Input Panel This is a tool in the Control Panel to set the properties of Input Panel. • Storage Manager This is a tool in the Control Panel to format the FROM. All folders and files in the FlashDisk will be deleted if the formatting is carried out. 67 5.2 Casio Original Application Programs (1) Beside the Microsoft applications the terminal has the CASIO original application programs available. This chapter describes application programs preinstalled in the terminal. Other CASIO application programs you need to install as required will be explained in Chapter 5.3 “Casio Original Application Programs (2)”. Mail This mail software uses the Inbox module available from Microsoft. Browser This browser software uses Internet Explorer 5.5 module available from Microsoft. FLCE FLCE is a program for not only communicating between two terminals but also communicating with the upload/download utility of PC via the Bridge Satellite Cradle. File transfer can be executed by specifying each path on the original side and destination side. On FLCE, all parameters for designating the operation, files to be transmitted/received, storage destination, etc., will be specified as an argument. Table 5.2 Type Setup command Operation command Function Communication environment setup Command /Y={device baud rate, mode} Special option None File send /S O, R File receive /R O, R File send (append) /A None File delete /D O, R File move /N None Clock send /T None Idle start None Script file name Remark Device = COM1/IrDA Baud rate = 9,600 to 115,200 Mode = h: 1 minute of timeout i: Infinite timeout Valid only for HT-to-HT transfer FCHK The software is a file check utility to check if file copied from PC, etc., has been properly installed in the target terminal. It features with the following two functions. • Creating a list file If a file name to be transferred from the terminal is specified, a list file will be created from the list of transferred files and checksum data, which is calculated for all the files to be transferred. Checksum data of the list file will also be created. • Comparison of list files File information of a file transferred from the partner station (parent terminal) and the contents of a list file (FCHK.LOG) are compared, the checksum data of the list file is calculated and compared, and the checksum data of all the transferred (copied) files is calculated and then compared with the checksum data of the list file. 68 Automatic Setup Setup.exe or AutoRun.exe located under the given directory of memory card will be automatically executed when the terminal is reset or the memory card is inserted. This utility is an extra to allow automatic installation of application program from a storage device. Backup Tool Backup Tool is used to make a backup or restore various user data on the terminal into memory card or FlashDisk. Should user data accidentally be corrupted, use this backup utility to properly recover (restore) the user data. Backed-up contents • Files Include those which are created with user application, additionally installed program, and files transferred from desktop PC, and so on. • Registry Contains various settings of WindowsCE and built-in program setup information, and so on. • Database Includes data in the Inbox. Notes: • Data backup (and restoring from the backed-up data) takes several tens of seconds to several minutes depending on the volume of data. • For security purpose it is possible to enter a user password at the beginning of backup. This results in that data cannot be restored unless the correct password is entered. • It is recommended to make backup while the power is supplied via Cradle. • On this terminal the destination of backup and restore can be selected, since two storage cards of PCMCIA and CF and FlashDisk are available. Contrast & Backlight Utility Contrast, backlight and auto-reduction of backlight intensity can be set up. Buzzer Setting The buzzer sound volume in three levels, Low, Medium and Loud, and an event to sound the buzzer can be set. Welcome Wizard The Welcome wizard function and user setup information installed in the conventional PPC can be skipped over. This wizard allows the user to set up the settings for touchpanel, owner information and date/time. Bluetooth Setting Tool The Bluetooth setup tool is a utility used to set up and establish the connection with the Bluetooth device. Copy HT-to-HT This is a tool to easily create a child terminal. It copies the contents of a master terminal that has been properly set up onto a child terminal via IrDA interface without modification. WLAN Power Setting Tool This tool provides capability of various settings for wireless LAN and sight survey tool (created by a card manufacturer). 69 C-MOS Imager Demonstration This application displays a result of reading symbols (1D and 2D symbologies). It can also display images in white and black colors captured with the C-MOS Imager and save it as bitmap file to the My Documents folder. C-MOS Imager Setting Tool This tool is to set various parameters of the C-MOS Imager for reading symbols efficiently and accurately. C-MOS Imager Application This is an application program running at the behind when the user scans symbols. It displays a result of the scanning in edit box of user application. Since double-byte codes are included in the output data, the data cannot be output to the Key buffer. The function of Ctrl+”V” must be used instead. Thus, user application is not allowed to use this function (Ctrl+”V”). LMWIN (Host Utility) The upload/download utility is executed on HOST PC, and provides the following functions to the terminal connected via the Bridge Satellite Cradle. • File transmission/File reception • File append transmission/File append reception • Sounding the buzzer. • Setting the date and time. • File delete/move/rename • Fetch disk information/fetch file information/set file information • Terminating the session. • Executing a child process. • Displaying a character string. 70 5.2.1 Card Backup Utility Card Backup Tool is used to make a backup of or restore various user data on the terminal into memory card or FlashDisk. Should user data accidentally be corrupted, use this backup utility to properly recover (restore) the user data. Backed-up contents • • • Files Include those which are created with user application, additionally installed program, and files transferred from desktop PC, and so on. Registry Contains various settings of WindowsCE and built-in program setup information, and so on. Database Includes data in the Inbox. Notes: • Data backup (and restoring from the backed-up data) takes several tens of seconds to several minutes depending on the volume of data. • For security purpose it is possible to enter a user password at the beginning of backup. This results in that data cannot be restored unless the correct password is entered. • It is recommended to make backup while the power is supplied via Cradle or Battery charger. • On this terminal the destination of backup and restore can be selected, since two storage cards of PCMCIA and CF and FlashDisk are available. 71 Backup Select and execute the card backup tool with the following operation sequence: Start→ Programs→ Utility. 1. Close all open dialog boxes, if any. Also, make sure that sufficient battery voltage remains. 2. If the backup destination is a CF card, insert the memory card into the CF card slot. 3. Initiate the card backup tool by executing Start→ Programs→ Utility→ Card Backup operation sequence. 4. Select the backup destination from the list box that appears. If the CF card is replaced with another one after application is initiated, perform the following operation after making sure that the display contents have been changed. 5. Tap Backup now button with stylus. 6. If the user wants to input a password, it must consist of no more than 256 characters. Since the password specified here will be embedded as backup image, the user will be asked to re-enter it at subsequent system restoration. Make note of the password. Enter the password two times for confirmation. 7. When Yes button is tapped with stylus, a flywheel icon indicating that backup is in progress appears, and backup will be started. 8. A backup will be made in the selected folder, \Backup\backup.dat. 9. Several minutes are required to make the backup. During this interval, do not perform any operation, including keyboard input and tapping on the touchpanel. 10. The current process can be aborted if Cancel button in the “Backup in Progress” dialog is tapped with stylus. Screen Display Storage card: ******* available Data memory: ****** used : Free space on the selected memory card : Memory space used by the system If the display shows the following message, backup data can be stored successfully. Storage card > Data memory Restore 1. 2. 3. 4. 5. 6. 7. 8. Perform a Full Reset on the terminal in advance to clear all data. If required, secure sufficient memory space through Settings→ System→ Memory execution sequence. If backup data has been stored in CF card, insert it in the CF card slot. Start up the card backup tool through Start→ Programs→ Utility→ Card Backup execution sequence. Tap Restore now button with stylus. Enter the same password that was specified during the backup operation. A flywheel icon indicating that restoration is in progress appears, and restoration will be started. The restoration process requires several minutes. During this period do not perform any operation, including keyboard input and tapping on the touchpanel. Before returning to your operation, reset the terminal. Note: If the restore operation is not successful or if it is aborted in mid-course, system operation may become unstable. If this occurs, always perform a full Reset, and then perform restoration again. 72 Delete backup data 1. 2. Use stylus to tap “Backup File Delete” on the backup tool start-up screen. When Yes button is tapped with stylus, the backup file will be deleted. Error handling If one of the following conditions exists, a manual backup, automatic backup or restore operation results in an error and a corresponding error message will be displayed. In this case, solve the problem then make another attempt. • Battery voltage is low. • CF card is not inserted. • Insufficient CF card capacity • Backup data does not exist (at time of restoration). Help The user can invoke the Help screen with the following procedure. • Tap Start→ Help, in this order, with stylus. • To return to application, tap OK button in the top right of the screen. Command Line Start-up Option It is possible to call and use Backup Tool from the application by setting option parameters to the command line. Syntax : CF_Backup.exe /*1/*2/*3 *1 : R, B *2 *3 Either upper case or lower case will do. R : Restore B : Backup Backup storage directory For example, when stored in FlashDisk. CF_Backup.exe /B/FlashDisk \FlashDisk\Backup\Backup.dat will be created. When restoring from Storage Card CF_Backup.exe /R/Storage Card Will be restored from \Storage Card\Backup\Backup.dat Password Only necessary when a password is needed to be set. It is OK not to set. 73 5.2.2 Automatic Recovery Tool The Automatic Recovery Tool has been developed to recover immediately the memory contents in the terminal to “Default settings” when the memory contents are not being retained by the operating battery pack (DT-5023BAT or DT-5025LBAT) or by the memory backup battery if both batteries run down simultaneously. However, data in the RAM area cannot be restored using this tool. This tool comes with the DT-X10 Service Pack 1. Preparation Follow the steps to prepare the tool. It must be carried out manually. • Because Restore.exe is renamed to Setup.exe in Step 3 of this preparation procedure, rename Setup.exe in folder of “\FlashDisk\CE\ARM” to SetApl1.exe which is the installer for Service Pack 1. If file names SetApl2.exe and SetApl3.exe for user application program are generated in the folder of "\FlashDisk\CE\ARM", both the files will be installed automatically when restoration is carried out. Using this method, two user original application programs can be restored automatically. Fig. 5.1 List of files in "\FlashDisk\CE\ARM" • Various settings such as IP address, SSID, WEP, etc and user application programs can be backed up and then restored. Perform necessary settings at this preparation step. 74 • Execute Restore.exe program in folder of “\FlashDisk\CASIO“ by double tapping the name on the screen. Figures 5.2 to 5.4 below show screen transition from initiating the program until the backup is complete. Fig. 5.2 Fig. 5.3 Fig. 5.4 75 Process flow of Restore.exe 1. 2. 3. 4. Setting information about SetApl1.exe (for Service Pack), SetApl2.exe (for user application) and SetApl3.exe (for user application) is registered in the registry file for their restorations. Backup.dat file in folder of “\FlashDisk\Backup” is generated according to information in the RAM. Restore.exe in folder of “\FlashDisk\CASIO” is renamed to Setup.exe and overwritten to "Setup.exe" for service pack in folder “\FlashDisk\CE\ARM”. Register a backup completion flag to the registry file. Fig. 5.5 The following figures (Fig. 5.6) show an image of process flow of Restore.exe. Numberings 1 to 4 in Fig. 5.6 correspond to Steps 1 to 4 of “Process flow of Restore.exe” above. RAM FLASHDISK CE Windows ARM Registry 1. SetApl1.exe (Driver etc.) Driver etc. SetApl2.exe (Application1) Applications SetApl3.exe (Application2) Setting files Setup.exe (Restore.exe) SP.cab 3. 2. CASIO Restore.exe Backup Backup Backup.dat completion flag Fig. 5.6 76 4. Recovery Process 1 This is a recovery process for an event that data in the memory has not been deleted. Such event is “User reset operation”. 1. When the reset switch is pushed, Setup.exe in folder of “\FlashDisk\CE\ARM” is initiated automatically to check if a backup completion flag is registered in the registry file. 2. In case it is registered, Setup.exe checks each flag information of SetApl1.exe, SetApl2.exe and SetApl3.exe and execute them if necessary. Recovery Process 2 This is a recovery process for an event that data in the memory is deleted by performing a full reset or run down of battery. 1. When the reset switch is pushed, Setup.exe in folder of “\FlashDisk\CE\ARM” is initiated automatically to check if a backup completion flag is registered in the registry file. 2. In case, a backup completion flag has not been registered due to initialization of the memory caused by full reset or run down of battery, the tab for Date and Time properties will appear. Set a current date and time manually on this tab (setting manually is only this case). Fig. 5.7 Date and Time Properties screen 3. 