DT-X10 Series Software Manual

Transcription

DT-X10 Series Software Manual
DT-X10 Series
Software Manual
(Version 1.08)
CASIO Computer Co., Ltd.
Copyright ©2005. All rights reserved.
September 2005
Table of Contents
Chapter 1
1.1
1.2
1.3
Chapter 2
2.1
2.2
2.3
2.3.1
2.3.2
2.3.3
2.4
2.4.1
2.4.2
2.5
2.5.1
Chapter 3
3.1
3.2
3.3
3.4
Chapter 4
4.1
4.1.1
4.1.2
4.1.3
4.1.4
4.1.5
4.1.6
4.1.7
4.1.8
4.2
4.2.1
4.2.2
4.2.3
4.2.4
4.3
4.3.1
4.4
4.4.1
4.4.2
Chapter 5
5.1
Editorial Record
Overview
Product Development Concept
Target Markets And Their Applications
Features
Applications
Operation Images
System Configurations By Application
Operation By User
Basic Operations
Operation With Multiple Options
Intended Application By Device
Installation Phases
Initial Installation
Upgrading The System
Application Software Development
Development In Microsoft Environment
Features
Available Models And Options
Basic Specifications
Software Configuration
External View
Functions
Basic Functions
Microsoft WindowsCE 4.1 .NET Version 4.0
Display Functions
Key Functions
Touchpanel Functions
Sound Functions
Memory Management Functions (RAM/RFA/FROM)
LED Functions
C-MOS Imager Functions
Communication Functions
Basic Specifications
IrDA Communication
Bluetooth Communication
USB Communication
PC Card
Basic Specifications
Power Control
Power Management Functions
Charge/Power Supply Functions
Application Programs/Tools
Microsoft Application Programs
2
4
5
5
6
7
8
8
10
11
11
12
14
17
17
21
22
22
25
27
28
30
32
33
33
33
33
36
42
43
45
46
47
52
52
53
54
55
56
56
59
59
64
65
65
5.2
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.2.7
5.2.8
5.2.9
5.2.10
5.2.11
5.3
5.3.1
5.3.2
5.3.3
5.3.4
5.3.5
Chapter 6
6.1
6.2
Chapter 7
7.1
7.2
Chapter 8
8.1
8.2
8.3
8.4
Casio Original Application Programs (1)
Card Backup Utility
Automatic Recovery Tool
FLCE
Contrast/Backlight Utility
Automatic Setup
Copy To Another Terminal
User Notification Message List
Welcome Wizard
Diagnosis
Browser
Mailer
Casio Original Application Programs (2)
FCHKCE
Wireless LAN
Bluetooth Setup Tool
LMWIN (Host Utility)
C-MOS Imager Applications
Security
Security Setup
Copy Protect For Distributor’s Software
Development Environment
Development Environment With Microsoft Tools
Local Fonts
Precautions On Using C-MOS Imager
Imaging Performance By Camera’s Optical Operability
Imaging Performance By Print Quality
Imaging Performance By Settings
Troubleshooting
68
71
74
80
94
95
96
98
98
98
99
100
102
102
107
108
117
118
137
137
137
138
138
140
143
144
147
151
154
No part of this document may be produced or transmitted in any form or by any means, electronic or mechanical,
for any purpose, without the express written permission of CASIO Computer Co., Ltd. in Tokyo Japan.
Information in this document is subject to change without advance notice. CASIO Computer Co., Ltd. makes no
representations or warranties with respect to the contents or use of this manual and specifically disclaims any
express or implied warranties of merchantability or fitness for any particular purpose.
CASIO is registered trademark of CASIO Computer Co., Ltd. in Japan. Other product names mentioned in this
reference manual may be trademarks or registered trademarks of their respective companies.
© 2005 CASIO Computer Co., Ltd. All rights reserved.
3
Editorial Record
Manual
Version no.
1.00
1.01
1.02
1.03
1.04
1.05
1.06
1.07
1.08
Date edited
April 2003
May 2003
July 2003
August 2003
August 2003
October 2003
October 2003
November 2003
September 2005
Page
111
all
115
34
all
Content
Original version
Chapter 8 is added.
Chapter 5.3.2 “Automatic Recovery Tool” is newly added.
Table 4.3 on page 35 is revised.
Description about Windows NT 4.0 is added
“RF wireless” is changed to “Wireless LAN”.
Chapter 7.2 “Local Fonts” is newly added.
Fig. 4.1 is corrected.
Chapter 5.3.5 “C-MOS Imager Applications” is added. The
description about the new models of DT-X10M30RC2 and
DT-X10M30URC2 is added.
4
1. Overview
This reference manual describes a product overview of the DT-X10 series handheld terminals.
1.1 Product Development Concept
CASIO has extended its product line-up by adding this high-performance handheld terminal, which is compatible
with various communication systems and has a built-in C-MOS Imager.
•
•
•
Acquire new users and fulfill replacement demands from the transport industry.
With the DT-X10 series being the successor to the DT-800 series, fulfill replacement demand for inventory
search/ordering terminals and factory automation terminals that use wireless communication.
Develop new market that may emerge as a result of incorporating the C-MOS Imager.
The following models of the series are available to meet various needs in the world’s transport industry.
Table 1.1
Model
DT-X10M30U
DT-X10M30URC
DT-X10M30URC2
DT-X10M30E
DT-X10M30RC
DT-X10M30RC2
Note:
*ETSI
*FCC
**ETSI
**FCC
Wireless LAN
IEEE802.11b
No
* FCC
** FCC
No
* ETSI
** ETSI
PCMCIA
C-MOS Imager
Bluetooth
Yes
No
No
Yes
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
: Wireless LAN (IEEE802.11b) module, no. WCF201BERWP100, produced by INTEL Corporation
which is compliant with the ETSI standard is integrated.
: Wireless LAN (IEEE802.11b) module, no. WCF2011BEWWP100, produced by INTEL
Corporation which is compliant with the FCC standard is integrated.
: Wireless LAN (IEEE802.11b) module, no. 6180120, produced by Toyota Industries Corporation
which is compliant with the ETSI standard is integrated.
: Wireless LAN (IEEE802.11b) module, no. 6180110, produced by Toyota Industries Corporation
which is complaint with the FCC standard is integrated.
5
1.2 Target Markets And Their Applications
This DT-X10 series has the following three strategic positions in its field:
•
High-performance model identified as being in the data collection category, that is compatible with various
communication systems, and that incorporates a C-MOS Imager.
•
Derivative model of the data collection category resulting from the change in market needs.
•
Successor model to maintain and support DT-800 users (resources).
Table 1.2
Target Market
Transport and Distribution
•
Assembling/Delivery
•
Sorting
•
Process control/Warehouse control
Applications
•
Covers 2D symbologies, for which it will soon be essential to
take the size and increased amount of information into account.
Real-time data transmission/reception (WWLAN, Wireless
LAN) between each local operation and the center.
Uses the touch panel in the confirmation operation to enter
signature.
•
•
Compatibility with DT-800 series
There is a difference between the DT-800 series and the DT-X10 series application development environments, as
shown below. The compatibility of source file and application file are not available.
Table 1.3
Development
Environment
Development tool
OS
CPU
RAM
Disk
DT-800 Series
DT-X10 Series
SH series CPU compiler
MS-DOS Ver. 3.3
80386SX
640 KB (main) + 3MB (protect)
3 MB
6
Visual Studio .NET 2003
Embedded Visual C++ 4.0 + SP1
Windows 2000 (Service Pack 2),WindowsXP Professional
Pentium II 266 MHz or faster
128 MB or more
1.7 GB or more
1.3 Features
Incorporates .NET technology
•
•
•
Uses WindowsCE .NET 4.1 Operating System.
Makes effective use of .NET resources developed by other corporations.
Employment of Embedded OS makes it possible to build a flexible WindowsCE system.
Enhanced communicating functions
•
•
•
•
•
Covers GPRS/Wireless LAN, etc. by using various communication cards.
Built in Bluetooth Ver 1.1 module.
The target transfer rate of the wireless LAN is 5 Mbps, which is the maximum rate of communication for
peer-to-peer connection with PC.
The following protocol stacks are available for Bluetooth interface:
GAP (Generic Access), SDP (Service Discovery), SPS (Serial Port), Dialup Network, File Transfer.
Security function (WEP 128 bits)
Superb scanning capability
•
•
•
•
With the installed C-MOS Imager it is possible to read 2D symbologies/1D symbologies and OCR fonts.
Image capturing function (2 to 256 monochromatic tones).
1D symbology scanning performance is comparable to the DT800.
Multi-step symbol read function.
Support of outstanding development environment
Ample Microsoft development tools provided for easy application development and an advanced debug
environment.
High expandability
The standard PCMCIA slot makes it possible to use various standard peripheral cards.
Aiming to a full compliance with the “Restriction of the use of certain Hazardous
Substances in electronic equipment (RoHS)” set mandatory on July 1 2006
The following products have been assembled with devices, components and parts manufactured using Lead (Pb)
free solder.
• DT-X10M30RC2
• DT-X10M30URC2
7
2. Applications
This chapter describes some of the usage scenarios for the DT-X10 series.
2.1 Operation Images
1. Operation by end users
Points to be considered in the application;
•
Correct operation method to independently use the
terminal.
•
Correct operation method and restrictions to use multiple
devices.
•
Operation method of each option.
Fig. 2.1
2. Operation for introducing the system
Points to be considered in the application;
•
Initial introduction method (including all options).
•
Upgrade of system components (Service Packs).
Data
Fig. 2.2
3. Operation for development
Points to be considered in the application;
•
Basic development method and device
configuration in the Microsoft development
environment.
Fig. 2.3
4. Operation for maintenance
Fig. 2.4
8
Points to be considered in the application;
•
Maintenance method for user side.
•
Maintenance method for service/sales
representative side.
•
Maintenance method for development side.
5. Operation for production
Fig. 2.5
9
Points to be considered in the application;
•
Basic manufacturing procedure/inspection
measures in the production department.
2.2 System Configuration By Application
1. Terminal for automobile drivers
•
Transmits in real time data inputted at a customer to the
center.
Receives/sends instruction E-mails to/from the center.
WWAN card
•
Car charger
IrDA or Bluetooth
Mobile printer
Fig. 2.6
2. Terminal for warehouse
Wireless LAN card
Charger
•
Transmits in real time data inputted at
the office via wireless LAN.
IrDA or Bluetooth
Mobile printer
Fig. 2.7
3. Terminal for WAN and LAN
WWAN card
Wireless LAN card
Charger
•
Transmits in real-time data inputted in the
field through WWAN, and at the office
through wireless LAN.
IrDA or Bluetooth
Mobile printer
Fig. 2.8
4. Conventional-type terminal
•
Temporarily stores inputted data in this terminal
without using a communication card, then batch
downloads it to a connected PC.
Cradle
IrDA or Bluetooth
Mobile printer
Fig. 2.9
10
2.3 Operation By User
Assuming actual operation is performed by the end user, this chapter describes the method of use and restrictions
that apply to the terminal, including the optional devices.
2.3.1 Basic Operations
•
•
•
•
•
•
For operating the touchpanel it is recommended to use the accompanied stylus, since direct operation with
your fingers may cause a malfunction or soil the screen.
The Trigger keys are designed and built so that the terminal can be held by single hand to read symbols.