4. 5. 6. Data is automatically restored from Backup.dat file in folder of “\FlashDisk\Backup” into the RAM. See figure (Fig. 5.8) on the next page. It registers also a backup completion flag in the registry file. A tab requesting you to perform the reset will appear. After setting on the screen, tap OK button to close the tab. A few seconds later the reset process starts automatically. This software reset is “MUST” to validate the restoration. After the software reset, SetApl1.exe or SetApl2.exe or SetApl3.exe or all will be initiated if necessary. And then Service Pack and user application program will be restored. 77 The figure (Fig. 5.8) below shows an image of the process flow described in Steps 3 to 6 on the previous page. RAM FLASHDISK CE Windows ARM Registry SetApl1.exe (Driver etc.) Driver etc. SetApl2.exe (Application1) SetApl3.exe (Application2) Applications 1. Setting files Setup.exe (Restore.exe) SP.cab CASIO Restore.exe Backup Backup Backup.dat 2. completion flag Fig. 5.8 Notes: • Service Pack and application programs will be overwritten automatically even if the files are same with ones before the backup considering that the Service Pack and application programs are being updated after the backup. • Log function Log history for maximum 30 times of backup and restoration is saved in \FlashDisk\CE\ARM\Restore.log. For any log history exceeding over 30 times, older ones will be deleted first. • To skip restoration To terminate the restoration operation press 5 key to skip the restoration. The buzzer sounds in a short period and then the restoration is skipped. 78 Example of System Configuration for Recovery (Automatic timer setting) The figure (Fig. 5.9) below shows an example system configuration for recovery. It is for automatic timer setting. Either the terminal is connected to the Clock Server via the cradle or via Access-Point in Wireless LAN configuration to download data (green line in the figure) of the clock from the Server. And, it updates the internal clock data in the terminal itself. In case PC available in store In case Clock Server in Headquarters : download via the cradle : download via the cradle USB/RS-232C IEEE 802.11b compatible Cradle LMWIN Server (Clock Server) Fig. 5.9 Example of system configuration for recovery Note: The recovery for automatic timer setting requires a menu such as “Set the timer automatically” in a user application. 79 5.2.3 FLCE FLCE is a program for not only communicating between two terminals but also communicating with the upload/download utility of PC via the Bridge Satellite Cradle. File transfer can be executed by specifying each path on the source side and destination side. On FLCE, all parameters for designating the operation, files to be transmitted/received, storage destination, etc., will be specified as an argument. Operation Procedure FLCE is an executable program that can be operated in one of two ways: • Stand-alone • Child process to be called from user application When FLCE is used as a stand-alone program, a dialog for entering parameters will appear when it starts up. Enter the necessary parameters in the dialog, then press OK button. However, if this program is to be operated in the idle-start mode, either press Cancel button or OK button without entering anything. In order to perform a file transfer from user application, initiate FLCE as a child process with the specified arguments. After communication is completed, the application will receive a termination code as return value in the process. Input parameters Operation parameter Registry : Communication command, communication option, transfer pathname, I/O interface to be used, baud rate, and mode : Set up the registry only if the default value of the following items need to be modified. I/O interface (IrDA or RS-232C), baud rate, and assignment of single character to drive name Output parameter Return value of Winmain : Termination code 80 Specifying the communication functions Operational designation to FLCE should be made either by entering the following command in the dialog that appears at start-up or by starting FLCE with the additional arguments. More than one operation command (maximum 20) can be specified at a time. In this case, the order of execution is from left to right. The operation of commands to the right of the command that caused the error will not be processed. If the environment setup command is not specified, its default value will be used. Table 5.3 Type Setup command Operation command Function Communication environment setup Command /Y={device baud rate, mode} Special option None File send /S O, R File receive /R O, R File send (append) /A None File delete /D O, R File move /N None Clock send /T None Idle start None Script file name Remark Device= COM1/IrDA Baud rate= 9,600 to 115,200 Mode= h: 1 minute of timeout i: Infinite timeout Valid only for HT-to-HT transfer Options O (Overwrite): Specifying forcible overwrite of read-only file • Specification of this option results in that read-only files are also overwritten. • If this option is not specified, an attempt to write in a read-only file will cause abnormal termination. • The file attribute after overwrite will be that of the source file. R (Recursive call): • The target of this operation will include all files under specified directory. If the specified directory is followed by sub-directories, they will also be included. • The directory should have no more than a maximum of 16 levels. • If this option is not specified, the target of processing includes only files that are specified by each pathname. 81 Commands and options The following describes the method of specifying the start-up parameters and their definitions. The total length of the start-up parameters including “FLCE” should be 255 characters or less. If there are any incorrect scripts, incorrect commands, options that cannot be set for the command, or incorrect parameters, communication will not be commenced and will immediately be terminated in error. Rules of writing parameters • Separate parameters with a one-byte space. • The /Y command can be specified at the top of the command line only once (can be omitted). • A maximum of 20 commands can be specified continuously after the required parameters. • Both upper-case and lower-case characters can be used for commands and options. • The order in which options are specified is not important. • Each option must be specified so that it directly follows the command, with no space between a command and an option. • In order to specify more than one option, specify them without inserting a space after each. In the following explanations “[ ]” means a parameter that can be specified optionally, whilst other parameters cannot be omitted. 1. Communication environment setup Specification method; /Y={ [device],[baud rate],[mode] } Functions; • Specify device, baud rate, and communication mode used for communication. • If this command is omitted, the default value of {IrDA} will be used. (See Chapter 4.2.2.) • Each of the parameters can be omitted. However, if this is done, the default value of the omitted parameter will be used. (See Chapter 4.2.2.) • Be sure to make the description immediately after “FLCE”. A specification made in other locations will cause a parameter error. Parameters; • Command /Y={ [device],[baud rate],[mode] } • Device Select either “IrDA” or “COM1”. • Baud rate If “IrDA” is selected: Cannot be specified. If “COM1” is selected: One of the following baud rates can be specified as the communication speed of RS-232C. 9600, 19200, 38400, 57600, 115200 Note: Parameter combinations other than those given above cannot be specified. They will cause a parameter error. 82 Mode • “H”; HT-to-HT command specification mode Always specify this option at one HT that is assigned the role of specifying the operation command for performing communications between two terminals (FLCE on the partner side should be executed by idle-start). • “I”; The connection wait timeout will be set to infinite. • The connection wait time will be one minute if no parameter is specified or if “H” is specified. • Only “H” or “I” can be specified. Table 5.4 Start-up Idle (including script) Specification of operation command Communication partner PC (Cradle) HT PC (Cradle) HT Connection wait timeout 1 minute Infinite No mode specification Mode specification I Mode specification H (Specification not possible) 2. File transmission Specification method /S[Option] Transmission file pathname [Transmission file pathname] [•••] Destination directory pathname Functions • Transfers a file that exists on the user’s terminal to a communication partner. • Overwrites a file with the identical file name, if the file name already exists in the destination directory of the communication partner. • If a directory specified as the destination directory does not exist in the communication partner, that directory will automatically be created there. • The transmission file pathname is checked first. If any of the transmission file pathnames that do not exist on the user’s terminal is specified, FLCE will be immediately terminated with an error. (In this case, even files existing on the user’s terminal will not be transmitted.) • Displays progress as a percentage. Parameters • Command /S=(Sending): Transmitting file • Options O (Overwrite): Specifying forcible overwrite of a read-only file - Specification of this option results in that read-only files are overwritten. - If this option is not specified, an attempt to write over a read-only file will result in abnormal termination. R (Recursive call): - The target of file transmission will include all files under the directory specified by the transmission file pathname. If the specified directory is followed by sub-directories, they will also be included in the targets of file transmission. - The directory should have no more than a maximum of 16 sub-menus. - Even if this option is specified, specify the transmission file by its full pathname. - If this option is not specified, the target of file transmission includes only files that are specified by the file pathname. • Transmission file pathname - Always specify files in full pathname that exist on the user’s terminal. - To specify all files, enter “*.*” as the file name. - Wild card specification can be applied to file names. - Double-byte characters can be used for directory names and files names. 83 • Destination directory pathname - As the last parameter for this command, specify the destination directory pathname on the communication partner. - If the specified directory does not exist on the destination, a directory that has the specified name will be automatically created. - Enter “\” as the terminator of the directory name. Otherwise, a parameter error will result. - Double-byte characters can be used for directory names. - For destination directory pathnames, follow the naming rule of the OS on the communication partner side. 3. File reception Specification method; /R[Option] Request file pathname [Request file pathname] [•••] Reception directory pathname Functions; • Specifies a file that exists on the communication partner side using the request file pathname, then receives the file. • Overwrites a file with the identical file name, if it already exists under the reception directory on the side of the user’s terminal. • If a directory specified as the reception directory does not exist, that directory will automatically be created. • For information about the operation that depends on the communication partner, refer to “8. Idle start” on page 88. • Displays progress as a percentage. Parameters; • Command /R (Receive): Handling a file reception request • Options O (Overwrite): Specifying forcible overwrite of read-only file - Specification of this option causes read-only files to be overwritten. - If this option is not specified, an attempt to write in a read-only file will cause an abnormal termination. R (Recursive call): - The target of file transmission will include all files under the directory specified by the request file pathname. If the specified directory is followed by sub-directories, they will also be included in the targets of file transmission. - If this option is not specified, the target of file transmission includes only files that are specified by the request file pathname. - Even when this option is specified, specify the request file in full pathname. • Request file pathname - Always specify files in full pathname existing on the communication partner side. - Wild card specification can be applied to file names. - To specify all files, enter “*.*” as the file name. - Double-byte characters can be used for directory names and file names. - For request file pathnames follow the naming rule of the OS on the communication partner side. 84 • Reception directory pathname - As the last parameter for this command, specify the reception directory pathname. - For the reception directory, specify the destination directory name to store the received file. - If the specified directory does not exist, the directory that has the specified name will automatically be created. - Enter “\” as the terminator of the directory name. Otherwise, a parameter error will result. - Double-byte characters can be used for directory names. 