The numeric keys should always be operated by fingers.
When replacing the battery pack, first turn off the terminal power then open the battery compartment lid to
perform battery replacement.
Do not operate the RESET switch on the terminal unless the terminal freezes, etc.
There is no guarantee that data currently held will be retained if the RESET switch is pressed during normal
operation.
11
2.3.2 Operation With Multiple Options
Since many built-in devices and externally connected optional devices may co-exist, the user must observe some
precautions and restrictions when using them concurrently.
Optional devices available for the DT-X10
A
-PCMCIA・Wireless LAN CARD
・GPRS CARD
B
-CF- (Expansion slot)
・FROM CARD
・Wireless LAN CARD
・GPRS CARD
・Device recommended
by CASIO
D
-IrDA・Connecting Bridge Satellite
Cradles
・Connecting HTs
・Printer
-Bluetooth・Printer
・Cellular phone
C
-Charge terminals・Cradle-type Battery Charger
・Connecting to Bridge Satellite
Cradle
Fig. 2.10
A, B, C, and D can all be physically connected at the same time, since their connection ports are different from one
another. Devices included in the same boxes A, B, C and D above cannot be used concurrently. The following
describes the conditions that must be observed to use multiple devices at the same time.
Table 2.1 Possible concurrent connection with multiple devices
PCMCIA
Application
Terminal
used by
driver
Terminal
used in
warehouse
Terminal
used for
others
CF (Expansion slot)
Bluetooth
---------------
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
---
Yes
Yes
Yes
WWAN
FROM
Wireless
WWAN
LAN card
card
card
LAN card
card
------Yes
Yes
-----
Yes
Yes
Yes
---------
--Yes
----Yes
--Yes
----Yes
----Yes
---
---
---
---
---
Notes
•
Due to power supply restrictions, concurrent connection with multiple devices may not be possible.
•
“WWAN” represents World Wide Area Network.
12
Charge
IrDA
Wireless
terminal
Switching over process for LAN devices
As shown in Table 2.1, multiple LAN devices can be installed (i.e. the drivers are loaded) at one time in this
terminal. However, for actual communication, it is necessary to switch to the specific device as required. The
following explains the switching procedure:
Table 2.2
Device
Wireless LAN card
Wireless LAN card
LAN card
LAN card
Slot
CF slot
PCMCIA slot
CF slot
PCMCIA slot
Feature/Protocol
802.11b
802.11b
LAN connection via 10BASE-T networking
LAN connection via 10BASE-T networking
Remark
Switching procedure
An API will be provided which enables the switch over of LAN devices from an application. This does not use
registry settings and it is therefore possible to switch over instantly without performing a reset. For further details,
refer to DT-X10 Series Library Manual for the functions, CLBCardDetectDisable, CLBCardDetectEnable
and CLBCardDetectGet.
Automatic switching between WWAN and Wireless LAN (seamless roaming)
If both WWAN and Wireless LAN are to be used, a function to change over is not supported by the OS. The
application should use the procedure above to switch over.
13
2.3.3 Intended Application By Device
Table 2.3
Device
PCMCIA
CF
Bluetooth
IrDA
FROM card
Modem card
LAN card
Wireless LAN card
Printer
Cellular phone
Battery charge on
Cradle
Connecting to Bridge
Satellite Cradle
Connecting HTs
-Yes
Yes
Yes
----
Yes
-Yes
Yes
----
----Yes
Yes
--
----Yes
---
Charge
terminal
------Yes
--
--
--
Yes
Yes
--
--
Yes
Yes
--
FROM Card
Used as the storage memory. Since it has a memory configuration that does not require any backup battery, which
differs from the RAM disk installed in the terminal, it can store data even when the terminal battery power has
been consumed. In addition, it can easily be removed and replaced so that handling of data with the CF card can be
easily performed.
• Real-time data storage (the access speed is lower than RAM disk.)
• Storage of large-volume data such as master file, etc., that is never updated
• Batch installation (with SETUP function)
• Self-execution on startup by reset (with SETUP function)
• Self-execution at Power ON (with AUTORUN function)
• Possible to plug/unplug while terminal power is on.
• Stops accessing to secure data when the back lid is opened.
• Power OFF is suspended until the recovery process is completed if the Power key is pressed during access.
• Improved speed for saving data into the card
Modem Card
Used to enable modular communication via a modem connected to telephone line.
•
Modem card for modular connection via cable
•
Modem CARD with built-in fixed antenna
•
Modem CARD with built-in adjustable antenna
•
Real-time upload/download of information
•
Send and receive mail
•
Call-in function (function to inform the user that mail is received)
•
Security function (VPN (PPTP))
•
To secure data, access is stopped when the back lid is opened.
•
Disables Power OFF if the Power key is pressed during communication.
•
Sets up APO (disabled) to default to avoid interruption of in-progress communication.
14
LAN Card
Used to perform communication by connecting to the 10BASE-T Ethernet environment.
•
Permanent LAN connection (operating the terminal as desktop unit)
•
Independent LAN connection (connecting the LAN cable or LAN card as required)
•
Real-time upload/download of information
•
Send and receive mail
•
Security function (VPN (PPTP))
•
To secure data, access is stopped when the back lid is opened.
•
The application should implement the function to disable Power OFF when Power key is pressed during
communication.
•
Possible to re-establish communication automatically when the terminal is restored through the resume
operation.
•
Sets up APO (disabled) to default to avoid interruption of in-progress communication.
Integrated Wireless LAN Card
(applicable to DT-X10M30RC, M30URC, M30RC2, and M30URC2 models)
Used to communicate in wireless LAN that is compatible with IEEE802.11b.
•
Real-time upload/download of information
•
Send and receive mail
•
Security function (VPN (PPTP), WEP128/64bit)
•
To secure data, access is stopped when the back lid is opened.
•
The application should implement the function to disable Power OFF when Power key is pressed during
communication.
•
Possible to re-establish communication automatically when the terminal is restored through the resume
operation.
•
Sets up APO (disabled) to default to avoid interruption of in-progress communication.
•
Transmission rate speed is 5 Mbps.
Printer
It is possible to send print data to any IrDA-compatible printer or Bluetooth-compatible printer. The Bluetooth
serial profile is supported by the terminal.
Cellular Phone
It is possible to dial-up any Bluetooth-compatible cellular phone without using cable. The Bluetooth dial-up profile
is supported by the terminal.
Cradle-type Battery Charger
This is the Cradle-type Battery Charger on which the terminal is mounted for charging the installed battery. As long
as it is used indoor, it is possible to install it on a wall (Wall-mounted configuration).
15
Bridge Satellite Cradle
It features with two types of serial interface, RS-232C and USB, for connection with a PC. This cradle supplies
power to the terminal as well as charging the battery pack. By connecting cradle-to-cradle with the RS-422 it is
possible to chain-connect a maximum of 8 handheld terminals.
Application 1
Data
Data
Data
Database
Between Bridge Satellite Cradle and HT : FIR (4Mbps)
Fig. 2.11
Connection via RS-232C / USB interfaces
Application 2
Data
Data
Data
Database
Between Bridge Satellite Cradle and HT: FIR (4Mbps)
・・・・・
Fig. 2.12
Via RS-422 interface
Via RS-232C / USB interfaces
Between Terminals
The use of HT-to-HT connection is assumed for maintenance and development. HT to HT connection via cable is
not supported.
•
Using the IrDA or Bluetooth capabilities, build a child terminal using a terminal as a parent terminal.
16
2.4 Installation Phases
There are two system introduction methods, initial installation and update.
2.4.1 Initial Installation
The initial installation of the system is divided into two kinds of operation, which are copying applications and
setting up the network environment.
1. Introduction of application
First, build a parent terminal using either of the following methods:
•
Connect the Bridge Satellite Cradle and copy application from PC.
•
Use a PCMCIA/CF card to copy application (it is also possible to setup the registry at the same time if using
the Setup Tool).
•
Connect the terminal via LAN to copy application from PC.
•
Connect the terminal via USB to copy application from PC.
•
Use the setup tool to establish communication and security environments.
With either of the following methods build child terminals:
•
Use the copy tool of the terminal to copy applications in the parent terminal via IrDA.
•
Use the backup tool to copy applications in the parent terminal onto the PCMCIA/CF card, and then insert
the card into the target child terminal to restore the environment of the parent terminal.
Introduction with Bridge Satellite Cradle
Introduce application after making connection with the Bridge Satellite Cradles.
Connecting Bridge Satellite Cradles
・・・・・
USB/RS-232C
RS-422
Fig. 2.13
17
HOST SYSTEM
•
LMWIN
•
ActiveSync (not operable for daisy chain
connection)
Introduction by HT-to-HT transfer
Use the terminal, into which the system has been already installed, as a parent terminal and introduce the system
with the copy tool residing in the terminal.
Fig. 2.14
Introduction with PCMCIA/CF Card
The system introduction is easily performed by simply introducing the system with a PCMCIA/CF card and PC,
etc., and resetting the terminal after inserting the card into appropriate slot of the terminal. (For this operation use
the Setup function and the Backup tool in the terminal.)
With this introduction method, if there are a sufficient number of cards, even a batch introduction to many
terminals is possible. System delivery also becomes easy.
Fig. 2.15
18
2. Setting up the network environment
Set up the network environment for each of the terminals with the following procedure.
1. Initiate the setup tool and define the network environment.
2. Initiate the security tool and define the security environment.
Setting up network environment
Initiate the setup tool to define the network environment. Figure 2.16 shows an example of setup for Wireless
LAN.
Fig. 2.16
19
Setting up the security environment
Initiate the security tool to define the security environment. The following window (Fig. 2.17) shows an example
of security setup for Wireless LAN.
Fig. 2.17
3. System restoration with the back-up function
A handheld terminal into which the system has already been introduced may sometimes be required to re-introduce
the system. In this case, provided that the PCMCIA/CF card that was created at the time of the introduction and if
the user frequently backed up data used by applications, it is possible to restore the system operation to the state that
it was in at the time of the back-up using the same PCMCIA/CF card and backup data stored in the Flash ROM.
20
2.4.2 Upgrading The System
The following pieces of software/firmware may be required to upgrade in future.
Objects of updating
Development environment/HOST system
Application development environment
Up/downloader
DT-X10 series
FROM OS
Driver
Utility
: Integrated basic OS: WindowsCE .NET 4.1 Embedded
: Integrated basic driver
: Integrated utilities, Add-on utilities
Operational specifications for update
Table 2.4
Item
Category
Development
Application
environment/Host development
environment
HT
: Microsoft eMbedded Visual C++4.0 +SP1/ CASIO Lib
: Microsoft Visual Studio .NET 2003
: ActiveSync3.5 / LMWIN
Product
Embedded VC++ 4.0+SP1
Visual Studio .NET 2003
CASIO library
- System library
- Bluetooth library
- C-MOS Imager library
- Export SDK
Up/download
ActiveSync 3.5
LMWIN
FROM OS
Basic OS
Drivers (integrated)
Standard driver
Buzzer
Supplied by
--Supplied with DLL
files.
Required to be installed
in development
environment at the user
side.
To be announced.
Downloading from
CASIO web.
Supplied with OS file
Provider
Microsoft
CASIO
Microsoft
CASIO
Supplied with driver
files.