4. File transmission (append) Specification method; /A Appended file pathname Target file pathname Functions; • Transfers the contents of a file, which exists on the user’s terminal and is specified by the target file pathname, to the communication partner, and append it to the end of a file in the communication partner. • If a file specified by the target file pathname does not exist on the communication partner, that file will automatically be created. • Date and time of the target file corresponds to the system date and time of the terminal in which the target file exists when this append operation is performed. • If file transmission fails in mid-course, the target file maintains the settings it had before communication was started. • File append will be made by units of binary data. (This means that the data will be appended after an EOF code, if one exists). • Displays progress in percentage. Parameters; • Command /A=(Append): Handling a file append request • Appended file pathname - Specify a desired file in full pathname that exists on the side of the user’s terminal. - Wild card specification is not permitted for file names. - Double-byte characters can be used for directory names and files names. • Target file pathname - Specify a file in full pathname that exists on the communication partner to be appended. - If the specified file does not exist, it will be created with the specified file name. - Wild card specification is not permitted for file names. - Double-byte characters can be used for directory names and files names. - For target file pathnames follow the naming rule of the OS on the communication partner side. 85 5. File deletion Specification method; /D[Option] Deleted file name [Deleted file name] [•••] Functions; • Specifies a file or directory that exists on the communication partner side, and deletes it. • For information about the operation that depends on the communication partner side refer to “8. Idle start” on page 88. • Does not display progress in percentage. Parameters; • Command /D: Deletes the target file or directory that is specified by the deletion pathname. • Options O (Overwrite): Specifying forcible deletion of read-only file - Specification of this option results in that read-only files are also deleted. - If this option is not specified, an attempt to delete a read-only file will cause abnormal termination. • R (Recursive call): - The target of file deletion will include the directory specified by the deletion file pathname, and all files and directories under the directory. - If the specified directory is followed by sub-directories, they will also be deleted. - The directory should have no more than a maximum of 16 sub-menus. - When this option is specified, specify a directory name as the deletion pathname using the full pathname. - If this option is not specified, only files that are specified by the deletion file pathname will be deleted. • Deleting pathname In case without “R” option - Specify a file that actually exists on the communication partner side and is to be deleted. Wild card specification can also be used. - To specify all files, enter “*.*” as the file name. In case with “R” option - Specify a directory in full pathname that actually exists on the communication partner side and is to be deleted. - Enter “\” as the terminator of the directory name. - Double-byte characters can be used for directory names and file names. - For request file pathnames follow the naming rule of the OS on the communication partner side. 86 6. File move or rename Specification method; /N Move source pathname Move destination pathname Functions; • Moves the specified file (move source pathname) that exists on the communication partner side to the move destination pathname. • If the move destination pathname is a directory name, the file name at the move source pathname will be used without modification. If the move destination pathname is a file name, the moved file uses the file name at the move destination. • For information about the operation that depends on the communication partner, refer to “8. Idle start” on page 88. • Does not display progress in percentage. Parameters; • Command /N: Moves the objective file specified by the move source pathname to the move destination pathname. • Move source pathname - Specify a file that actually exists on the communication partner side and is to be moved. - Wild card specification cannot be used. - Double-byte characters can be used for directory names and file names. - For move source pathnames follow the naming rule of the OS on the communication partner side. • Move destination pathname - Specify the destination of the move on the communication partner side in full pathname. - If a file with the identical name exists on the destination side, an error code will be returned. - When specifying a directory, enter “\” as the terminator. - If a file name is specified, the moved file uses that file name. - If a directory with the specified pathname does not exist, a directly with the specified name will automatically be created. - Wild card specification cannot be used. - Double-byte characters can be used for directory names and file names. - For move destination pathnames follow the naming rule of the OS on the communication partner side. 7. Time transmission Specification method; /T Functions; • Transmits the system date and time of the user’s terminal to set date and time of the communication partner side. • The transmitted date and time will be the local date and time. • Depending on the conditions of the communication line, there may be a difference of several seconds. • This is valid for an HT-to-HT connection. 87 8. Idle start Start-up method; Only the /Y command can be specified. FLCE [/Y={[device],[baud rate],[mode]} [Script file name] Functions; • Assigns the right of request to the communication partner side, and operates in accordance with the function requested by the partner side. • To initiate the system in this mode, only the /Y command can be specified. (If another command is specified, the normal start-up mode, rather than the idle start-up mode, will be used. If a script file name is specified, this function will cause a parameter error and will terminate as an error.) • If /Y is specified, do not specify “H” for the mode parameter (otherwise, a parameter error occurs and the function is terminated as an error). • This function will be terminated when it receives a designation of termination, except when it is abnormally terminated. • If a script file name is specified, communication will be performed according to the contents of the script file that exists on the communication partner. • The specification of a script file is valid only when communicating with a PC. • If a script file name that does not exist on the communication partner is specified, an error code will be returned. (In the case of HT-to-HT communication, the script file will be ignored since it cannot be processed.) Parameter; Script file name .... Specify a script file name that actually exists on the communication partner side. Enclose the script file name in a pair of double quotation marks. 88 9. Describing a pathname • • • Always enclose the pathname in a pair of double quotation marks. Also, one pathname should not be more than a maximum of 256 characters, including the two double quotation marks. A two-byte character is counted as one character. Pathnames should be described in accordance with the naming rule of OS of the machine, in which the path to be specified is located. In the description of a pathname, drive symbols should conform to the following rules. 1. Describe the pathname on the terminal so that it begins with the root directory and without using a drive symbol letter. (The same rule also applies when the Upload/Download utility for the host PC specifies a file or directory path on the terminal.) 2. A drive symbol letter, if specified by the communication partner, will be ignored by FLCE on the terminal side (i.e. the pathname will be treated in the same way it is specified so as to begin with the root directory, and without using a drive symbol letter). 3. In order for a terminal to describe the path to a file or directory on the communication partner (PC, etc.) that operates an OS that requires a drive symbol letter, always place the drive symbol letter as specified. However, as an exception to the rule 2 above, let the drive symbol letter have the following effect, when the communication partner side specifies a device on the terminal and performs formatting or issues an instruction to get the disk information. These settings, however, can be modified by specifying the appropriate registry. Default setting Internal RAM → C: The start-up drive is set to C: Conforms to PC/AT machine specifications. CF card → D:, E: FlashDisk → F: 10. Specifying a non-existing file If the pathname of a file or directory that does not exist on the communication partner is specified, it will be processed as follows: Table 5.5 Communication partner Reception Deletion Move Transmission, Transmission (append) Windows95/Windows NT DOS A C B D Windows CE A C B D Description of the alphabets: A) If any one of the specified pathnames does not exist, an abnormal termination will result. (The actually existing files also will not be transmitted.) B) If the specified pathname does not exist, an abnormal termination will result. (In this case the transmission process is not executed.) C) If the specified pathnames contain a pathname that does not actually exist, that pathname will be ignored. (All the pathnames that actually exist will be successfully processed.) D) A new file(s) will be created. 89 11. Functions and displays Table 5.6 Order Function (command on protocol) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 File transmission File reception File append File or directory deletion File move or rename Directory creation Time setting Time request Message display Buzzer sound Fetch file information Set file information Fetch disk information Fetch session ID and system information Idle notification Designation of termination Display type Specified from Requested from FLCE communication partner C C C C C C A B A B - B A A - A - D - A - A - A - A Description of the alphabets as status in the table; A) Displays currently executed command or the one that issued the request. B) In addition to A, displays the file or directory currently processed in the user’s terminal. C) In addition to A, displays the file being transferred and the progress. D) Displays text message sent from the communication partner. 90 Remark Not necessary to display, since they are internal protocol commands. 12. Setting the registry By writing a value in the registry it is possible to modify the default values of communication environment, etc. Use the setup command (/Y) to specify the line or baud rate during normal use, and set the registry only if the default values need to be modified. Also, if modifying the assignment of drive symbol letters, create keys of each symbol letter and specify the pathname of the corresponding device. If the registry has been set, it continues to be valid until the setting is modified or the system is cold booted. Items (keys) that are not set in the registry or items (keys) that were incorrectly set will use their default values. Setup items • RS-232C baud rate • Specification of communication line (COM1 or IrDA) • Assignment of drive symbol letters C D E F • Location of the registry • Contents Key name Type BAUD DWORD DEVNM STRING DRIVE\A STRING DRIVE\B STRING DRIVE\C STRING --DRIVE\Z STRING 91 Default if no setting is made for the registry: 19,200 bps IrDA as default if no setting is made for the registry: Default if no setting is made for the registry: : \ (Object storage area of internal RAM) : \Storage Card\ (Storage Card) : \Storage Card2\( Storage Card2) : \FlashDisk\(NAND FLASH) : \HKEY_CURRENT_USER\Software\CASIO\FLCE\ Value Baud rate Communication line (I/O device) Path to a device that is assigned as Drive A. Path to a device that is assigned as Drive B. Path to a device that is assigned as Drive C. Path to a device that is assigned as Drive Z. 13. Termination code When the communication is closed, FLCE will return the termination code as described in Table 5.7. Upper-level programs should refer to this value and take appropriate follow-up action. The termination code will be returned as the return value of Winmain. Upper-level programs should refer to this return value with GetExitCodeProcess function. In the following table the category code (upper bytes) shows the error category, and the detail code (lower bytes) shows its error details. Table 5.7 List of termination codes Error Code Category Code 00h DCh to F5h Meaning Detail Code 00h Normal termination 00h Normal termination F6h 00h F7h 00h F8h 00h 01h 00h 02h 80h 02h 81h 02h 82h 02h 83h 02h 84h 0Fh 01h 0Fh 02h A0h 10h A0h 20h A0h 30h Cause Remedies Normal - The user station is ordered by the partner station to format Refer to Table 5.5 on page 89. drives ‘A’ to ‘Z’ (for information about each drive symbol letter refer to “9. Describing a pathname” on page 89. Normal termination The user station is ordered by the partner station to turn Turn OFF the power. OFF the power. Normal termination The user station is ordered by the partner station to Refer to Table 5.5 on page 89. perform resetting. Break termination Communication is forcibly terminated because the Break Resume operation as key on either the user station or partner station was required. pressed. Protocol error Data anomaly (Data error occurred in the communication Check for proper connection line.) of the communication route. File not found. A file that does not exist is specified. Check the specified file or directory. Current directory An attempt is made to delete the current directory. Check the objective directory deletion error to be deleted. File write error Writing to the file is not possible for some reason. Check if the file setting allows writing. File read error Reading the file is not possible for some reason. Check if the file setting allows reading. Read-only access error An attempt is made to overwrite or delete the read-only Specify another file name or file. cancel the read-only attribute. Parameter error Parameter specifying method is incorrect. Check how the parameter is described. Too long parameter Parameter is too long. Limit the parameter length to 255 characters or less. Communication port Other program uses COM1 or IrDA, or FLCE has Terminate other program that open error already been initiated. uses COM1 or IrDA. Line break error Either the cable is unplugged during communication or Check for proper cable connection and make sure the IrDA connection is broken (for example by that the terminal is properly dismounting the terminal from the Bridge Satellite mounted on the Bridge Cradle). Satellite Cradle. Connection wait Connection could not be established within one minute Check for proper cable timeout error after start-up. connection and make sure that IrDA is ready for communication. 92 14. Log file FLCE creates log files to keep communication logs. • Log file name Log file name is fixed to “FLCE.LOG”. This cannot be modified. To save a log file, change the file name. • Location A log file is created under the “\Windows\” directory. • Creation method - If a log file already exists, a new one will automatically be created. - Log data will not be appended to the existing log file. - If a log file cannot be created for some reason, it will not be created. - If the command parameters contain some errors, a log file will not be created. - Creation of a log file starts at the point in time when a connection trial is made to the communication partner. • Format This format consists of nine lines as shown below. Since with lines 2 to 4 the information obtained from the communication partner will be output, these lines will be outputted as blank lines to a log file on the HT-side, which runs in the emulated PC mode. Also, since one line must be less than 80 bytes long, if each file name in the 8th and 9th lines is longer than 65 bytes (15 bytes are used for the item name), characters on and after the 65th byte will be omitted for output. 1st line 2nd line 3rd line 4th line 5th line 6th line 7th line 8th line 9th line : Outputs the version information of FLCE.EXE. : Outputs the version information (1 byte) of the protocol. The initial version is “1”. : Outputs the communication partner machine code (maximum 3 bytes). AT ... IBM-PC AT compatible machine : Outputs the session ID information. This will be outputted as a hexadecimal number. (Ex. 0x0000) : Outputs the final event information. : Outputs the final phase information. : Outputs the completion status information. This will be outputted as a hexadecimal number. (Ex. 0x0000) : Outputs the final transmission file name. : Outputs the final reception file name. 15. Help If Start menu → Help menus are accessed in the Today screen or while executing an application, the Help file will be opened in the screen. 93 5.2.4 Contrast/Backlight Utility Contrast, backlight and auto-reduction of backlight intensity can be set up. Contrast The contrast can be set in 9 different gray scales. (Default = 5) Backlight For power supply source of how the terminal is powered by, either via Cradle/Battery charger or by installed battery pack, the backlight can be set as follows: Via Cradle/Battery charger : 9 steps (Default = 9) Battery powered : 9 steps (Default = 7) Auto dimmer can be set as follows: Battery powered : 8 steps. (Default = 3) Auto-reduction of backlight intensity The backlight intensity will automatically be reduced to conserve power if the system is in idle state and if no key or touchpanel operation is performed while the power is on. It is also possible to set whether the intensity is to be reduced (or turned OFF) and the time until it is reduced (or turned OFF) separately for each case when the system is powered via Cradle/Battery charger or when it is powered by the battery pack. 94 5.2.5 Automatic Setup Card slot Setup.exe or AutoRun.exe located under the given directory of memory card will be automatically executed when the terminal is reset or the memory card is inserted. This utility is an extra to allow automatic installation of application program from a storage device. The given directory: \Storage Card\CE\ARM (or \Storage Card2\CE\ARM) • The memory card driver will search in the memory card, for a given period of time (10 seconds) immediately after reset, for the setup file registered in the registry. And, if that file is found, it executes the program. [HKEY_LOCAL_MACHINE\Drivers\CASIO\UTIL\SETUP] "1"= “\Storage Card\CE\\ARM\\Setup.exe" "2"= “\Storage Card2\CE\\ARM\\Setup.exe" • Also, it will search for AutoRun.exe for a specified period (10 seconds) immediately after the memory card is inserted in the slot. And if that file is found, it executes the program. It is also valid when the memory card is replaced while the terminal power is off. [HKEY_LOCAL_MACHINE\Drivers\CASIO\UTIL\AUTORUN] "1"= “\Storage Card2\CE\\ARM\AutoRun.exe" "2"= “\Storage Card\CE\\ARM\AutoRun.exe" • These utilities can be disabled by erasing the above described keys. Setup program and automatic execution program • Since this utility is made to initiate Setup.exe each time the system is reset, take appropriate measures to prevent it from making a duplicate setup. Since, AutoRun.exe is also made to run each time a memory card is replaced, take appropriate measures not to initiate AutoRun.exe several times. • If both Setup.exe and AutoRun.exe exist at a reset, Setup.exe will be given a higher priority. • When both Slot 1 and Slot 2 have each memory card inserted, Slot 1 (PC card) will be recognized as the StorageCard at the time of reset. (Even when a card is inserted later in Slot 1 and the folder is named “StorageCard2”, it will be recognized as the StorageCard after reset. This is due to an OS’s restraints.) FlashDisk When the terminal is reset, the Flash installer will automatically execute Setup.exe under the given directory of the FlashDisk. This utility is an extra to allow a patch or application program contained in the FlashDisk to be installed. The given directory: \FlashDisk\CE\ARM • The Flash installer will sequentially search the FlashDisk for the setup file registered in the registry immediately after a reset is executed. And if that file is found, it executes the program. [HKEY_LOCAL_MACHINE\Drivers\CASIO\UTIL\FLSETUP] "1"= “\CE\ARM\Setup.exe" If the setup file is to be used from user program, a sequential search will be executed by adding, for example, the registry, as shown below. "2"= “\CE\ARM\UserAppSetup.exe" • These utilities can be disabled by erasing the above described keys. 95 Setup program and automatic execution program: Since this utility is made to initiate Setup.exe each time the system is reset, take appropriate measures not to perform a duplicate setup from the second time onwards. 5.2.6 Copy To Another Terminal This is a tool to easily create a child terminal. It copies the contents of a master terminal that has been properly set up onto a child terminal via IrDA interface without modification. Fig. 5.10 HTs copy tool The terminal (HT) copy tool (HTCopy.exe) is used to easily create a child terminal. To do this, simply copy the setup contents of the master terminal onto a target child terminal via the infrared interface. The following contents can be copied: • Files existing in RAM • Files existing on FlashDisk • Registry information (various setup information) • Database information (information contained in the Inbox, etc.) Move through Start → Program → Utility → Copy Device command sequence to start the session. Fig. 5.11 96 Fig. 5.12 Fig. 5.13 At the transmission-side terminal check the objective files and registries for transmission against the Transmission Setup dialog, which is invoked by tapping Start button. When Start button is tapped, transmission will start as soon as the transmission contents are successfully checked. The following contents can be set with the Transmission Setup dialog: : Files in RAM • RAM disk : Files in FlashDisk • FlashDisk : Files for the date and time • Date and time : The entire registry information (Reg.User and Reg.Display are also checked.) • Reg.ALL : User registry information • Reg.User : Other registry information • Reg.Display : Database such as Inbox, etc. • Database At the reception-side terminal, start reception by tapping Start button in the Reception Setup dialog. The menu item configuration is as follows: [File] - [Send] : Displays the transmission setup dialog. [File] - [Receive] : Displays the reception setup dialog. [File] - [Close] : Terminates the execution of the HT copy tool. 97 5.2.7 User Notification Message List The following table shows the list of messages to be issued from the system to the user application. Table 5.8 List of user notification messages Content Message Power-ON notification WM_POWERBROADCAST wPARAM PBT_APMRESUMESUSPEND IPARAM 0 Power-OFF notification (only when the Power OFF key is disabled.) Low main battery voltage warning notification Mounted on Satellite Cradle/dismounted notification Fn key ON/OFF notification WakeOnRing notification WM_POWERBROADCAST PBT_APMRESUMESUSPEND 0 WM_POWERBROADCAST PBT_APMBATTERYLOW 0 WM_USER+0x500 0: Dismounted / 1: Mounted 0 WM_USER+0x502 WM_USER+0x503 0: OFF / 1: ON 1 0 0 Trigger key pressed notification Key mode notification WM_USER+0x504 WM_USER+0x506 1 Key mode 0 0 5.2.8 Welcome Wizard The Welcome wizard function and user setup information installed in the conventional PPC can be skipped over. 5.2.9 Diagnosis This is the diagnosis program for the terminal hardware. The target of use is supposed to be the Production Department of a factory and Service Sections. 98 5.2.10 Browser This browser software uses the Internet Explorer 5.5 module from Microsoft. The supported security functions are Kerberos, TLS Ver. 1.0, SSL Ver. 2.0 and 3.0, and SGC. In addition, the installed JScript 5.5 conforms to the ECMA 262 language specifications (ECMA Script Edition 3). For detailed information about this module visit the Microsoft site at the following URL: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wceie55/htm/cerefInternetExplorer55.asp?frame= true The tool bar icons includes the following: : Returns to the previous page : Advances to the next page : Reloads the current page to update it : Displays the home page : Invokes My Favorites menu • Adds to or edits My Favorites • Displays the favorite page Fig. 5.14 The menu command configuration is as follows: [Menu] - [Open] : Displays an HTML or JPEG file [Menu] - [Save As] : Saves in the HTML, TEXT, GIF, or BMP format. [Menu] - [Edit] : Edits text on the page [Menu] - [Adjust to screen] : Switches from the reduced page size [Menu] - [Address bar] : Switches the address in the address bar [Menu] - [Character size] : Specifies the size of the displayed character [Menu] - [Specify language] : Specifies the language to be displayed [Menu] - [History] : Moves to the specified page in the history list [Menu] - [Search page] : Searches for a piece of text on the page [Menu] - [Option] : Sets options such as those for the security function, etc. [Menu] - [Property] : Displays the property of the page [Menu] - [Exit] : Exits the present browser 99 5.2.11 Mailer This mailing software uses the Microsoft Inbox module and can be stated up by tapping bmail icon in Windows folder. It consists of three units - Main, View, and Prepare screens - to allow the user to receive, send, or transfer mail, reply to mail, and perform transmission with an attached file(s). Fig. 5.15 The Main screen displays a list of mail contained in the folder specified by the user. The menu command configuration is as follows: [New] : Creates a new piece of mail (moves to the preparation screen). : Edits the folder content. [Tool] - [Folder Management] [Tool] - [Void the removed item] : Removes the mail in Removed Item folder. [Tool] - [Edit MyNotebook] : Edits the sample text/subject/address. [Tool] - [State] : Displays the number of pieces of mail. [Tool] - [Option] : Sets the security environment and mail addresses. [Service] - [Connection] : Connects to the main server. [Service] - [New Service] : Sets the destination of the connection. [Service] - [Clear All] : Deletes the selected text. The tool bar icons include the following: [Connect] : Connects to the mail server through the specified service. [Send/Receive Mail] : Sends or receives a piece of mail. 100 The View screen will display the header part (sender/address/subject/date and time) and main text of the mail specified in the Main screen. The menu command configuration is as follows: [New] : Creates a new piece of mail (moves to Prepare screen) [Edit] - [Make it un-browsed] : Restores the un-browsed state [Edit] - [Move to folder] : Moves to the specified folder [Edit] - [Language] : Specifies the display language [Edit] - [Select All] : Selects all the text on the screen [Edit] - [Copy] : Copies the selected text [Edit] - [Edit MyNotebook] : Edits the sample text/subject/address. The tool bar icons include the following: [Delete] : Moves the displayed mail to the Removed item folder [Transfer/Reply] : Transfers, replies, or replies to all for the displayed mail [Previous] : Displays the prior piece of mail [Next] : Displays the following piece of mail Fig. 5.16 The Prepare screen is used to create a piece of mail. The menu command configuration is as follows: [New] : Creates a new piece of mail (moves to Prepare screen) [Edit] - [Cut] : Cuts the selected text [Edit] - [Copy] : Copies the selected text [Edit] - [Paste] : Pastes the text from the clipboard at the current cursor position [Edit] - [Clear] : Removes the selected text [Edit] - [Select All] : Selects all the text on the screen [Edit] - [Edit MyNotebook] : Edits the sample text/subject/address [Edit] - [Append File] : Specifies the file to be appended [Edit] - [Language] : Specifies the display language [Edit] - [Cancel Message] : Deletes the mail being prepared The tool bar icons include the following: [Send Mail] : Sends the created mail [MyNotebook] : Selects the sample text/subject/address With MyNotebook the user can register model text, subjects, and addresses that have a high frequency of use in advance so that an appropriate one can be retrieved when creating a new piece of mail. 101 5.3 Casio Original Application Programs (2) In this chapter, the Casio original application programs available to the terminal will be explained. The application programs in this chapter are not preinstalled in the ROM. You need to install each one of them as required. 5.3.1 FCHKCE This software is not the ones pre-installed in the terminal. To use the available functions the software must be installed in the terminal prior to use. The software is a file check utility to check if file copied from PC, etc., has been properly installed in the target terminal. It has the following functions. Function 1. Creating a list file • If a file name to be transferred from the terminal is specified, a list file will be created from the list of transferred files and checksum data, which is calculated for all the files to be transferred. Checksum data of the list file will also be created. • The name of a list file created with this function is fixed to FCHK.LOG. • The return value of 0 (zero) will be set as the program termination code if the creation of a list file is successful, otherwise a return value other than 0 will be set as the abnormal termination code. At this point in time a history file is also created (FCHK.LOG is created under [FCHK.LOG File output Directory name]). • This history file automatically records the operations used for creating the list file. However, the user must also copy (transfer) the list file created with this function to the partner station (child terminal) at file transfer (file copy). • Information items to be contained in the list file include: - File size - Date and time of update - Transfer (copy) destination path (file) name - Number of transferred (copied) files - Checksum data of all files to be transferred (copied) - Checksum data of the list file • • The checksum data of all files to be transferred (copied) should be the result of exclusively ORing every pair of consecutive words of data of all files to be transferred (copied). The checksum data of the list file should be a value, which produces zero if it is added to the result of summing every two consecutive words of list file contents. The checksum data will be outputted for the list file as follows: FILE_CHECKSUM=HHHHLLLL( HHHH: HIGH-WORD / LLLL: LOW-WORD ) LIST_CHECKSUM=HHHHLLLL( HHHH: HIGH-WORD / LLLL: LOW-WORD ) The existing list file (LOG file) will be deleted if an error occurs during the creation of the list file with this function. However, the existing list file will not be deleted due to errors that may occur during command parameter analysis. 