C-MOS Imager
Bluetooth
FROM driver
Utilities(pre-installed) Microsoft APL
FLCE
FCHKCE
Auto Setup
CF Backup tool
Welcome
Contrast/Backlight
Diagnosis
Bluetooth
C-MOS Imager
Copy files to another HT
21
--Supplied with utility
files.
Microsoft
CASIO
2.5 Application Software Development
2.5.1 Development In Microsoft Environment
Table 2.5
Development platform
Development environment
Microsoft Windows 2000 SP2 or later edition (English)
Microsoft Windows XP Professional RCI or later edition (English)
CPU: Pentium II 266 MHz or later version
RAM : 128 MB or more
HDD: 1.7 GB or more
eMbedded Visual C++ 4.0 + SP1 or Visual Studio .NET 2003 with Visual Basic
Dedicated SDK and library for DT-X10 series
Development language for application development
The development environment has been completely switched from that using eMbedded Visual C++ and
eMbedded Visual Basic tool has been added to eMbedded Visual C++ and Visual Studio .NET 2003.
•
eMbedded Visual C++ 4.0 +SP1 development environment
eMbedded Visual Tools 3.0 (eVB and eVC++3.0) cannot be used to develop applications for DT-X10. You now
have the choice of using either embedded Visual C++ 4.0 + SP1 or Visual Studio .NET 2003. If you use Visual
Studio, you can choose between C# and Visual Basic .NET as your development language. The development tool
is now exactly the same one as developers use for developing normal Windows applications.
To obtain the eMbedded Visual C++ 4.0 + SP1 development tool, download it free of charge from the Microsoft
home page (as was done for eMbedded Visual C++ 3.0).
Applications developed with eMbedded Visual C++ 4.0 + SP1 are expected to run at a higher speed than those
which are created in an environment using Visual Basic of Visual Studio .NET. This is because the codes to be
compiled with eMbedded Visual C++ 4.0 +SP1are compiled as native codes of the target CPU. As a result, they
can theoretically be executed at a higher speed than those that are created in the Visual Studio .NET environment,
which generates intermediate codes.
•
Development environment that uses Visual Studio .NET 2003 and Compact Framework
A tool called eMbedded Visual Basic 3.0 has been previously provided for application development, but in
accordance with modifications to WindowsCE .NET 4.1, the development environment for using Visual Basic as a
single unit will no longer be supported.
As the development environment has changed, Visual Basic, C++ and C# should have the same types of variables.
And, in the conventional environment, a structure could not be passed as an argument when using Win32 API,
resulting in that only a limited number of functions could be used. As this problem has been solved, any function
created with C++ can now be used from Visual Basic.
Codes generated from this development environment are compiled into the intermediate language for .NET
Compact Framework. As a result, the effective execution speed will be somewhat slower than that which results
from Visual C++ 4.0 native code.
22
•
Summary of the application development environment
Application
eMbedded Visual C++ 4.0
+SP1
CASIO Library
Visual Studio .NET 2003
Visual
Basic .NET
Visual
C# .NET
Visual C++ .NET
Available later
.NET Compact Framework (Common language runtime)
CASIO API Group
WindowsCE .NET 4.1 Embedded (WindowsCE .NET)
Although the development tool has
been modified, the development
method remains the same.
Fig. 2.18
Note:
It is not possible to develop applications for CASIO IT-700 and IT-70 series with eMbedded Visual C++ 4.0.
•
Precautions for creating a user application
Application programs should be stored in FlashDisk. Important files such as log files, setting files, data files and
database should be stored in FlashDisk also.
The caution comes from the fact that data in RAM will be held only for approximately 10 minutes when the
battery pack runs out. Therefore, all important data and programs should be stored and backed up in FlashDisk by
the application program. Regarding files which must be resident under Windows folder to work, those files should
be backed up in FlashDisk by Backup Tool.
When the battery pack’s voltage is low, WM_POWERBROADCAST (PBT_APMBATTRYLOW) message
will be issued by the system. Upon receiving this message application must save current data into FROM and
terminate the task running.
23
Porting application developed for IT-700/IT-70 into DT-X10
•
Applications developed with eMbedded Visual Basic
Applications developed with eMbedded Visual Basic 3.0 can be copied into the terminal by the following
procedure:
1. Because an application created with eMbedded Visual Basic 3.0 uses variable types and form classes
identical to those of Visual Basic 6.0, the copy of a ready-made application is easier than its new creation
using Visual Studio .NET 2003 with Visual Basic.
2. There is a specific conversion wizard provided in Visual Studio .NET for converting from Visual Basic 6.0 to
WindowsCE .NET 4.1. With this function perform your copy task semi-automatically.
The reason why such a large scale modification is required is that Microsoft has not included support for the old
Visual Basic runtimes in WindowsCE .NET 4.1. However, the DT-X10 series includes support for the much more
powerful .NET Compact Framework and therefore applications created using Visual Basic .NET in the new
version of Visual Studio can run without problems.
•
Applications developed with eMbedded Visual C++ 3.0
Applications developed with eMbedded Visual C++ 3.0 can be ported through the following procedure:
1. Create a new empty project with eMbedded Visual C++ 4.0 +SP1. When creating an application that uses
MFC, make sure to select a project that also uses the MFC.
2. Add all the source files, header files and resource files of eMbedded Visual C++ 3.0 that have already been
created to the created project.
3. Set the configuration to STANDARDSDK using eMbedded Visual C++ 4.0 +SP1 and build it with
ArmV4T for the CPU.
4. If a SHELL function-dependent API of the Pocket PC is used, an error may occur during compile. If this is the
case, rebuild the code after removing the portion that caused the error by commenting it out. In general, the
SHELL function serves as the face of each OS. Therefore, since the provided displays are different between
this system and the Pocket PC, some APIs may not be properly supported.
5. With the above operations the porting is complete.
24
3. Features
This chapter outlines the specifications of the DT-X10 series including optional devices. For information about
function/specification details refer to the subsequent chapters.
DT-X10 Series
•
•
•
Latest Microsoft WindowsCE OS installed (WindowsCE .NET 4.1
eMbedded)
C-MOS Imager, Bluetooth, and PCMCIA slots are standard features.
Models with/without Wireless LAN are provided (see the table below).
Fig. 3.1
Table 3.1
Model
DT-X10M30U
DT-X10M30URC
DT-X10M30URC2
DT-X10M30E
DT-X10M30RC
DT-X10M30RC2
Wireless LAN
IEEE802.11b
No
FCC
FCC
No
ETSI
ETSI
C-MOS
Imager
Yes
Yes
Yes
Yes
Yes
Yes
PCMCIA
Yes
No
No
Yes
No
No
Bluetooth
Yes
Yes
Yes
Yes
Yes
Yes
Options
•
Cradle for connecting multiple Bridge Satellite Cradles
Connection of Bridge Satellite cradles:
Serial connection/Maximum 8 units can
be chained.
RS-232C / USB
Fig. 3.2
RS-422
25
•
Battery recharging system: Cradle-type Battery Charger/Dual Battery Charger
Cradle-type Battery Charger
Dual Battery Chargers
AC adaptor
AC adaptor
Two types of battery pack, standard and large-capacity, are available.
Fig. 3.3
•
CF Interface: FROM CARD
32MB
64MB
128MB
192MB
Fig. 3.4
•
PCMCIA / CF Interface: LAN CARD /Modem CARD
LAN/MODEM card
PC
PC
Phone line
Network
PC
PC
MODEM Card
GPRS
LAN card
Wireless LAN Card
Fig. 3.5
•
•
IrDA Printer: Recommended IrDA printers only.
Wireless LAN Access-Point: Recommended Access-Points only.
26
Homes
3.1 Available Models And Options
Table 3.2 List of the models and dedicated options
Product
Description
DT-X10
32 MB, C-MOS imager, Bluetooth
32 MB, C-MOS Imager, Bluetooth, Wireless LAN
32 MB, C-MOS Imager, Bluetooth, Wireless LAN
32 MB, C-MOS Imager, Bluetooth
32 MB, C-MOS Imager, Bluetooth, Wireless LAN
32 MB, C-MOS Imager, Bluetooth, Wireless LAN
Cradle
Bridge Satellite Cradle
Lithium-Ion
Lithium-Ion battery pack (standard size)
battery
Lithium-Ion battery pack (large size)
Battery charger Dual battery charger
Car mounted battery charger
Cradle-type battery charger
AC adaptor (for DT-160IOE)
AC adaptor (for DT-5022CHG)
Car power adaptor (for DT-167CHGE)
Communication card cover
CF card extension unit
CASIO
PCMCIA card
GPRS/GSM card
recommended
GPRS/GSM/LAN combo card
options
GPRS/GSM/LAN combo card
CF card
Model no.
DT-X10M30E
DT-X10M30RC (13 channels)
DT-X10M30RC2 (13 channels)
DT-X10M30U
DT-X10M30URC (11 channels)
DT-X10M30URC2 (11 channels)
DT-160IOE
DT-5023BAT
DT-5025LBAT
DT-5022CHG
DT-167CHGE
DT-169CHGE
AD-S42120AE
MPC-577ADP
DT-827CAC
DT-893LTCV, DT-892TCV
DT-894CFU
Globetrotter by OPTION
D211 by NOKIA
D311 by NOKIA
CDMA card
MerlinC201CDMA by Novatel
Wireless
Wireless LAN card
Aironet 350 by CISCO
Wireless LAN card
WDF2011B Intel
Wireless LAN card
LA-4137 by Symbol
FX-DS110-APL by Contec
Access-Point
AP-1000 by ORiNOCO
Bluetooth printer
Petit Lapan by SATO
Note:
The recommended options are for use with the DT-X10 series handheld terminals. Each product must be
purchased from the respective authorized sales channels near by you. CASIO will not distribute any of the
products.
27
3.2 Basic Specifications
The following table shows basic hardware and software specifications of the terminal.
Table 3.3
Item
Specification
CPU, Memory
CPU
PXA255 Application Processor (Xscale)
(run at 200 MHz or 300 MHz)
System ROM
32 MB (StrataFlash)
User FROM
29.5MB (256 Mbits NAND)
System RAM
32 MB (128 Mbits SDRAM)
Display
Color LCD Device
2-way TFT LCD (64K colors)
No. of dots
Dot pitch
Contrast
Visibility angle
No. of maxi. display characters
Types of display characters
Display character size
LED Indicator
For charge control status
For general use
Keyboard
Numeric keys
Function keys
Imager trigger keys
Others
Touchpanel
Imager
CMOS Imager
Audio
Buzzer
Remark
For OS
For apps and files
For main memory
For indoor and
outdoor use
240 (W) x 320 (H)
74 um
10 grades
30 (W) x 40 (H)
WindowsCE supported character fonts
Scalable fonts
With 8-dot font mode
Charge notification
3 colors (red, green,
orange) LED
3 colors (red, green,
orange) LED
Data reception notification/scanning
confirmation/User notification
0 to 9, ENT, CLR keys
F1 to F4 keys
Trigger keys (right/left sides)
Arrow up, down, left, right, PW,
Program, Fn keys
Method
Resolution
Operation
12
4
2
7
Analogue
240 x 320 pixels
Stylus
1D/ 2D symbologies, OCR fonts, image captures
Continue.