102 Comparison of list files • File information of a file transferred from the partner station (parent terminal) and the contents of a list file (FCHK.LOG) are compared, the checksum data of the list file is calculated and compared, and the checksum data of all the transferred (copied) files is calculated and then compared with the checksum data of the list file. • If the comparison result is correct, this function will have a return value of 0 (zero) as the program termination code, and will be abnormally terminated if the return value is a value other than zero. Also, at this point in time, the history file is created (FCHKG.HIS is created in <FCHL.LOG log file pass name>). The history file records the operations when the copied file and file list are compared. • File information to be compared includes: - File size - Date and time of update - Transfer (copy) destination path (file) name - Number of transferred (copied) files - Checksum data of all files to be transferred (copied) - Checksum data of the list file • The checksum data of all files to be transferred (copied) should be the result of exclusively ORing each pair of consecutive words of data of all files to be transferred (copied). The checksum data of the list file should be a value, which produces zero if it is added with the result of summing each pair of consecutive words of list file contents. Function details FCHKCE /G Specify the file name to be transferred (copied) from the terminal, and create a list file from the list of transferred (copied) file names and checksum data, which is calculated for the checksum of all the files to be transferred. The number of target files for which logs must be taken is 65,000. The maximum file size of a script file is 32,000 bytes. • Format FCHKCE /G [</Option>] <file name list or Script file name> <Destination directory name> [<FCHK.LOG File output Directory name>] (Parameters enclosed in square brackets can be omitted.) 103 • Parameters Option /SC: Specification of script file name The file that is specified by the parameter is the script file, with which FCHKCE.EXE analyzes the script file name to be transferred for creating a list file. /R: Specification of recursive call All files under the directory having a pathname specified by the parameter become the target of list file creation. If the specified directory is followed by sub-directories, these directory names are added for creating the list file. The depth of the directory should not be more than a maximum of 16 levels. If this option is not specified, only files specified by the file name list become the target of list creation. /AO: Append output If the FCHK.LOG file exists in the directory specified by [FCHK.LOG File output Directory name], a logging file will be additionally created. If the above mentioned file does not exist, a new FCHK.LOG file will be created. (However, the function will be abnormally terminated if the specified directory does not exist.) With append output, another list file is simply added to the end of the existing list file. In order to modify part of the existing file contents, do not use append output, rather, create another list file. <File name list or Script file name > Describe the list of file names to be transferred (copied). To do this, specify files that exist on the transmission (copy) source side. When specifying multiple transmission (copy) source file names, concatenate pathnames after inserting a one-byte space between two consecutive pathnames. Wild card specification can be applied to file names. When /SC has been specified as the option, specify the pathname to the location where the script file exists. <Destination directory name> Specify the directory name of the destination of transmission (copy). For the directory name, observe the naming rule of the OS in the destination of transmission (copy). The terminator of the directory name should be “\”. [FCHK.LOG File output Directory name] Specify the destination directory name of the FCHL.LOG log file. For the directory name, observe the naming rule of the OS in the user’s terminal. The terminator of directory name should be “\”. If this parameter specification is omitted, the FCHL.LOG log file will be created in the current directory. • Return value Return codes (See Table 5.9 “Error messages/Return codes”.) 104 FCHKCE /C File information about a file transferred (copied) from the partner station (parent terminal) and the contents of a list file (FCHK.LOG) are compared with each other, the checksum data of the list file is calculated and compared, and the checksum data of all the transferred (copied) files is calculated, then the result is compared with the checksum data of the list file. A maximum of 65,000 files can be compared. • • • Format FCHKCE /C [</Option>] <FCHK.LOG file pass name> (Parameters enclosed by a pair of square brackets can be omitted.) Parameters Option /D: Does not compare the date of update. This is used to prevent comparison of the date of update, since it may be modified to the current date of the terminal if a file transfer is made with the terminal’s Explorer. (However, the date of update will not be modified by copying with the FLCE/PC card.) <FCHK.LOG file pass name> Specify the pathname to the location of the list file (FCHK.LOG) using the naming rule of the OS. Return value Return codes (See Table 5.9 “Error messages/Return codes”.) Restraints • Due to WindowsCE specifications, some files in \Windows\ folder cannot be copied. Accordingly, they cannot be written in the list file. 105 Error messages/Return codes Table 5.9 Code Message 00 Creation of list file completed. List file contents consistent with the real data. 01 Specified pathname not found Meaning Normally terminated. Remedies No problem. File name specified during list file creation does not exist. Specify a file name/pathname that actually exists. Execute the program again. 02 List file creation error 03 FCHK.LOG not found 04 09 List file contents inconsistent with the real data (with respect to pathname). List file contents inconsistent with the real data (regarding size). List file contents inconsistent with the real data (with respect to date and time). List file contents inconsistent with the real data (with respect to the checksum of all files). List file contents inconsistent with the real data (with respect to the checksum of list file). Script file not found 0A Script file syntax error 0B List file read error 0C 0D Illegal option Parameter error. 10 Script file read error. 11 Exceeds the limit size of script file. Exceeds the limit number of logging files. An error occurred during the process of script file read. The specified script file size is 32,001 bytes or more. The number of target logging files is 65,001 files or more. The specified output pathname of the list file is not found. The specified output destination pathname of the FCHK.LOG file is not found. 05 06 07 08 12 13 Physical error occurred during the creation of a list file. List file (FCHK.LOG) could not be found in the list file check. Collation with the list file resulted in an inconsistency with the real data (with respect to the pathname). Collation with the list file resulted in an inconsistency with the real data (with respect to size). Collation with the list file resulted in an inconsistency with the real data (with respect to date and time). Collation with the list file resulted in an inconsistency with the real data (with respect to the checksum of all files). Collation with the list file resulted in an inconsistency with the real data (with respect to the checksum of list file). Script file specified by the file name is not found. Specified script file has a syntax error. Physical error occurred during read of list file (FCHK.LOG) for the list file check. The start-up option is illegal. Specified parameter contains an error. 106 Specify the directory where the list file is located. Execute the file check utility again from the beginning. Execute the file check utility again from the beginning. Execute the file check utility again from the beginning. Execute the file check utility again from the beginning. Execute the file check utility again from the beginning. Specify a directory where the script file exists. Rewrite the script file correctly. Execute the program again. Review the start-up option. Review the specified parameter. Execute the program again. Reduce the script file size to 32,000 bytes or less. Reduce the number of target logging files to 65,000 or less. Specify a directory that actually exists. 5.3.2 Wireless LAN Wireless LAN Setup Tool Software configuration Wireless LAN driver Function setup tool Power supply survey tool : Supplied as an installed driver in ROM. : Standard setup in the Control Panel can be used without specifically modifying the tools provided m in setting various functions for Wireless LAN. : This corresponds to the “Built-in Wireless LAN Power Supply” icon in the Control Panel. Use this tool to select whether the Wireless LAN is used and set the power supply mode applied when “Use” is selected. Fig. 5.18 Fig. 5.17 107 5.3.3 Bluetooth Setup Tool The Bluetooth setup tool is a utility used to set up and establish the connection with the Bluetooth device. Note, in the following explanations, that the screens are only samples. Fig. 5.19 The following menu items are available with the Bluetooth setup tool: [File] – [Exit] : Exiting the application. [Device] – [Properties] : Displaying the specified Bluetooth device property. [Device] – [Trust This Device] : Bonding with the specified Bluetooth device. [Device] – [Send File] : File transmission to the specified Bluetooth device. [Device] – [Exchange vCards] : Exchanging name cards with the specified Bluetooth device. [Device] – [Find Devices] : Inquiry for the Bluetooth device. [Device] – [Add Device] : Adding the Bluetooth device. [Settings] – [Appearance] : Setting the Bluetooth device on the terminal. [Settings] – [Security] : Setting the security of Bluetooth device on the terminal. [Settings] – [Monitor] : Setting the Bluetooth setup tool. [Settings] – [Object Push] : Setting the Object Push profile. [Settings] – [View] : Setting the icon display of the Bluetooth devices. [Settings] – [Arrange Icons] : Setting the icon alignment of the Bluetooth devices. [Settings] – [Show Tree View] : Setting whether to use a tree view for the Bluetooth devices. [Help] – [About] : Displaying the version information. 108 Executing an inquiry for the Bluetooth device If Find Devices command is selected from Device menu, the inquiry of the Bluetooth device will begin (see Fig. 5.20). After this inquiry the identified Bluetooth device information will be acquired sequentially (see Fig. 5.21). This inquiry can be executed at the initiation of an application. Fig. 5.20 Fig. 5.21 Adding the Bluetooth device If Add Device command is selected from Device menu, the Bluetooth address input window will appear. Then, if you enter the Bluetooth address and tap OK button, the Bluetooth device that could not be found at the previous inquiry can be added to the list. Fig. 5.22 109 Getting Bluetooth device information. If Properties command is selected from Device menu after selecting one of the Bluetooth device icons displayed on the screen, the properties of that Bluetooth device will be displayed. The following properties are included: - Bluetooth device name - Bluetooth address - Bluetooth device type By tapping Show Services button, it is possible to fetch the service information of the Bluetooth device. Fig. 5.23 110 Bonding with the specified Bluetooth device Select one of the Bluetooth device icons displayed on the screen and select Trust This Device command from Device menu. After a moment the Pass Key input request screen will be displayed. With this screen enter an optional Pass Key using a maximum of 16 characters. Enter the same Pass Key also on the Bluetooth device at the communication partner which is the target of bonding. If the bonding is successful, the user will not be requested to enter the Pass Key in subsequent connection and communication with the partner Bluetooth device that has been bonded. Fig. 5.24 Precautions Depending on the Bluetooth device at the communication partner side, the user may not be permitted to set more than 4 digits for the Pass Key. For more information refer to the manual accompanied with the Bluetooth device to be communicated with. 111 File transmission with the Object Push profile. If Send File command is selected from Device menu after selecting one of the Bluetooth device icons displayed on the screen, the file selection screen will appear (see 5.25). If you tap OK button after selecting a file, the file transmission in progress window will appear as the file transmission begins (see 5.26). Fig. 5.25 Fig. 5.26 Precautions Depending on the Bluetooth device at the communication partner side, the user may be permitted to transfer only files with a particular extension (.vcf, etc.). For more information refer to the manual accompanied with the Bluetooth device to be communicated with. 112 Various settings on the terminal Make the various settings for the Bluetooth device on the terminal. The following tabs can be selected from Settings menu. Appearance : Setting the Bluetooth device name and device type. Security : Setting the security level of the Bluetooth device. Monitor : Setting the Bluetooth Setup Tool operations. Object Push : Setting the Inbox and vCard data of the Object Push profile. Even after any of the setup screens is displayed, it is possible to switch to other setup screen by selecting an appropriate tab. Fig. 5.27 Fig. 5.28 Fig. 5.29 Fig. 5.30 113 Setting the screen display Set up how the Bluetooth Setup Tool screen is to look. The following tabs can be selected from Settings menu. : Setting the Bluetooth device icon display. View Choose one from Large Icons/Small Icons/List/Detail. : Setting the alignment of Bluetooth device icons. Arrange Icons : Choose one from by Name/by Address/by Type. Show Tree View : Setting whether the Bluetooth devices are viewed as a tree structure. Fig. 5.31 Screen where the icon display manner is set to Detail. Fig. 5.32 Screen where the tree display is not employed. Displaying the version information Selecting About from Help menu displays the version information in the window. Fig. 5.33 114 Quitting the application If Exit command is selected from File menu, a screen to confirm the termination of the application will appear. Tap Yes button to quit the application as appropriate (see Fig. 5.34). If you try to quit the application while the hourglass is being displayed in the window, and error message will appear and the application will not be terminated (see Fig. 5.35). Fig. 5.34 Fig. 5.35 115 Screen for Bluetooth serial connection When either an attempt to commence communication through the Bluetooth serial port, establish a dial-up connection with the Bluetooth cellular phone, or establish the Bluetooth LAN connection, the corresponding screen to select the Bluetooth device for each case will be displayed. So, to create the connection with the Bluetooth equipment, select one of the Bluetooth devices displayed in the list and tap Connect button. Otherwise, to display the latest list of Bluetooth devices, tap Refresh button. Even if the desired Bluetooth device to be connected is not included in the list, it is still possible to connect with the specified Bluetooth device by tapping Enter Address button, then directly enter the Bluetooth address. Fig. 5.36 Changing the SR mode value The registry is; Key : HKEY_LOCAL_MACHINE\Drivers\BuiltIn\CBTStack Value : SRmode (DWORD) Setting value and SR mode; If setting value (DWORD) is 0 → R0 mode If setting value (DWORD) is 1 → R1 mode If setting value (DWORD) is 2 → R2 mode Notes: • If the registry has not been set or an illegal value has been set in the registry, the SR mode will be set to “R0”. • A change in the registry will become effective after a reset is performed on the terminal. 116 5.3.4 LMWIN (Host Utility) The upload/download utility is executed on HOST PC, and provides the following functions to the handheld terminals connected via the Bridge Satellite Cradle. • File transmission/File reception • File append transmission/File append reception • Sounding the buzzer. • Setting the date and time. • File delete/move/rename • Fetch disk information/fetch file information/set file information • Terminating the session. • Executing a child process. • Displaying a character string. This utility (Version 5.10 or later) will run under Windows NT 4.0. 117 5.3.5 C-MOS Imager Applications This CASIO original applications provide the following three performances using the C-MOS Imager integrated in the terminal. • • • Application for C-MOS Imager (“TDRead.exe”) Application for C-MOS Imager Setting Tool (“TDSet.exe”) Application for C-MOS Imager demonstration (“TDDemo.exe”) Table 5.10 Major performances by application Application TDRead.exe TDSet.exe TDDemo.exe Reading symbologies Yes (Note 1) No Yes Setting the parameters No Yes No Displaying images and save No No (Note 2) Capturing signatures No No (Note 3) Streaming No No Yes Notes: 1. A result of reading symbology will be output to the location where the curette is located. 2. An image will be saved in the fixed size to the file and folder both with predefined names. 3. The capturing a signature will be operable only with the fixed slip for the demonstration. 4. All the applications in the table above have been preinstalled in each terminal. Source code of TDDemo.exe will be available at the CASIO web site. 118 Application for C-MOS Imager This is an application program made available to the user of the terminal that enables reading 1D or 2D symbology with the C-MOS Imager and outputting it in text data format. The application program is resident in the terminal and intended for outputting a result of the reading to user’s application or to the browser. Therefore, the user should not use it if he creates his own application to handle the C-MOS Imager. The outputting is carried out by copying the data onto clipboard and then issuing a keyboard event generated by pressing the Control key + “v” key. If you application cannot perform pasting data from the clipboard by operating the keys described above, the data read in this demonstration program cannot be correctly handled by your application. • 1. 2. Operating the demonstration Invoke the application. TDRead icon will appear in the task tray as shown in Fig. 5.37. Fig. 5.37 3. 4. Invoke a user’s application program. In this explanation, “Inbox” is assumed to be the user’s application. The reading on a symbol will start by pressing the Trigger key. It will terminate when the preset time set up with the Setup Tool (“TDSet.exe”) elapses irrespective of either the Trigger key is still being pressed down or it has been released. The data read with the C-MOS Imager will output to the location where the carrot is located. 119 Fig. 5.38 5. Tap the icon in the task tray to display the menu. The part of the parameters set with Setup Tool will appear as shown in Fig. 5.39. For detailed the settings, refer to Application for C-MOS Imager Setting Tool. Fig. 5.39 120 Descriptions about each menu in Fig. 5.39 are as follows. Table 5.11 Menu *** msec Add LED Buzzer Normal Read Count Default Close TDRead 6. Description A time period in millisecond of the timeout to terminate the reading is indicated. Characters to be appended and output after the data are displayed. A complete indication with the LED after reading a symbol has been completed is set enabled or disabled. A complete indication with the buzzer after reading a symbol has been completed is set enabled or disabled. A read mode either “Normal” or “Multi-step” or “Package” is selected. A delimiter character is indicated in ( ) for the “Package” mode. The number of steps to read symbols in the Continuous read mode is indicated. It defines how many symbols are to be read in the mode while the Trigger key is being continuously pressed down. A mode of the reading either “Outdoor” or “Indoor”, etc. is indicated. Exits the application. Select Close TDRead menu to exit the application. Note: The application, TDRead.exe, cannot run concurrently with the other C-MOS Imager related applications, TDSet.exe and TDDemo.exe. Be sure to close these applications if running before invoking TDRead.exe application. 121 Application for C-MOS Imager Setup Tool This tool allows the user to change the parameters and operating modes required for reading 1D and 2D symbologies. The changed parameters and the modes are saved in ini file and become effective automatically when the TDRead application invokes. The parameters and modes to be saved are; - Readable 1D and 2D symbologies - Enable/Disable on reading symbologies - Number of minimum and maximum digits of symbology - Check digit calculation - Output format - Operation parameters - Decode centering mode - LED illumination adjustment (Aiming LED, illumination LED) - Scanning mode - Print density adjustment • 1. 2. 3. Setting the parameters Invoke the application. Select an appropriate tab so that you can change the parameters in that tab. Selecting 1D tab (or 2D tab) allows you to change and set up the parameters for reading 1D symbologies (or 2D symbologies). The parameters with a check mark enable the respective symbologies to be read. Or, removing the check mark disables the symbology not to be read. See Fig. 5.40. Fig. 5.40 122 4. Select Post tab to set up the parameters for reading postal symbologies. The parameters with a check mark enable the respective symbologies to be read. Or, removing the check mark disables the symbology not to be read. Fig. 5.41 5. Select Option tab to set up the detailed parameters for reading the symbology. First, select a symbology in the comb list box that you wish to read. See Fig. 5.42. Fig. 5.42 123 The major setting items in the tab are; : With a check mark, it is possible to read the symbology selected in the comb box. Enable : A symbology that you wish to read can be selected. Comb box : Species the effective range of reading the selected symbology, the pull-down menu Digit Range box on the left is for minimum number of digits and the box on the right is for maximum number of digits. A symbol of the selected symbology meeting these limitations can only be scanned and decoded. 6. Select OCR tab to set up the parameters for reading OCR fonts. Fig. 5.43 The setting items in the tab are; : Selects an OCR font from the listed fonts below that you wish to set up for reading. Only one Font kind can be selected at a time. OCR A OCR B OCR Money (The OCR font printed on US dollar bills) : Selects a direction, either in vertical or in horizontal, of the target OCR font to be read. Direction Template, Group G, Group H, Check Sum : Changes the setting of each template (syntax of the OCR font). : Specifies the syntax of the target OCR font in character string. The number of characters in Template one string that is specified is up to 49 and the number of templates can be specified concurrently is up to 10 by delimiting each template with “t”. : Specifies a character specified with the character set in the template “g” that consists of up to Group G 49 characters. : Specifies a character specified with the character set in the template “h” that consists of up to Group H 49 characters. Check Sum : Specifies check sum in character string that consists of up to 49 characters. These parameters setting are necessary to avoid a misreading of OCR font. mod 10, mod 36 : If a check is made in the check box of Check Sum, these buttons become operable to set up the Check Sum. 124 mod 10 mod 36 a to BS a c d e l r t g h BS ISBN : Enter “0123456789” and set it to the mod 10 check sum. : Enter “”0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ” and set it to the mod 36 check sum. : These characters are used as keyboard to enter a template. Pressing a button will enter the corresponded character in the template box. Each alphabet in the template has a specific meaning below. : Alphabets and numeric Represents one in “0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ” characters. : Check character Specifies the location where the check sum calculation takes place. : Numeric Represents one in “0123456789”. : Alphabets, numeric and symbols OCR A : “0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ()<>/\+-*$” OCR B : “0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ()<>^+-*$” OCR Money : “0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ” : Alphabet Represents one in “ABCDEFGHIJKLMNOPQRSTUVWXYZ”. : Specifies the line change location for character string that consists of multiple lines. : Species the delimiter location to delimit between two templates in case of specifying multiple templates. : Specifies the location of the user specified character (Group G). : Specifies the location of the user specified character (Group H) : Enters a back space. : Sets up automatically a template to read ISBN symbology available in Japan. Example 1; Reads only a character string consisted of 8 numerals lined straight. Template : dddddddd 37680981 Example 2; Reads only a character string consisted of a specific character at specific location. Template : dddABCddd For example, the following shows a character string consisted of three numerals, “ABC” and three numerals lined straight. 551ABC983 Example 3; Reads only character string consisted of a space. Template : ddd ABC ddd For example, the following shows a character string consisted of three numerals, a space, “ABC”, a space, and three numerals lined straight. 551 ABC 983 125 Example 4; Reads only character string consisted of multiple templates. Template : ddddddddtddddlldd For example, the following shows a character string consisted of multiple templates. The multiple templates consist of 8 numerals lined straight, 4 numerals, two alphabets, and two numerals delimited by “t”. 99028650 or 9902XZ50 Example 5; Reads only character string consisted of multiple templates. Each template has a specific character at specific location. Group G : ABC Template : ddddddggg For example, the following shows multiple templates. Each template consists of 6 numerals lined straight and A or B or C lined at the “g” specified location. Using the user definitions (Group G, Group H), it is possible to specify multiple specific characters at the specified locations. 654321ABC or 654321BAC or 654321CCC Example 6; Reads only character string consisted of multiple lines. Template : ddddddddrllllllllrlllldddd For example, the following shows a character string consisted of multiple templates in multiple lines. Line change is made by specifying “r”. The first template consists of 8 numerals lined straight. The second one consists of 8 alphabets lined straight. The third one consists of 4 alphabets and 4 numerals lined straight. 12345678 ABCDEFGH ABCD1234 Example 7; Reads character string using check sum calculation. Template : dddddddc Check Sum : 0123456789 (mod10 check sum) For example, the following shows reading will become possible only if a calculated result meets the equation below. “s” assumes the sum of 7 “d” at the template above. (numeral at “c” location in the template) = 10 - (remainder of “s” /10) (10 means “mod 10”.) 12345672 126 7. Select Decode tab to set up the decoding mode for reading a symbol. See Fig. 5.44. Fig. 5.44 The setting items in the tab are; : Specifies the intensity in the range between 1 and 7 for target printed symbol. Setting Print Weight the value higher will improve reading a symbol printed in dark color, or lower will improve reading a symbol printed in pale color. : Specifies the area to set up reading valid. If a check is made in the box, the C-MOS Centering Mode Imager will read only symbols located within the specified area with Top, Bottom, Left and Right parameters, and not read other symbols out side of the specified area. Top, Bottom, Left, Right : Specifies the area to set up reading valid with these four parameters. Each value to set the area maximum is, Top → 0, Bottom → 479, Left → 0, and Right → 639. 