28
Key code input with
software input panel
Handwriting
recognition input
Interface
IrDA
Serial
Card slot no. 1
IrDA Ver. 1.1
USB
PCMCIA
Wireless LAN card
Card slot no. 2
Wireless Interface
Reset switch
Reset switch
Timer
RTC
Count
Accuracy
Alarm
DT-X10M30E, M30U
DT-X10M30RC,
M30RC2, M30URC,
M30URC2
CF expansion slot (option)
Bluetooth integrated
Year/Month/Date/Hour/Minute/Second/Leap-year Countable up to February
6th 2116
±60 seconds per month
Alarm/Wake-up function
29
3.3 Software Configuration
Pre-installed software
The following application programs and drivers are factory-installed in the ROM of the terminal.
Table 3.4
Category
Basic OS
Appended
Drivers
Microsoft
application
Casio
application
Software
WindowsCE4.1 Embedded
Display
Key
Touchpanel
Audio
PCMCIA
Communication
GWE
Buzzer
FROM Driver
C-MOS Imager Driver
Bluetooth Driver
Wireless LAN driver
File Explorer
ActiveSync Client
HandWriting
Control panel
SIP
SHELL
Mail
Description
Basic operating system
Color TFT
Key
Touchpanel
Wave reply/record
Card socket
FIR/USB
Battery/LED
Beep sound
Integrated flash memory is used as storage.
C-MOS Imager
Bluetooth
Wireless LAN
Explorer
ActiveSync
Hand writing
System
Auxiliary input
Shell
e-mail program (see note)
Internet Explorer
Browser with Ver. 5.5 (see note)
FLCE
Communication utility
FCHKE
File check utility
Auto Setup
Program to execute program when reset switch is pushed or a
card is inserted.
CARD BackUp
Card backup tool
Contrast/Backlight
Setting the contrast and backlight
Buzzer setting
Tool to set volume of the buzzer
Calculator
Four arithmetic calculation utility
Welcome Wizard
Setting user information
Wireless LAN Power Setup
Tool
Tool to set the power of Wireless LAN module
C-MOS Imager sample
program
Scanning symbols, capturing images, setting the parameters, and
the demonstration.
Bluetooth Setup Tool
Bluetooth setup tool utility
HTs Copy Tool
Utility for copying between terminals
30
Notes:
•
Mailer and Internet Explorer use respective modules supplied by Microsoft.
•
Wireless LAN driver and the setting tool are pre-installed in DT-X10M30RC, M30RC2, M30URC, and
M30URC2.
•
Storage Manager by Microsoft in the Control panel will be used to format FlashDisk.
Software to be installed
The following pieces of software are ones that must be installed in the RAM of the terminal prior to use of each
function. They are not pre-integrated in the terminal.
Table 3.5
Category
Driver
Software
ATA Disk Security driver
Application
GPRS driver
GPRS setup utility
Description
Encrypted disk driver (will be supplied according to the customer’s
order)
With call wakeup function
GPRS connection utility
Supported Libraries (C Libraries)
This is a group of libraries supported to implement CASIO-original functions, in addition to those which are
supported as the Microsoft SDK.
C-MOS Imager Library (C Library)
This library supports controlling the C-MOS Imager.
Bluetooth Library (C Library)
This library supports controlling the power supply to the integrated Bluetooth module and the protocol. It can be
used with Visual Basic. Refer to DT-X10 Library Manual for detail.
Host Utility
Utility software used on the Host (PC) side for uploading/downloading files and data linkage includes the
following:
Table 3.6
Category
HOST Utility
Function
LMWIN (Ver. 5.00 or later)
Description
CASIO’s file transfer application
ActiveSync (Ver. 3.5 or later)
Data link software available from Microsoft
Export SDK
This is an SDK that allows users to develop application programs for the DT-X10 series operating under the
Microsoft environment.
Table 3.7
Category
SDK
Function
DT-X10_SDK.msi
Description
Software development kit
31
3.4 External View
Notification/confirmation LED
(2 LEDs)
RESET switch (on the
back of the terminal)
3.5-inch Color LCD
Touchpanel
Power key
Trigger keys
(Left and Right sides)
↑
←
→
↓
Fn
Fn key
Fig. 3.6
Cursor keys
(Up, Down, Right and Left)
□
○
BL
ABC
DEF
1
2
3
GHI
JKL
MNO
4
5
6
PQRS
TUV
WXYZ
7
8
9
CLR
0
BS
-
F1
F2
・
F3
Alpha
Programmable key
Ten key
(0 to 9 keys)
Function keys
F4
The external view of above does not show the exact shape of the DT-X10 series.
32
4. Functions
This chapter describes the functional specifications of the terminal and optional devices.
4.1 Basic Functions
4.1.1 Microsoft WindowsCE 4.1 .NET Version 4.0
This terminal has WindowsCE 4.1 Embedded installed, which is the latest Microsoft WindowsCE OS Version 4.0.
Features
•
Interfaces easy to use
•
Employs .NET technology.
•
Enhances communication ability.
•
Large capacity memory
•
Provides an advanced development environment.
•
High expandability
Microsoft applications such as PocketWORD, PocketEXCEL are not installed due to the embedded OS.
4.1.2 Display Functions
A two-way TFT color display is installed.
Table 4.1 Basic display panel specification
Color
Size
X direction
65,536 colors 2-way TFT (16 bpp, Red: 5 bits, Green: 6 bits, Blue: 5 bits)
240 pixels
Y direction
320 pixels
Contrast
•
Can be set to one of 9 levels (Default = 5).
•
Can be set in application with ExtEscape API function.
•
Setup values can be modified in the Contrast and Brightness properties.
Backlight intensity
•
The backlight intensity can be set to one of 9 levels according to whether external power or battery power is
being used. (Default = 9 for external power or 7 for battery power)
•
It is possible to set up in application with ExtEscape API function.
•
The contrast adjustment setup values can be modified in the Contrast and Brightness properties.
•
When the minimum value is set, the backlight is set to OFF.
33
Features supported by ExtEscape API function
The following features are supported by ExtEscape API function.
•
Contrast adjustment in application
•
Backlight adjustment in application
•
Power management for the display
Backlight Automatic Dimmer (Only applicable when the terminal is powered by battery pack.)
• When the terminal is powered by the battery pack and left as it is without any key pressed or input made on
the touchpanel (idle state), the backlight will be automatically dimmed for power saving. (Backlight
Automatic Dimmer is only functional when powered by battery pack and does not work when powered via
Cradle or battery charger.)
• When the terminal is dimmed automatically, the dim state will be cancelled by pressing a key or input on the
touchpanel and it returns to normal brightness.
• It is possible to set whether Automatic Dimmer is ON or OFF or time to become dim (Default = 1 minute) by
Brightness Properties in Control Panel. The brightness when dimmed can be set by Auto Display Dimming (8
steps, default: 3rd step) in Brightness (Battery). It is not possible to set the dimmed brightness brighter than the
normal brightness set for battery operation.
Automatic Backlight OFF (in both cases powered by battery pack and via Cradle/Battery charger)
• When the terminal is powered by the battery pack and left as it is without any a key pressed or input on the
touchpanel (idle state), the backlight will be automatically turned OFF for power saving.
• When the backlight is OFF automatically, Automatic Backlight OFF state will be cancelled by a key pressed
or input made on the touchpanel and the backlight returns to normal brightness.
• It is possible to set whether Automatic Backlight OFF is ON or OFF or time to become OFF (Default = 5
minutes) by Brightness Properties in the Control Panel.
If both Automatic Backlight Dimmer and Automatic Backlight OFF are set during battery operation, either
function which sets less time will be valid.
Example 1
Automatic Backlight Dimmer
: 1 minute
Automatic Backlight OFF
: 5 minutes
After 1 minute Backlight will be dimmed and then after 4 minutes Backlight will be OFF.
Example 2
Automatic Backlight Dimmer
: 5 minutes
Automatic Backlight OFF
: 1 minute
After 1 minute Backlight will be OFF and no dimming.
Backlight brightness control by thermal sensor (in both cases powered by battery pack and via
Cradle/Battery charger)
• When the thermal censer detects high temperature of the terminal, brightness of Backlight will be restricted
automatically.
• There are two kinds of restrictions. The first one is to restrict steps of brightness control (9 steps) to up to 8
steps. The second one is to restrict steps of brightness control up to 6 steps.
• If the brightness of normal condition or dimmed brightness set by Automatic Backlight Dimmer (only battery
operation) is set greater than brightness which is beyond the range of the restricted steps, brightness will be
restricted automatically to the inside of the restricted range. However, when the temperature drops and
restriction is released, brightness will recover to the normal setting level automatically.
• It is possible to confirm if the restriction is effective or not by checking the following registry.
[ HKEY_LOCAL_MACHINE\Drivers\Display\CM7200F1 ] DispSensorLevel : DWORD (0:Nomal, 1, 2)
34
180 degree rotation of the screen
•
A screen rotated by 180 degrees is supported. The axis of the touchpanel is also rotated naturally.
•
It is possible to rotate the screen with ExtEscape API function in the application.
•
It is also possible to rotate the screen using the System Library in the application.
•
A screen rotated by 90 degrees or 270 degrees is not supported.
•
A screen rotated with Microsoft ChangeDisplaySettingsEx function is not supported.
35
4.1.3 Key Functions
Keyboard Layout
The following figure shows the keyboard layout on the terminal.
↑
←
→
↓
FNC
□
○
ABC
DEF
1
2
3
GHI
JKL
MNO
4
5
6
PQRS
TUV
WXYZ
7
8
9
CLR
0
ENT
BS
-
・
Alpha
F1
F2
F3
F4
Fig. 4.1
Key mode display
The current key mode (Lock, Function, Upper-case Alphabet, Lower-case Alphabet) can be displayed in the task
tray.
L
F
1
A
a
Fig. 4.2
Editing the Turnover keys
Press the Input Switch key (Alpha key) to edit the Turnover keys displayed in the window.
Abc
Fig. 4.3
The “Left” and “Right” keys of the cursor keys (4 keys to move the cursor) can be used to move the cursor left and
right to edit input character string.
36
Operation keys consist of Control keys, Cursor keys, Trigger keys, Numeric keys, and Function keys.
The Power key/Trigger keys can be used as boot-up key under the power-off condition. An optional application or
function can be assigned to each of F1 to F4 keys.
Control keys/Programmable key
Table 4.2
Special
Description
Key
function
Special key function (toggle)
FNC
--
PW
--
Program
mable
--
Remark
The Fn key
operation will be
disabled when
another key input is
made.
The minimum time
Turns OFF the power if the key is pressed longer than a
specified period of time when the power is ON.
setting is 500
If this function is disabled, user application will be supplied with milliseconds.
a message.
(Default = 1 second)
[HKEY_LOCAL_MACHINE\Drivers\BuiltIn\pmc]
PowerKeySenseTime : DWORD (unit : 500 milliseconds)
Turns ON the power if the key is pressed longer than a specified
period of time when the power is OFF.
Returns the VK code set in the registry (Default: VK_F25).
[HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP
\KEYBD]
ProgKeyCode : DWORD
Cursor keys
Table 4.3
Key
←
→
↑
↓
Special function
None
When Fn key is pressed
None
When Fn key is pressed.
None
When Fn key is pressed.
None
When Fn key is pressed.
37
Description
Moves the cursor (to left).
Moves the cursor (to left).
Moves the cursor (to right).
Moves the cursor (to right).
Moves the cursor (to up).
Moves the cursor (to up).
Moves the cursor (to down).
Moves the cursor (to down).
Function keys
Table 4.4
Key
F1
F2
F3
Special function
None
When Fn key is
pressed.
None
When Fn key is
pressed.
None
When Fn key is
pressed.
None
F4
When Fn key is
pressed.
Description
Deletes one character to the left of the cursor position.
Initiates Application 1.
[ HKEY_LOCAL_MACHINE\Software\Microsoft\Shell\Keys\40C1 ]
Default = sz
“―“
Initiates Application 2.
[ HKEY_LOCAL_MACHINE\Software\Microsoft\Shell\Keys\40C2 ]
Default = sz
“.”
Initiates Application 3.
[ HKEY_LOCAL_MACHINE\Software\Microsoft\Shell\Keys\40C3 ]
Default = sz
Input switch-over key
Toggling in order of Numeric → Alphabet (upper-case) → Alphabet
(lower-case) → Numeric.
Initiates Application 4.
[ HKEY_LOCAL_MACHINE\Software\Microsoft\Shell\Keys\40C4 ]
Default = sz
Note:
The specific program in the card can be invoked only when the following conditions are met.
•
PC (CF) card is installed in the slot.
•
The program is saved in a specific folder described below.
\\PX798diag\diag.exe (Possible to set up in the registry.)
Trigger keys
Table 4.5
Key
Special function
T1/T2
--
Description
Starts reading symbols.
Can be set so that the user is informed of the fact the key is pressed.
Turns ON the power if the key is pressed longer than the specified period of time
when the power is OFF.
Setting turning ON the power by key
The Power key, Trigger keys, and Programmable key can be assigned to turn ON the power (turning ON the
power and then invoking application software). Application and function can be freely assigned to other keys on
the keyboard.
Setting the prohibition on turning ON the power by key
The function to turn ON the power by Trigger keys after the power has been turned OFF can be disabled. Using
the System Library, turning ON the power by Trigger keys can be set enabled or disabled. The default setting is
“Disable turning ON the power”.
38
Table 4.6 Ten key
Key
Special function
None
When Fn key is being pressed.
0
1
2
3
4
5
6
Description
None
“0”
Display/non-display of SIP
‘<,>?/{[]}
None
“1”
Turns ON/OFF the backlight.
None
None
“2”
Decreases the contrast.
ABC
abc
“3”
When Fn key is being pressed.
Increases the contrast.
A
a
None
When Fn key is pressed.
A
a
None
When Fn key is being pressed.
A
a
When Input switch-over key is being
pressed.
A
DEF
a
def
“4”
Initiates calibration.
GHI
ghi
“5”
Darkens the backlight.
JKL
jkl
“6”
Brightens the backlight.
MNO
mno
“7”
Initiates application
[ HKEY_LOCAL_MACHINE\HARDWARE\DEVICEM
AP\KEYBD ]Fn7LaunchPath : SZ
PQRS
pqrs
“8”
Initiates application
[ HKEY_LOCAL_MACHINE\HARDWARE\DEVICEM
AP\KEYBD ]Fn8LaunchPath : SZ
TUV
tuv
None
When Fn key is pressed.
A
a
None
When Fn key is pressed.
A
a
None
When Fn key is being pressed.
A
a
None
When Fn key is pressed.
7
When Input switch-over key is being
pressed
None
When Fn key is being pressed.
A
a
When Input switch-over key is being
pressed.
A
a
8
Continue.
39
9
None
When Fn key is being pressed.
A
a
ENT
CLR
None
When Fn key is being pressed.
None
When Fn key is being pressed.
When Input switch-over key is being
pressed
A
a
“9”
Initiates application
[ HKEY_LOCAL_MACHINE\HARDWARE\DEVICEM
AP\KEYBD ]CardLaunchPath : SZ
WXYZ
wxyz
Returns.
No effect.
Deletes one character.
Performs as ESC.
!@#$%~&*()
_~’+=|\:;”
•
Repeatable keys
Only “0” to “9” keys can be held down and used to repeat an effect. In order to have the same effect on the cursor
keys, the registry must be set as follows. After changing the registry be sure to perform a reset on the terminal.
Registry location
Key Name
Setting Value
: HKEY_CURRENT_USER\ControlPanel\Keybd
: RepeatCursor
: DWORD: 0 (“Repeat”) / 1 (“Does not repeat”)
•
Click sound
The key click sound can be in effect by using the library for buzzer output in the key driver. A sound for a key is
emitted when the key is pressed, not when it is released. A key click sound will not be in effect while the key is held
down (i.e. being repeated).
•
Disabling the Fn key operation
If pressed together with the Fn key, a key that effects each special operation can be disabled individually through
the registry settings.
Registry location : HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\KEYBD
Key Name
Setting Value
"DisableFn9"
dword:0 / 1
enable/disable
"DisableFn8"
dword:0 / 1
enable/disable
"DisableFn7"
dword:0 / 1
enable/disable
"DisableFn6"
dword:0 / 1
enable/disable
"DisableFn5"
dword:0 / 1
enable/disable
"DisableFn4"
dword:0 / 1
enable/disable
"DisableFn3"
dword:0 / 1
enable/disable
"DisableFn2"
dword:0 / 1
enable/disable
"DisableFn1"
dword:0 / 1
enable/disable
"DisableFn0"
dword:0 / 1
enable/disable
"DisableFnCLR"
dword:0 / 1
enable/disable
"DisableFnF4"
dword:0 / 1
enable/disable
"DisableFnF3"
dword:0 / 1
enable/disable
"DisableFnF2"
dword:0 / 1
enable/disable
"DisableFnF1"
dword:0 / 1
enable/disable
In order to make the setting effective, performing a reset on the terminal is necessary after changing the registry.
40
•
Notification of the Fn key being pressed
When the Fn key is pressed, the current Fn mode/canceled status can also be notified to application.
•
Preventing Power OFF by key and notification of it being pressed
It is possible to disable turning OFF the power with a specific key using the registry settings. However, the power
must be turned OFF with SoftOff API function in application program.
•
Disabling the Power OFF key for specified period right after turning on the power
Since right after turning ON the Power the specific Power OFF key continues to be disabled for a specified period
of time as set in the registry (Default = 5 seconds).
•
Setting the time period while the Power key is held down
The user can set a duration of time for which the Power key should be held down until it takes effect. The default
values are approx. 1 second for ON, and approx. 1 second for OFF. These can be set at 500 milliseconds
increment.
•
Enabling/locking the Input switch-over key operation
It is possible to enable or lock (fix) the Input switch-over key operation in application.
•
Notification of the Input switch-over key being pressed
When the Input switch-over key is pressed, it is possible to post notification of this fact by issuing
WM_USER+0x506 message to application.
•
Enabling/disabling key lock
Key lock operation of each key except the Power key and Trigger keys can be enabled or disabled.
•
Changing the key mode transition
Transition of the key mode can be changed. For example, in the transition of key mode [1] → [A] → [a], if [A] is
set to disabled the transition will be carried out in order of [1] → [a] → [1]. The transition can be changed in
application using the System Library.
•
Disabling the interrupt by Trigger key
The interrupt by Trigger key can be set disabled. Once it has been set disabled, a key input by other key can be
accepted by the system even if the Trigger key is being pressed down. This setting can be made in application
using the System Library.
41
4.1.4 Touchpanel Functions
• Basic specification
Input actions through the touchpanel are permitted over the entire screen area. However, before putting this
touchpanel into use, the user is required to calibrate it.
The touchpanel has a resolution as shown below, which makes it possible for an application to obtain touch
coordinates so that the pointing device can be controlled with the obtained coordinates.
The tap sound will be issued through the library function, which is provided in the touchpanel driver for buzzer
output.
Table 4.7
Resolution
X direction
240 dots
Y direction
320 dots
100 to 150 points will be samples per second.
Sampling cycle
: 6 milliseconds (2 milliseconds x 3 times) / 150 points
Chattering remove time
: Back chattering 50 milliseconds only (5 times continuously with 10 milliseconds
span)
• Tap and hold
It is possible to display a pop up menu corresponding to the tapped object like Pocket PC by tapping and holding.
• Rotation of the touchpanel
When the screen is rotated by 180 degrees, the touchpanel is also rotated by 180 degrees accordingly.
42
4.1.5 Sound Functions
Audio
• Specifications
As the audio function, WAV replay from the dedicated earphone set and voice recording are supported. Stereo data
is first converted into monaural and then output via earphone set.
Playback
Table 4.8
KHz
Sampling
frequency
8
11.025
12
16
22.05
24
32
44.1
48
Monaural
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Stereo
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
A sampling frequency other than the above will not be supported.
Stereo/monaural There is no stereo effect because the earphone is monaural. 8 or 16 bit.
Record
Table 4.9
Sampling
frequency
KHz
Monaural
8
11.025
12
16
22.05
24
32
44.1
48
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
A sampling frequency other than the above will not be supported.
Stereo/monaural Only monaural input from the microphone. 8 or 16 bit.
• Software Mixer
Software Mixer of Microsoft is implemented in the terminal. With this feature, multiple sounds output by multiple
applications can be mixed and output. The output sound is in 44.1 KHz, 16 bits and stereo.
43
Buzzer
Based on the buzzer sound any optional sound such as read complete, key click, tap, alarm, and warning sounds
can be output. However, as they will not be output to the earphone set, use PlaySound function from the audio
driver as necessary.
• Buzzer Attribute
The attributes of the buzzer sound and their default values are shown in the following table.
Table 4.10 Buzzer attributes and default values
Sound
Tap
Key click
Alarm
Warning
Scanning confirmation
User-defined
Frequency (Hz)
2200
2600
2800
3000
3100
--
Time (ms)
25
50
150
100
75
--
Individual mute
ON/OFF
ON/OFF
ON/OFF
ON/OFF
ON/OFF
ON/OFF
Attribute
B_TAP
B_CLICK
B_ALARM
B_WARNING
B_SCANEND
B_USERDEF
• Setting the buzzer sound volume
The sound volume can be set to one of three levels; High, Medium, and Low. Mute can be set to ON/OFF for each
individual attribute. This setting can be also made in application with API function. In addition, the setting can be
made at the Control Panel property, and the values are written in the registry.
44
4.1.6 Memory Management Functions (RAM/RFA/FROM)
• RAM
This memory, which has a capacity of 32 Mbytes, is used either as the program memory when the program is
running or as the object storage device for storing temporary files, etc. Although the user can set this object storage
memory freely, data may be lost due to low battery voltage, etc. Therefore, it should be only be used as a temporary
area, and the FlashDisk must be used to store critical data files, etc.
The disk capacity can be modified according to the settings made to the WindowsCE Control Panel.
Table 4.11 Default
Memory
Program memory
Storage memory
Capacity (Initial condition)
Approximately 10,600 KB
Approximately 15,000 KB
• RFA (FlashDisk)
FlashDisk will emulate the disk’s sector portion under the file system of the OS.
The disk is released as user disk and can be accessed as FlashDisk folder. The user disk is available to freely
read/write user data such as user application, master data, transaction data, etc.
Data on this disk, which differs from the RAM disk which requires backup power, can be guaranteed even when
the terminal battery power is lost. Thus, it is recommended to use this disk to make a backup of data on the RAM
disk before turning off the power. Formatting and control of FlashDisk can be done by Storage Manager in Control
Panel. The capacity is 29.50 MB when formatted with default setting.