127 8. Select Exposure/LED tab to set up the scan mode and the intensity of LED. Fig. 5.45 The setting items in the tab are; Scan Mode : Selects a scanning mode in pull-down menu. This mode consists of the exposure parameter and the LED intensity parameter which should be adjusted according to sunlight to set up optimum scanning performance. Change the parameters to suit the surrounding condition. Table 5.12 Pull-down menu Default Indoor (Near the window) Indoor Warehouse User Setting Description Sets up the default scan mode. Sets up the optimum scan mode under the brightness near by window. Sets up the optimum scan mode under the brightness in room. Sets up the optimum scan mode under the brightness in warehouse. Sets up the default scan mode. This mode only can set up the intensity of the illumination LED. Site references described for each parameter above are just for reference. They do not guarantee you the scanning performance with one of the scanning modes set up by following the explanation on this page. LED Intensity : Sets up the intensity of the illumination LED. Table 5.13 Aimer LED Illumination LED Sets up the intensity of Aimer LED in a value between 0 and 100 percent. Sets up the intensity of Illumination LED in a value between 0 and 100 percent. Unless the scan mode has been set to the manual mode, the fixed value will be set in this parameter. 128 9. Select Multi Step tab to set up the Multi-step mode. Fig. 5.46 The setting items in the tab are; : Sets up a decoding mode in this application. Select Decode Mode : Normal mode. Normal Mode : Reads symbols continuously while the Trigger key is being pressed down and Multi Step Mode outputs a result every time reading one symbol is complete. : Reads symbols continuously while the Trigger key is being pressed down and Package Mode outputs a result of them after all the readings are complete. The output is not made either if the Trigger key is released before readings for the specified number of symbols are complete, or if the specified timeout has elapsed. : Sets up the number of symbols to be read for the Multi-step and Package Read Count modes. : Sets up decoding result and character of the delimiter for decoding results in Separator output message for the Package mode. 129 10. Select System tab to set up the TDRead.exe application and a method to invoke the system. Fig. 5.47 The setting items in the tab are; : Sets up the Timeout for reading symbol. Reading will terminate either if the Timeout Trigger key is released or if the Timeout elapses while scanning continues. : Specifies a character to be appended subsequent the output result. Add Suffix : Sets up the notification to be made if reading a symbol is complete. Indicator : Sets up the notification to be made with the LED. LED : Sets up the notification to be made with the buzzer. Buzzer Power up device with trigger key : Sets up the Trigger key to turn on the power. With a check mark in the box, the power on the terminal can be turned on when one of the Trigger keys is pressed down. 130 11. Select About tab to indicate information about versions of the application and the library. Fig. 5.48 12. Tap OK button at upper-right corner to close the application. All the settings will be saved in TDSet.ini file of FlashDisk\CASIO. 13. Or, tap X button to close the application if you do not wish to save the settings. 131 Application for C-MOS Imager demonstration This application demonstrates the performances of reading 1D and 2D symbologies with the C-MOS Imager. 1. Invokes the application by accessing the menus in order of Start → Programs → Utility Scanner → Demo. • 1. 2. Reading 2D symbologies Select Read Symbol in File menu. Press the Trigger key to read a symbol. A result of the reading, symbology and the number of digits are displayed in the window. All the symbologies except OCR B and OCR Money symbologies can be read in this demonstration. Multiple symbols can be read at the same if Number of Symbols in the window is specified with a numeral between 1 and 9. Fig. 5.49 132 • 1. 2. 3. 4. Capture image Select the menus in order of File → Capture to set the terminal in the capture mode. Press the Trigger key to capture an image. The size of an image is 640 x 480 dots and the size of window in which the captured image appears is 240 x 160 dots. Select the menus in order of File → Capture Bitmap to set the terminal in the capture/storage mode. By pressing the Trigger key, an image is captured, displayed in the window and then saved in the size of 320 x 240 dots to the bitmap file located at “My Documents\TDDemo\Picture**.bmp”. ** represent a numeral. Fig. 5.50 • 1. 2. 3. Streaming Select the menus in order of File → Streaming to set the terminal in the streaming mode. Press the Trigger key to capture images continuously. The size of images captured is 640 x 480 dots and the size of window in which the captured images appear is 160 x 120 dots. To terminate the streaming mode, press the Trigger key again. Fig. 5.51 133 • 1. 2. Capturing signature Select the menus in order of File → Sign Capture to set the terminal in the sign capture mode. Press the Trigger key to capture the signature and the symbol both printed on the demonstration slip and display them on the screen as shown in Fig. 5.52. Fig. 5.52 134 Specifications of the demonstration slip 11 mm 22 mm The sample symbol The area for signature Fig. 5.53 The resolution of the symbol is 0.33 mm and the aspect ratio (the ratio of horizontal bar : vertical bar) is 30. Any a pair of signature and symbol can be captured in the TDDemo.exe application as long as the relative position of the signature and the symbol meets the specifications in Fig. 5.53. 135 • 1. 2. Version information Select the menus in order of Help → About to display the version of this application. Tap X button at upper right corner in the screen to exit the demonstration. Fig. 5.54 136 6. Security 6.1 Security Setup Features The terminal supports the following features to enhance the security performance. • • • • Setting/reading individual IDs CASIO will provide a dedicated tool to read the ID written in the given Flash ROM at the factory. Setting/reading sales representative IDs CASIO will provide a dedicated tool to write sales representative IDs for preventing illegal use of an application and an API to read out the ID. Support of VPN VirtualPrivateNetwork (PPTP) function will be supported. Support of WEP The encryption function for send/receive data operating under Wireless LAN environment will be supported by the driver that the Wireless LAN card manufacturer provides. 6.2 Copy Protect For Distributor’s Software CASIO will provide a dedicated tool for writing a distributor code in the Flash ROM area as well as an API to access the area. • With this tool write a distributor code in Flash ROM area. • With this API create a dedicated installer that contains the check function of the distributor code. 137 7. Development Environment 7.1 Development Environment With Microsoft Tools Table 7.1 • • • • • • • Development platform Development language Microsoft Windows 2000 (SP2 or later release) Microsoft Windows XP Microsoft VisualStudio.NET 2003 EmbeddedVisual C++ 4.0+SP1 SDK for DT-X10 series CASIO LIB (support library) C-MOS Imager SDK for DT-X10 series System configuration PC LAN LAN card ハブ USB 4 Fig. 7.1 USB/RS-232C Target Emulation on PC Use the WCE emulator on a PC to build a user program and to confirm its operation in the same environment. Most of the debugging work can be performed in this emulation environment. Remote debugging Transfer the created application program onto an actual terminal and debug the program remotely from the PC. 138 Confirming operations on the actual terminal Use the integration environment to transfer the created program onto an actual terminal, then confirm program operation on it. Editing the source code Editing the resources Compile/link with WCE emulator Emulation debugging Compile/link with ArmV4T Debug Transmission of debugged modules Remote tool/Remote debugger Execution of debugging Compile/link with ARMV4T Release Transmission of debugged modules Execution PC side Terminal side Fig. 7.2 139 7.2 Local Fonts Using Visual Studio .NET 2003, your local fonts can be displayed on the display of the terminal while an application program is running. This chapter describes how to display your own local fonts. Fig. 7.3 shows a screen shot of Microsoft Visual Basic .NET under the OS of Japanese version running on PC. The form on left side of the screen is designed in “Japanese MS UI Gothic font”. If you deploy this application software as is to the terminal from PC, it will erratically appear on the display as shown in Fig. 7.4. This is because the terminal does not have the “MS UI Gothic font” file implemented. Fig. 7.3 Fonts appeared erratically Fig. 7.4 140 1. In order to make the terminal display your local fonts, copy a font file of your own local font into Windows folder of the terminal from PC. The example below shows that fonts of “msgothic.ttc” appear on the display of the terminal while an application is running except the system fonts circled by red line as shown in Fig. 7.5 after the font file is copied from PC into the terminal. Fonts of the system do not still appear in the local font. Fig. 7.5 2. On the PC, change the registry settings of the terminal to make the system fonts appear on the display as shown in Fig. 7.6. Create \Fontlink\SystemLink folder with Remote Registry Editor (see Fig. 7.7) and change each value as follows: Registration key Name Value : [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fontlink\SystemLink] : Tahoma : \Windows\msgothic.ttc,MS Gothic Fig. 7.6 141 Fig. 7.7 Note: If you wish to run eMbedded Visual C++4.0 to develop application program in your local font, change the registry setting to the same as shown in the example above. 142 8. Precautions On Using C-MOS Imager The DT-X10 provides capabilities for not only simply reading conventional 1D symbols but also for reading in the 2-Dimensional codes with a CMOS Imager, which has replaced the conventional laser scanner. In addition, the improved camera function has added a new aspect of operation including image capturing and streaming, etc. In association with these changes, the read and operation methods have also changed from those of conventional laser scanners. This chapter describes the performance and functions of the C-MOS Imager as well as operating precautions and suggestions. Note that this chapter contains only supplement information for the imager, so please refer to DT-X10 Library Manual or relevant chapters in this manual for detailed information about each function. The imager is explained by focusing on the following three points: • Imaging performance by camera’s optical operability • Imaging performance by print quality • Imaging performance by read settings. 143 8.1 Imaging Performance By Camera’s Optical Operability Soiled camera filter If the camera filter inside the case is soiled or scratched, the captured image will lose its sharpness, making the symbols difficult to read. If the filter is soiled with oil, finger prints, etc., wipe the filter with a soft, damp cloth to avoid damaging the filter surface. Focal plane and depth of field As with a fixed-focus camera this imager has a limited range in which it can produce a sharp image. The subject plane in which the camera can produce a sharp image is called the focal plane, the distance from the camera’s device surface to the focal plane is called the focal distance, and the range within which the subject remains sharp and in focus is called the depth of field. The focal distance of the imager incorporated into the terminal, is 18 cm (or 7 inches), and the size of the focal plane is 8 cm x 11 cm. The depth of field is generally formed by two distances, one of which (near side) is calculated as one third of the focal distance in the outward direction and the other (far side) is calculated as two thirds of the focal distance in the inward direction. Accordingly, the depth of field of the camera is: Near side : 18 x (1-1/3) = 12 cm Far side : 18 x (1+2/3) = 30 cm However, this range varies with the ambient brightness - it becomes smaller than that calculated above if the image is captured in a dark place. Focal plane Focal distance Depth of field Fig. 8.1 144 Variation of ambient light This imager will detect the ambient brightness from the obtained image and calculate the optimum exposure time or sensitivity (gain) to prepare for the next image capture. Therefore, if a new capture is made in an environment different from the previous capture, it may be required to repeat the capture several times until the optimum value can be calculated. In addition, the imager is affected by various light-related conditions, such as a location by a window, overcast weather, sun and shade, morning and evening settings, etc., which generally are not a conscious consideration for humans (and are handled without conscious thought). Reflected light from the illumination LED, backlight In addition to direct light from the light source (producing the effect of backlight), reflected light of the illumination LED, re-reflected light on the lens in an excessively bright environment, etc., may cause part of the symbol to disappear into the white background or hamper the correct exposure calculation, resulting in decoding no longer being possible. Such a detrimental effect of the illumination LED can be avoided by the “LED Light Intensity Adjustment Function”, described later. Position of the Imager The Imager is oriented at a 45-degree downward angle, if the terminal is held horizontally. Thus, the Imager faces obliquely upward if the terminal is held vertically as shown below, and faces obliquely downward if the terminal is held horizontally. And, if the terminal is inclined 45 degrees, the Imager will now be held horizontally, so it will face straight towards the object. In order to avoid a mirror reflection (occurs within ±5 degrees from the shooting direction of the Imager), it is recommended to hold the Imager at a 30 degree inward inclination so that image capturing can be performed under a condition where the target symbol is slightly above the top edge of the terminal. 