The FlashDisk driver has an additional function to format the disk automatically when the disk cannot be
recognized. There is a possibility that the FlashDisk driver will not mount the disk itself when the disk is not
recognized. In this condition, it is not possible to format the disk with Storage Manage in Control Panel.
Therefore, there is no way to mount the disk. In order to avoid this situation, the driver will format the disk when
the disk is not recognized after a reset operation. A prompt will be displayed for confirmation purposes A user can
select to format or not.
• FROM (OS ROM)
This FROM with physical size of 32 MB of memory space is to store the loader, OS, and diagnostic program. A
part of this space can be used for storing the security information such as terminal IDs as well as data for detecting
battery voltage, etc. Data cannot be written into this memory space.
45
4.1.7 LED Functions
Objective LEDs to be controlled include those which are used for user notification, read confirmation of the imager,
and call-in notification. The recharging complete LED at the right side of the terminal is not under software control.
It is under hardware control.
Right-side LED
• Battery charging status
Left-side LED
• Notification
• Confirmation of scanning
• Call-in notification
Fig. 4.4
•
User notification
This is used for posting notification of alarms, etc. It can be controlled from the OS side so that the LED is
illuminated at a specific timing with CeSetUserNotification function. Read confirmation of the C-MOS
Imager and call-in notification have the priority.
Table 4.12 Scanning confirmation/Data receipt notification
Item
Flashing interval
Period continuously On
Specification
In red, 1 second ON and 2 seconds OFF.
30 minutes (stops if VDET is detected.)
Remark
•
C-MOS Imager-read
User access is allowed through the dedicated library.
Table 4.13
Item
Successful read
Read error
Specification
Lights green for specified period of time, then turns off.
Lights red for specified period of time, then turns off.
Remark
•
Call-in confirmation
User access is permitted through the dedicated library. Reading a symbol with C-MOS Imager has the priority.
Table 4.14
Item
Call-in confirmation
Period continuously ON
Specification
Flashes in amber, 1 second ON and 2 seconds OFF.
30 minutes (stops if VDET is detected.)
46
Remark
4.1.8 C-MOS Imager Functions
With a monochrome C-MOS Imager, decoding and capturing of 1D symbologies and 2D symbologies as well as
images are supported. Not only a C-MOS sensor, but also a red LED for illumination and green LED for aiming
are integrated.
Basic specifications
•
Decodable symbologies
1D symbologies
- EAN/JAN
- UPCA/E
- Code39
- NW7/Codabar
- Interleaved 2of5 (ITF)
- Code93
- Code128
- MSI/Plessy
- IATA
- Code11
- RSS
- ISBT
2 D symbologies
- Code49
- PDF417
- MicroPDF
- Codablock
- Aztec
- AztecMesa
- QR Code
- MaxiCode
- DataMatrix (ECC000/050/080/100/140/200)
- Composite
- TLCode39
Postal codes
- PostNet
- Planet
- Australian
- BPO4State(British)
- Canadian
- Dutch
- Japanese
•
Decodable OCRs
- OCR A
- OCR B
- US Money
47
•
Image capture
Size
Grayscale
Image format
: Maximum 640 x 480 pixels (partial cut-out or n-skip is possible).
: 2 or 256 grayscales/pixel
: BMP, JPEG
•
Signature cut-out function
This function export decoded symbol data and signature (captured image) at the same time by reading
symbol and signature at a time. The position and size of the signature are to be set in the application software
by referring the position of the symbol. The function supports Code39, NW7(Codabar), Code128, PDF417
and Aztec symbologies.
•
Streaming function
This is to display the image continuously by the C-MOS Imager.
48
List of readable 1D and 2D symbologies
Table 4.15
Max.
Symbology
Read
Min.
(possible
Check
setting
character
value)
Transmission
of check
character
Output
format
Additional function
1D symbology
EAN8
Enable/disable
--
--
Enable/disable
Enable/disable
--
Appending 2 digits/5 digits
EAN13
Enable/disable
--
--
Enable/disable
Enable/disable
--
Appending 2 digits/5 digits
UPCA
Enable/disable
--
--
Enable/disable
Enable/disable
Output
Appending 2 digits/5 digits
NS
UPCE
Code39
Enable/disable
Enable/disable
-0
-26
Enable/disable
Enable/disable
Enable/disable
Enable/disable
(48)
Output
Converting UPCA,
NS
appending 2 digits/5 digits
Output
Converting FullASCII,
start/
appending code
stop bits
NW7/Codabar
Enable/disable
2
30
Enable/disable
Enable/disable
(60)
Output
--
start/
stop bits
Interleaved2of5
Enable/disable
4
(ITF)
Code93
40
Enable/disable
Enable/disable
--
--
Enable/disable
Disable
--
--
Enable/disable
Disable
--
--
30
Enable(3)*/dis
Enable/disable
--
--
(48)
able
80
Enable(3)*/dis
Enable/disable
--
--
--
--
(80)
Enable/disable
0
40
(80)
Code128/EAN128
Enable/disable
0
MSI/Plessy
Enable/disable
4
IATA
Enable/disable
4
64
(80)
able
Code11
RSS
Enable/disable
Enable/disable
1
1
30
Enable(2)/disa
(80)
ble
40
--
(80)
ISBT
Enable/disable
--
--
Enable/disable
1
81
--
--
--
--
Enable
Disable
--
--
Enable
Disable
--
--
Enable
Disable
--
--
Enable
Disable
--
Enable
Disable
--
2D symbology
Code49
(81)
PDF417
Enable/disable
1
2000
(2750)
MicroPDF
Enable/disable
1
366
(2750)
Codablock
Enable/disable
0
Aztec
Enable/disable
1
AztecMesa
Enable/disable
1
200
(2048)
2000
Full/Compact
(3750)
500
(3750)
Continue.
49
--
QR Code
Enable/disable
1
MaxiCode
Enable/disable
1
2000
Enable
Disable
--
--
Enable
Disable
--
Carrier message
Enable
Disable
--
ECC000/050/080/100/140/
(3500)
150
(150)
DataMatrix
Enable/disable
1
1500
(1500)
Composite
Enable/disable
1
200
300
--
--
(300)
TLCode39
Enable/disable
--
--
--
--
--
--
PostNet (USA)
Enable/disable
--
--
--
Enable/disable
--
--
Planet
Enable/disable
--
--
--
--
--
--
Australian
Enable/disable
--
--
--
--
--
--
BPO4State (UK)
Enable/disable
--
--
--
--
--
--
OCR fonts
Canadian
Enable/disable
--
--
--
--
--
--
Dutch
Enable/disable
--
--
--
--
--
--
Japanese
Enable/disable
--
--
--
--
--
--
OCR
Enable/disable
--
--
--
--
--
OCR A/B, US Money
In the table above, the values of “Max.” are just references. Actual readable ranges will vary according to the
conditions of the printed symbols (resolution, PCS, etc.) and surrounding circumstances.
They are figured out by using sample symbols which are configured with only numeric. In case of symbols
configured with alphanumeric, the respective values will be reduced to two thirds, or one third for symbols
configured with Kanji fonts (Japanese fonts) and binary codes.
50
Special Functions
•
Related to decoding symbols
Decode Centering Mode
This function specifies the decoding area covered by the illumination LED. This function is useful if there are
several symbols on one sheet or label and only one of them needs to be read.
Multiple-step Scanning
This function enables to decode continuously while the Trigger key is being pressed. The same decoded
symbols cannot be decoded again. (Although there is a restriction in the number of symbols and data buffer
size.) This function is useful if some symbols are printed on one sheet because it is not necessary to push the
Trigger key repeatedly.
Package Scanning
This function enables to output decoded data altogether. The decoded symbols cannot be decoded again like
multiple-step scanning. This function is useful when more than one symbol is to be read together like JAN
code for books or product tag.
•
Related to scanning operation
LED Intensity Adjustment
This function adjusts intensity of the aiming LED and illumination LED of the C-MOS Imager. It is possible
to adjust intensity according to the surrounding brightness and the distance between the symbol and the
terminal. If the intensity is set to zero, the LED is off. Therefore, this setting is useful when used outdoor
where the illumination LED is not needed, or when a stamp in red is to be read.
Contrast Ratio Adjustment
This function adjusts the contrast ratio of the captured image/symbols. This function is useful when the
symbol part reflects light such as metal.
51
4.2 Communication Functions
4.2.1 Basic specifications
• Port assignment
Communication capability with infrared I/F is supported.
Table 4.16 Assignment of COM ports
COM Port
COM2:
COM3:
COM4:
COM5:
COM7:
Assignment
Remark
Card modem
IrDA (IrCOMM)
Card modem 2
Bluetooth (Virtual COM)
USB
• Concurrent connection of multiple devices
The following explains the combination of COM ports, described above, that can be used at the same time.
Wireless LAN and Bluetooth utilities cannot run at the same time, because they use the same frequency
bandwidth.
Table 4.17
COM2:
COM2:
COM3:
COM4:
COM5:
COM7:
Yes
Yes
Yes
Yes
COM3:
Yes
COM4:
Yes
Yes
Yes
Yes
Yes
Yes
Yes
COM5:
Yes
Yes
Yes
COM7:
Yes
Yes
Yes
Yes
Yes
Note:
If multiple devices are connected for operation at the same time, transfer efficiency may be reduced or error
occurrence rate may increase, since the terminal will have a larger process load applied. Therefore, whenever
possible operate so that concurrent use of multiple devices is avoided.
52
4.2.2 IrDA Communication
• COM3
Generally, COM3 is assigned to IrComm to enable FIR (up to 4 Mbps) communication.
Table 4.18
Item
Synchronization method
Transfer rate (bps)
Specification
Start/stop method
9600, 19200, 38400, 57.6 K, 115.2 K, 576 K, 1152 K, 4 M
Remark
IrDA negotiation parameters can be set with the following registry entries. The setup content is represented in a
bitmap format, as specified by IrDA protocol. Setup values should be set so as to be within the range required to
support hardware such as the IrDA controller, etc.
[HKEY_LOCAL_MACHINE\Comm\Irsir1\Parms]
Table 4.19
Name
“Baud”
“maxTAT”
“DataSize”
“WinSize”
“BOFs”
“minTAT”
“LinkDisc”
Type
dword
dword
dword
dword
dword
dword
dword
Default Value
0x1FE
0x01
0x3F
0x7F
0x40
Specified later
0x7F
Description
Baud Rate
Maximum Turn Around Time
Data Size
Window Size
Additional BOFs
Minimum Turn Around Time
Link Disconnect/Threshold Time
Notes:
•
The transfer rate cannot be set in application.
•
Connection with other equipment than the recommended IrDA equipment with the terminal will not be
guaranteed.
53
4.2.3 Bluetooth Communication
•
COM5
This will operate as a virtual COM that is compatible with Bluetooth Ver. 1.1 ( http://www.bluetooth.org/ ).
Table 4.20
Item
Profile
Physical transfer rate of Wireless LAN part
Specification
Serial profile
723.2 Kbps (maximum)
In addition, it supports the following profiles.
GAP
: Generic access profile
SPP
: Serial port profile
SDAP : Service discovery application profile
FTP
: File transfer profile
OPP
: Object push profile
DUN
: Dial-up networking profile. Client only
LAP
: LAN access profile. Client only
GOEP : Generic object exchange profile
54
Remark
4.2.4 USB Communication
•
COM7
The communication mode supports the full-speed mode (12 Mbps) through Universal Serial Bus Specification
Revision 1.1 ( http://www.usb.org/ ). Communication from PC in the device mode is valid only for serial
connection. This cannot be used for HT-to-HT transfer, modem connection and printer connection, etc.
Table 4.21
Item
Synchronization
Transfer rate
Specification
Remark
-12 Mbps
Table 4.22 Target connection
Item
OS
Software
Specification
Windows2000, Windows98 and other successor OS
ActiveSync version 3.5
55
Remark
4.3 PC Card
4.3.1 Basic Specifications
Two types of card slot are provided in the terminal; PCMCIA and removable CF slot.
The PCMCIA slot is compatible with Type II 3.3/5.0V card conforming to PC CARD STANDARD Rel7.0. The
CF slot is removable, and is compatible with CF Type II 3.3V card conforming to CFA Rev1.4.
•
Virtually plugging/unplugging a card
Since the terminal is generally used with the WLAN card being installed (DT-X10M30RC, M30RC2, M30URC,
M30URC2 only), the card driver is always called to supply power to the card at the same time when the terminal
power is turned on. As the result, it is continuously supplied power even when the card is not accessed, thus
accelerating the battery power consumption. So, in order to avoid this excessive power consumption, CASIO will
provide an API that can virtually plug or unplug the card from user application. While the card is not used, this API
can make an apparent condition as if the card is unplugged by disabling the card detection terminal, and, if required
by the user, it returns the card detection terminal enabled.
•
Deleting the message when the card power is turned on
A power supply message at the time when the card is inserted will not be issued. The user should be aware of this
fact when accessing card.
56
•
WAKE ON card functions
WakeOnRing
The WakeOnRing is a function to wake up the terminal while its power is turned off when a call-in signal
arrives and then notifies the event of call-in to the modem card to the application program.
Both setting for the PC card controller and setting for the modem controller are required in order to issue an
interrupt signal when a call-in signal arrives. Regarding setting for the modem controller, setting is actually
whether a RING signal in the modem card is sent out or not and this is set by AT commands. On the other
hand, setting for the card controller is whether to drive the CF I/F STSCHG (Status Change) signal or not
when the RING signal is valid. This setting is done by the register in the card controller. In the latter case,
setting is done by the serial card driver and the setting method and explanation are described below. The
former setting by AT commands should be performed by the user application. This method is not described in
this manual.
In the following description, the case that the serial card driver is operating and WakeOnRing is enabled is
called WOR mode. Other cases are called Normal mode.
DT-X10
3. Send call-in signal(RING)
4. STSCHTG/IREQ
HAL
Push Server
5. Cause for wakeup
2. Request of call-in
PCMCIA driver
Modem card driver
Contents Server
6. Event
Set WOR
1. Mail arrived/WEB modified
Vertical application
7. Wakeup
Contents
9. Receive new mail
Read new web page
Fig. 4.5
57
Child process
WakeOnRing Specifications
The serial card driver behaves under WOR and Normal modes as follows:
WOR Mode
1.
Supply power to the modem card regardless of the power ON/OFF status on the terminal.
2.
When WakeOnRing call-in is generated in the modem card, an event of WakeOnRing (event with
name, WakeOnRingEvent) will be issued.
3.
When WakeOnRing call-in is generated in the modem card while the terminal’s power is off, wake
on the terminal and then issue a WakeOnRing event.
4.
When the card is ejected on WOR mode while the power is OFF, the terminal will be “Wake On”.
However, WakeOnRing will not be issued and the HTSYS driver will broadcast the card insert/eject
message (WM_USER+0x507).
5.
While the terminal’s power is OFF on WOR mode, power supply to the card will not stop until the
power supply to the card is stopped by generation of VDET3 due to low capacity of the battery.
Normal Mode
1.
The power to the modem card will be supplied while the application keeps the COM port of the mode
open. When the COM port is closed, power supply to the card will be stopped.
Setting of WOR mode
The procedure to set WOR mode of the serial driver is as follows:
1.
Mode setting will be done by setting CLB_BUTTON_ARRIVAL flag to the parameter of
CLBSetBootableButtons function and calling this function.
2.
3.
4.
Calling sequence:
BOOL CLBSetBootableButtons ( DWORD dwBootableButtons )
Parameter:
DWORD dwBootableButtons
CLB_BUTTON_LEFTTRIGGER
: Enable power ON by the left Trigger key
CLB_BUTTON_RIGHTTRIGGER : Enable power ON by the right Trigger key
CLB_BUTTON_INBOX
: Enable power ON by mounting on the cradle
CLB_BUTTON_ARRIVAL
: Enable power ON by call-in signal
CLB_BUTTON_NONE
: Enable power ON by Wakeup
Open the COM port (normally COM2) from the application.
Issue AT commands to the modem card to set WakeOnRing operation.
Close the COM port of the modem card.
Resetting WOR mode
The WOR mode of the serial card driver will be reset and returns to Normal mode if any of the following
cases occurs. In order to set WOR mode again, repeat the procedure described above.
1. CLBSetBootableButtons function is called after resetting CLB_BUTTON_ARRIVAL flag in the
parameter, and when the COM port of the modem card is opened and closed.
Note:
It is recommended that AT commands to reset WakeOnRing should be issued in the application.
2. When the terminal is reset.
3. When the modem card is ejected.
4. When VDET3 is generated while the power is OFF in the WOR mode.
58
4.4 Power Control
4.4.1 Power Management Functions
Reset Control
During normal use, meeting one of the following conditions will trigger the reset operation on the terminal.
•
Power ON reset
This will occur when the battery back is installed and the power is turned ON that is neither being supplied power
externally nor has the battery pack and memory backup battery installed, i.e. has no power whatsoever being
supplied to it. The DRAM data storage memory (data stored by the user, database, applications installed on
DRAM, etc.), the program execution memory, and the memory used by the driver will be “All-initialized
(cleared)”. However, data in FROM can be retained without modification.
•
User reset
This will occur if the Reset switch is pressed while the terminal is operating (power ON). Nothing will happen if
the Reset switch is pressed while the power is OFF. With this operation the program execution memory in DRAM
and the working data not saved will be “cleared”, and the data storage memory will be “retained”. Data in FROM
will also be retained.
•
Full reset
Press the Reset switch while holding down the Power key during power ON. At this moment, a confirmation
message querying the user if it is OK to clear the memory will be displayed twice. Each confirmation must be
made with either Trigger R key or Trigger L key. If the Trigger R key is pressed for both the first and repeated
confirmation messages, the user memory (data storage memory and program execution memory) will be cleared
as a result of the initialization.
Memory Corruption Check
The WindowsCE OS usually checks at the time of reset whether the RAM data has been corrupted, and, if it has,
an attempt is made to unconditionally initialize the memory in question without notifying the user. To prevent the
memory from being initialized without a notification being issued to the user, this system is designed to check the
memory check data in the driver’s working area to detect the memory status before the OS process becomes active
following the boot-up, and, if some part has been corrupted, a warning message is displayed on the screen.
•
Checking memory corruption
Write a fixed character string (256 bytes) in the driver’s working area in RAM before a full-reset is attempted. Then,
check this character string at every boot-up. If the contents are not consistent, the reset process will take place after
the following message is displayed.
•
Message
Message at the time of memory corruption will be as follows.
“A problem with memory contents has been found. Press the Trigger R key to continue with the reset procedure,
which restores normal system operation. Note that if the system determines that user memory cannot be repaired, it
will delete all user data currently in memory. See the User’s Guide for details about initializing memory.”
59
Causes of Power ON
Power ON causes include the following:
1. The terminal power is turned ON if the Power key is pressed.
2. According to the alarm function, the power is automatically turned ON at a specified time.
3. If the terminal is mounted on the Bridge Satellite Cradle, the power is automatically turned ON. (This applies
only the case where the power is supplied from the Cradle.)
4. It is also possible to turn ON the power by pressing one of the Trigger keys.
5. The moment when a call-in signal arrives, the power is turned ON, if the communication card is mounted
and the card power is on.
Notes:
•
For the above causes 3 and 5 it is also possible to control (Disable) turning ON the power via the CASIO API
of application program.
•
For the above cause 4 it is also possible to control (Enable) turning ON the power via the CASIO API of
application program.
Conditions under which Power ON is disabled
An attempt of powering ON will be rejected when the following conditions are checked and found to be true.
1. Battery pack’s voltage is reduced to a level insufficient for start-up.
2. When the battery cover lock is released.
Causes of Power OFF
Power OFF causes include the following:
1. The terminal power is turned OFF if the power key is pressed while the terminal power is ON (Disabling this
setting is also permitted).
2. According to the setting made with software, the power will be automatically turned OFF (APO) if any
action (pressing a key, tapping on the touchpanel, accessing disk, card or communication) has not been
sensed for a specified period of time.
3. The power will be automatically turned OFF due to a low battery pack’s voltage (VDET2/VDET3).
4. The power will be turned OFF if the battery cover lock is released.
5. The power will be automatically turned OFF if a voltage drop occurs from an overload of the CF card.
Power OFF time
When VDET2, VDET CF, or VDET3 is detected, the terminal power will be automatically turned OFF within a
specified period of time.
Case of resume OFF due to VDET2 or VDET CF
: 200 milliseconds
Case of emergency OFF due to VDET3
: 300 microseconds
60
Power Save Control
The following modes of the power-saving control are provided.
•
Idle
Where the system has no application to execute and waits for any event to occur, the CPU enters in the idle state to
save the power. The peripheral devices are continuously operating.
•
APO (Auto Power OFF)
If any action (of pressing a key or tapping on the touchpanel) has not been sensed for a specified period of time, the
terminal power will be automatically turned OFF. Enabling/disabling the APO function can be set using a method
of software. The APO time can be set on the Control panel.
•
Dim function and ABO (Auto Backlight OFF) function
If any action (of pressing a key or tapping on the touchpanel) has not been sensed for a specified period of time, the
backlight will be automatically dimmed and then turned off.
Whether to enable or disable and the time settings of ABO function and the dim function can be modified through
the property in the Setup window or the Contrast & Brightness utility.
61
Power State Control
The terminal takes the following power states.
Table 4.23
State
Discharge
RTC backup
Sleep mode
Run mode
Idle mode
Turbo mode
Description
Condition in which the battery pack runs down and the super capacitor has fully discharged.
Both RAM and RTC cannot be backed up.
Condition in which only RTC is backed up. RAM contents are not retained.
The terminal is OFF and the peripheral devices connected also stop. Both RAM and RTC
are backed up.
Condition where the system and applications are running (at 200 MHz).
Both the terminal and applications have nothing to execute and wait for any event to occur.
The peripheral devices are operating.
Sets the CPU clock frequency to the high-speed rate (300 MHz).
Image of the Power State Control :
Discharge
Battery pack/Memory battery Insertion
Sub-battery discharged
Main Battery discharged
RTC backup
Power ON/Wakeup
Power ON
Run Mode
Sleep Mode
Power
OFF/VDET2/VDET3
BcoverOpen
Interrupt
Turbo bit On
Turbo bit Off
No Activity
Idle Mode
Turbo Mode
Fig. 4.6
CPU Clock Frequency Control
The method of moving to the Turbo mode can be set by each user, and the CPU clock frequency can be switched
from 200 MHz to 300 MHz. (The CPU temperature is always monitored by the thermostat in order to prohibit
switching to 300 MHz when the temperature reaches to 80 degrees centigrade.).