45° 30° 45° Recommended position Fig. 8.2 145 Moving object, hand blurring The Imager requires a certain amount of exposure time for image capturing. This means that if the subject is moving during this interval, the resultant image will be blurred. Therefore, if you need to capture a symbol while looking for its location, it is advised to adjust the Imager to the location of the symbol with the aimer LED, then perform reading with the Imager held still so that the objective symbol, as well as the resulting image of the symbol, is also still relative to the Imager. Sensitivity and noise Due to the nature of CMOS sensor, it has poor sensitivity and the image is easily affected by noise. In particular, this is significant when image capturing is attempted in a dark place or the subject is far from the Imager. Points for optimum image capturing • • • • • • Always keep the Imager filter clean. Remember that the optimum image capturing distance is around 18 cm. As much as possible, capture a symbol in a location where the variation in ambient light is small. Hold the terminal so it is inclined 30 degrees inward and so that the symbol can be seen in a position slightly above the terminal. To read a symbol, first adjust the Imager position with the aiming LED and then begin capturing by holding the terminal still (fixed). In a dark location it is advisable to capture within the effective coverage of the illumination LED while ensuring sufficient illumination for the distance area. 146 8.2 Imaging Performance By Print Quality Resolution of symbols The resolution of symbols that can be read is as follows: 1D, stack-type 2D symbol : 0.20 to 1 mm Matrix-type 2D symbol : 0.38 to 1 mm Size (width) The view angle of the Imager is approx. 30 degrees, however, it is not always possible to read a whole symbol that is contained in this range. The number of bars/cells that can be correctly identified is restricted depending on the depth of field corresponding to each resolution and the number of sensor pixels (640 x 480). Code39 0.20 … 100 (44 x 61) to 175 (77 x 107) 0.25 … 95 (42 x 58) to 215 (95 x 131) 0.38 … 65 (29 x 39) to 305 (135 x 186) 0.50 … 80 (35 x 49) to 350 (155 x 214) 1.00 … 150 (66 x 91) to 600 (266 x 366) PDF417 0.25 … 100 (44 x 61) to 210 (93 x 128) 0.38 … 80 (35 x 49) to 280 (124 x 171) 0.50 … 100 (44 x 61) to 300 (133 x 183) Data Matrix 0.38 … 90 (40 x 55) to 150 (66 x 91) Fig. 8.3 0.50 … 110 (49 x 67) to 285 (126 x 174) Depth of field in mm Resolution of symbol in mm Figures in parentheses indicate the size of the view field (unit: mm) that is associated with each depth of field. 147 Print quality Generally, a printer that has a resolution higher than 400 dpi is considered capable of printing symbols at a dot size smaller than 0.125 mm. In an actual application it is preferable to perform printing so that one fine bar (cell) consists of 3 to 5 dots, and in that case, the resulting dot size will be between 0.18 to 0.38 mm. Some printers have the capability to emphasize fine lines, which may produce a difference in the width of black/white bars (cells) from that produced with other printers, even if these two black/white bars (cells) indicate an identical value. In this case, increase the width of the fine bars (size per cell) of each symbol to relatively reduce the difference. Also, if a symbol is duplicated by a copy machine or sent through a facsimile, the print quality of the entire symbol is reduced. The readability becomes less than the original. Also, in this case it is possible to restrict the relative error by printing the symbol so that it becomes larger in size than the original. However, an enlarged copy is useless, since the printing error must also be relatively enlarged. Even with the given print quality it is sometimes possible to improve readability by specifying “Print Weight”, as described on page 128. Margins around a symbol, character, figure, peripheral object A CMOS Imager is different from a laser scanner and will capture a symbol in terms of the area. Therefore, the resulting image may contain characters, figures, and objects other than the target symbol and may require an extended period of time to detect the symbol and increase the frequency of read errors, if a complex picture is captured. To avoid this problem it is recommended to provide a sufficient margin around the symbol and to refrain from printing unnecessary characters and figures. When detecting symbols it is possible to limit the target range of the search by specifying the “Specifying capture range (Decode Centering Mode)”, as described on page 152. Fig. 8.4 Fig. 8.5 1D symbol: 10 times of fine bar or 2.5 mm whichever is larger. 148 2D symbol: 4 times larger than one cell. Error correction for 2D symbols The C-MOS Imager is provided with an error correction function that can handle various types of damage to symbols, such as that caused by dirt and dust, scratches, faintness, etc. However, this function can only handle damage that appears locally in the symbol area, and is not effective if the entire symbol is soiled or faint. Furthermore, it is not possible for the Imager to read symbols if a cutout mark required for detecting the symbol position is obscured. Readable patters Unreadable patters Entirely faint Entirely soiled The cut-out mark is obscured. Fig. 8.6 149 Symbols on glossy paper or under a film window With the C-MOS Imager, the illumination LED will irradiate the target surface for reading symbols. This may sometimes cause the objective symbol to fade into the background due to the adverse effect of the reflected light of the LED when the symbol is printed on a glossy paper or covered by a film window. In order to read symbols under such conditions, either reduce the LED illumination using the “Adjusting LED illumination intensity”, as described on page 153, or turn off the LED so that the reading is made under the ambient light only. Mobile symbols (for a reference) Mobile symbols (displayed on LCDs of cellular phones) can be read easily if you turn off the illumination LED and turn on the backlight. However, the terminal does not formally support the mobile symbol read function. Points for optimum image capturing • • • • • • • The printed bar width for 1D symbols and 2D symbols should be 0.2 mm or greater and 0.38 mm or greater, respectively. Be aware of the number of digits the symbol represents. Check the resolution of the printer with regard to whether a fine bar consists of 3 to 5 dots. Remember that a symbol copied or transmitted through a facsimile machine results in poor printed quality. Do not overestimate the 2D symbol correction function. Do not print extra characters and figures around the symbol. Exercise care with the reflected light of the LED when reading a symbol on a glossy paper or behind a film. 150 8.3 Imaging Performance By Settings Selecting only the symbol to capture The C-MOS Imager can read various kinds of symbols. However, in general, symbols that the user must read during actual daily operation are very limited only to several kinds. If the image capturing permission is set in such a way that even unnecessary symbols are included, the search range for decoding will be widened, the time to complete the capturing will be prolonged, and the frequency of read errors will increase, unnecessarily. It is strongly recommended to limit the number of symbols to be given capture permission in accordance with user’s daily application. Specifying the limited number of digits In addition to the above mentioned restriction that applies to the selected symbols, each of the symbols available for the user has a specific number of digits that can be captured. Specifying the number of digits for which to exceed the given range may cause errors (in particular, an abbreviated capture). To avoid this, as with the objective symbols specification, specify an appropriate range of digits for the actual operation. Check digit calculation Some symbols contain a check digit (or check character) used to validate the contained data. The check digit calculation function is essential for these symbols, however, it is recommended to also apply it to other symbols that allow the selection of this function. OCR fonts, Postal codes The C-MOS Imager has function to capture OCR fonts and Postal codes in addition to capturing 1D symbols and 2D symbols. However, note that the performance of this C-MO Imager for OCR fonts and Postal codes is inferior to that for reading 1D symbols and 2D symbols. (Furthermore, note that the OCR A font is designed for mechanical readability only, and the OCR B font takes also operator legibility into account.) When operating the terminal for application reading OCR fonts, use the following functions as much as possible. • Limiting the candidate using the template For reading OCR fonts it is necessary to specify the print format with an appropriate “template”. The specification method includes “Numeric”, “Alphabet”, “Alphanumeric”, “All characters”, and the user-specified character range (maximum two patterns). Depending on the character string to be used, specify the optimum format to minimize the number of candidates. • Using checksum The OCR function, similarly to the function for reading other symbols, can also be used for checksum calculation to validate the obtained data. If the user prefers to specify an original data format, it is recommended to use this function. 151 Template All characters [‘e’] Alphanumeric [‘a’] Line feed [‘r’] Alphabet [‘l’] Numeric [‘d’] Separation between templates [‘t’] ABCDEFGHIJKLMNOPQR STUVWXYZ 0123456789 Checksum [‘c’] ( )< >/ \ + - * $ \ Optional combination Group G [‘g’] Group H [‘h’] Fig. 8.7 Specifying capture range (Decode Centering Mode) Where there is more than one symbol printed in a single slip and if capturing is attempted without a particular specification, an unintended symbol(s) may be decoded. If this is the case use this function to limit the capture range so that only the symbols that overlap within this range can be selectively decoded. This is useful not only for decoding the intended symbols but also for limiting the range to search for a symbol included in the obtained image. As shown in the following example if the range of capture is specified by the center rectangle and the captured image has produced two symbols, only the symbol overlapping the specified rectangle will be decoded to yield “CODE39 20CHAR 123456”. 001122334455667788991234 *CODE39 20CHAR Fig. 8.8 152 123456* Specifying the print density (“Print Weight”) Suppose that two sets of black/white bars (cells), both indicating an identical value, are printed on different surfaces, one of which is normal and the other of which is prone to be affected by the print intensity of the printer or the reflection from a metallic surface. If these two printed results have a difference in appearance, it may be possible to improve the capture accuracy with this function. Use a smaller value if the printed section (dark bar/cell) looks thinner than that on the normal surface, and in contrast, use a larger value if the printed section looks thicker. Print Weight 1 7 4 Fig. 8.9 Dark bar/cell Thin Thick Adjusting LED illumination intensity If the target symbol is printed on a glossy paper or behind a film that readily reflects incident light, or where the scanning environment is bright enough to eliminate the use of illumination LED, it is possible to restrict reflected light by modifying the illumination intensity of the LED itself. This is also useful for extending the battery life. Points for optimum image capturing • • • Depending on your application, adjust the following settings to each optimum value: - Symbols permitted for capture - Number of digits to capture - Check digit calculation For OCR fonts capture, specify the most appropriate template and checksum. Depending on your application, use the following functions. - Print density - Capture range - LED illumination intensity 153 8.4 Troubleshooting Table 8.1 Check item Symbol cannot be captured. Is the Imager filter soiled ? Is the filter damaged ? Is the symbol resolution too fine or too rough ? Is the symbol too large ? Are symbols printed with a sufficient contrast ? In addition, does the printed surface look white or have light-warm color, or is the symbol printed in black or in a dark-cool color? Does the symbol have a sufficient margin around it? Is the paper on which the symbol is printed glossy ? Is it covered by a film, etc.? Is the objective symbol enabled by the setup for capturing ? Is the parameter setting for the symbol to be captured correct ? Is the green LED irradiating the symbol ? Is the Imager too close to or too far from the symbol? Is the symbol or Imager fixed for capturing ? Is the environment for capturing symbol dark ? Is the symbol directly irradiated by the illumination? In addition, is the illumination beam an incident beam or a reflected beam into the Imager ? Remedies Reference page Wipe off the dirt with a soft cloth. Replace the filter. Printing should be made at a resolution of 0.2 to 1 mm for 1D symbols, and 0.38 to 1 mm for 2D symbols. If the full data is not contained in one symbol, divide it into two or more symbols. Print the symbol so that the contrast of the symbol is significant. Also, print the symbol in black on a white background. 144 144 147 Do not print extra characters or figures around the symbol. Allow a sufficient margin around the symbol. Symbols must be printed on paper with less gloss. Do not overlap film, etc., on the symbol. Reduce the LED illumination intensity of the Imager. Set the symbol to be enabled for capturing. 148 Set the parameters correctly for the symbol. • Check if the number of characters derived from the symbol is within the specified range. • Check if the check digit calculation is specified for symbols that do not require the check digit calculation. Turn on the green LED so as to irradiate the center of the target symbol. Try to change the distance between the Imager and the symbol. Fix the symbol or Imager for capturing. 151 Sufficiently illuminate the symbol to be captured. Prevent the symbol and Imager from being directly irradiated by intense light. Continue. 154 147 -- 150 153 151 -144 146 145, 146 145 The captured result is incorrect. Are unnecessary symbols set to be captured ? Is the setup of the parameters for the symbol correct ? Are symbols close together or are extra characters or figures printed around the symbol ? Is the symbol distorted or warped? Does the symbol data contain elements other than the character code ? Set only necessary symbols to enable for capture. 151 Make the correct settings for symbol parameters. • Check if the setup for capture output is correct. (Check the check digit output, start/stop character output, and system number output.) Print the symbols so as to allow sufficient space between symbols and distance from other characters. Use the specification of the capture range (Decode Centering Mode). 151 Print symbols on a flat surface. Control characters, extra characters, and special characters may not be correctly displayed because they do not have corresponding fonts. In order to display these characters it is necessary to use a specific application to make the necessary conversion. • Control characters (Tab, CR, LF, etc.) • Fnc1 (GS) of EAN 128 • Special characters (encircled numerals, roman numerals, etc.) • Pictogram --- 155 148 152