62
Low Voltage Monitoring Control
There are four low voltage detection levels with the terminal’s hardware. For the RAM retaining period effective at
each detection level refer to the reference manual.
Table 4.24
Level
Description
Operation
Next boot-up method
VDET1
Low battery pack voltage warning
Low battery pack voltage
-----warning display
VDET2
Low battery pack voltage resulting in
Power OFF
Resume (a warning appears at
OFF
the start-up.)
VDET3
Low battery pack voltage resulting in
Critical OFF
Warm boot (a warning appears
emergency OFF
at the start-up.)
VDETCF Low CF voltage resulting in OFF
Power OFF
Resume (a warning appears at
the start-up.)
1. Battery Pack
Table 4.25
Status
Level
•
•
AC
Notation
External power
Charge
Charging
Normal
1
2
3
Main battery
Good
Low
Very low
Description
Condition where the external power is supplied and the recharging is
completed.
Condition where the external power is supplied and the recharging is in
progress.
Condition where the system is powered by the battery pack.
Condition where the battery pack is fully charged or has enough power.
Condition where the battery pack capacity is less than half.
When VDET1 is detected.
Conditions and levels of the battery pack
Basically, the battery condition will be checked every 5 seconds. As long as the power management property
is displayed, the battery condition is checked every second. After averaging the ten times of the AD converter
data in the past regarding the supply voltage, determine the three levels of warning displays; “Remains very
low (10% or less)”, “Low (25% or less), and “OK (75% to 100%)”. When VDET1 occurs, this value has
fallen to 10%.
Precautions when using standard battery pack (DT-5023BAT)
While the terminal is operating with the standard battery pack, operating a wireless LAN card installed in the
PCMCIA slot will shorten the life of the battery. Observe the battery level while operating such the card.
2. User notification
If it is required to monitor the voltage in user application program, use GetSystemPowerStatusEx2 function
of Win32 API to fetch the value. When VDET1 occurs, PBT_APMBATTERYLOW will be issued through
WM_POWERBROADCAST message.
63
4.4.2 Charge/Power Supply Functions
The dedicated battery packs (option; DT-5023BAT, DT-5025LBAT) can be charged with the optional dual battery
charger (DT-5022CHG). In addition, power supply and battery charge can be achieved if the terminal is mounted
on the Cradle-type Battery Charger or the Bridge Satellite Cradle.
Charging Time
Table 4.26
Option
Dual battery charger
DT-5022CHG
Cradle-type battery
DT-169CHGE
charger
Bridge Satellite Cradle
DT-160IOE
Power supply
No
Yes
DT-5023BAT
Approx. 2.5 hours
Approx. 2.5 hours
DT-5025LBAT
Approx.5 hours
Approx.5 hours
Yes
Approx. 2.5 hours
Approx.5 hours
Note:
For the exact charging time of the battery packs with each option refer to the DT-X10 Series Hardware Manual.
64
5. Application Programs/Tools
5.1 Microsoft Application Programs
Microsoft application programs and modules installed in the terminal are as follows.
Table 5.1
Software
File Explorer
ActiveSync Client
OBEX
XML
VPN
EAP
JScript
Network redirector
SIP
HandWriting
Description
Explorer
ActiveSync
ObjectExchangeProtocol
MSXML3.0
VirtualProvateNetwork(PPTP)
ExtensibleAuthenticationProtocol
Jscript5.5
To share the network with PC.
Software keyboard
Hand writing
•
File Explorer
This is a file management program provided by Microsoft.
•
Connecting the Terminal to PC using ActiveSync
Follow the steps below to connect the terminal to PC via USB interface.
1. Access the menus in order of Start → Setting → Control Panel to open the control panel.
2. Select Connection with PC in the control panel.
3. Make sure the connection with PC designates “USB”. If not, click the change button and select USB in the
list box and tap OK button. Tap OK button in the connection dialogue of PC to close the setting.
4. When the connection with PC is established using a USB cable, ActiveSync will start up automatically. In
case your PC requests a new driver, install the USB driver that is released by Casio.
5. In case ActiveSync will not start up automatically in the step above, start up repllog.exe in Windows
folder to connect the terminal to PC.
Note:
For connecting the terminal to PC via the Bridge Satellite Cradle using ActiveSync, refer to “Up/Download
Manual” separately available.
•
File synchronization in ActiveSync
The synchronization file with PC can be stored in the My Documents folder of the terminal. Synchronization with
OutLook application program (Job, Schedule, Contacts) is not possible.
65
•
ActiveSync connection via LAN
The steps to connect the terminal to PC via LAN are as follows:
1. Establish partnership using IrDA, serial and cradle.
2. Take out the cable and run LAN.
3. Access the menus in order of Start → Program → Communication and select LAN ActiveSync.
4. A dialog will be displayed. Select Network connection.
•
SIP
This is a software keyboard provided by Microsoft.
•
HandWriting
This is an input keyboard provided by Microsoft for hand writing.
•
PC Connection
This is a tool in the Control Panel to set up the settings required to connect the terminal to PC.
•
Remove Programs
This is a tool in the Control Panel to delete installed programs in the terminal.
•
System
This is a tool in the Control Panel to set up the properties of the system, memory allocation, naming device and
general.
•
Stylus
This is a tool in the Control Panel to adjust the speed of double taps with the stylus and to perform the calibration
on touchpanel.
•
Dial
This is a tool in the Control Panel to set up a dial pattern for communication via phone line.
•
Network and Dial-up Connection
This is a tool in the Control Panel to set up the password used to enter before starting up the terminal.
•
Power Management
This is a tool in the Control Panel to set a period of time for turning off the power automatically if the terminal is
not being accessed for a while, to set up the power save mode, and to check the remaining battery capacity.
•
Volume & Sounds
This is a tool in the Control Panel to set up the sound volume, to set an event when to turn on the buzzer, and to set
an attribute of the sound.
•
Display
This is a tool in the Control Panel to set up the properties of display, background, appearance, etc.
•
Owner
This is a tool in the Control Panel to set up the owner’s information.
66
•
Certificates
This is a tool in the Control Panel to edit trusted certificates list.
•
Regional Settings
This is a tool in the Control Panel to set the properties about region, number, currency, date and time.
•
Date/Time
This is a tool in the Control Panel to set date and time.
•
Input Panel
This is a tool in the Control Panel to set the properties of Input Panel.
•
Storage Manager
This is a tool in the Control Panel to format the FROM. All folders and files in the FlashDisk will be deleted if the
formatting is carried out.
67
5.2 Casio Original Application Programs (1)
Beside the Microsoft applications the terminal has the CASIO original application programs available. This
chapter describes application programs preinstalled in the terminal. Other CASIO application programs you need
to install as required will be explained in Chapter 5.3 “Casio Original Application Programs (2)”.
Mail
This mail software uses the Inbox module available from Microsoft.
Browser
This browser software uses Internet Explorer 5.5 module available from Microsoft.
FLCE
FLCE is a program for not only communicating between two terminals but also communicating with the
upload/download utility of PC via the Bridge Satellite Cradle. File transfer can be executed by specifying each path
on the original side and destination side. On FLCE, all parameters for designating the operation, files to be
transmitted/received, storage destination, etc., will be specified as an argument.
Table 5.2
Type
Setup
command
Operation
command
Function
Communication
environment setup
Command
/Y={device baud
rate, mode}
Special option
None
File send
/S
O, R
File receive
/R
O, R
File send (append)
/A
None
File delete
/D
O, R
File move
/N
None
Clock send
/T
None
Idle start
None
Script file name
Remark
Device = COM1/IrDA
Baud rate = 9,600 to 115,200
Mode = h: 1 minute of timeout
i: Infinite timeout
Valid only for HT-to-HT
transfer
FCHK
The software is a file check utility to check if file copied from PC, etc., has been properly installed in the target
terminal. It features with the following two functions.
•
Creating a list file
If a file name to be transferred from the terminal is specified, a list file will be created from the list of transferred
files and checksum data, which is calculated for all the files to be transferred. Checksum data of the list file will also
be created.
•
Comparison of list files
File information of a file transferred from the partner station (parent terminal) and the contents of a list file
(FCHK.LOG) are compared, the checksum data of the list file is calculated and compared, and the checksum data
of all the transferred (copied) files is calculated and then compared with the checksum data of the list file.
68
Automatic Setup
Setup.exe or AutoRun.exe located under the given directory of memory card will be automatically executed when
the terminal is reset or the memory card is inserted. This utility is an extra to allow automatic installation of
application program from a storage device.
Backup Tool
Backup Tool is used to make a backup or restore various user data on the terminal into memory card or FlashDisk.
Should user data accidentally be corrupted, use this backup utility to properly recover (restore) the user data.
Backed-up contents
•
Files
Include those which are created with user application, additionally installed program, and files transferred
from desktop PC, and so on.
•
Registry
Contains various settings of WindowsCE and built-in program setup information, and so on.
•
Database
Includes data in the Inbox.
Notes:
•
Data backup (and restoring from the backed-up data) takes several tens of seconds to several minutes
depending on the volume of data.
•
For security purpose it is possible to enter a user password at the beginning of backup. This results in that data
cannot be restored unless the correct password is entered.
•
It is recommended to make backup while the power is supplied via Cradle.
•
On this terminal the destination of backup and restore can be selected, since two storage cards of PCMCIA
and CF and FlashDisk are available.
Contrast & Backlight Utility
Contrast, backlight and auto-reduction of backlight intensity can be set up.
Buzzer Setting
The buzzer sound volume in three levels, Low, Medium and Loud, and an event to sound the buzzer can be set.
Welcome Wizard
The Welcome wizard function and user setup information installed in the conventional PPC can be skipped over.
This wizard allows the user to set up the settings for touchpanel, owner information and date/time.
Bluetooth Setting Tool
The Bluetooth setup tool is a utility used to set up and establish the connection with the Bluetooth device.
Copy HT-to-HT
This is a tool to easily create a child terminal. It copies the contents of a master terminal that has been properly set
up onto a child terminal via IrDA interface without modification.
WLAN Power Setting Tool
This tool provides capability of various settings for wireless LAN and sight survey tool (created by a card
manufacturer).
69
C-MOS Imager Demonstration
This application displays a result of reading symbols (1D and 2D symbologies). It can also display images in white
and black colors captured with the C-MOS Imager and save it as bitmap file to the My Documents folder.
C-MOS Imager Setting Tool
This tool is to set various parameters of the C-MOS Imager for reading symbols efficiently and accurately.
C-MOS Imager Application
This is an application program running at the behind when the user scans symbols. It displays a result of the
scanning in edit box of user application. Since double-byte codes are included in the output data, the data cannot be
output to the Key buffer. The function of Ctrl+”V” must be used instead. Thus, user application is not allowed to
use this function (Ctrl+”V”).
LMWIN (Host Utility)
The upload/download utility is executed on HOST PC, and provides the following functions to the terminal
connected via the Bridge Satellite Cradle.
•
File transmission/File reception
•
File append transmission/File append reception
•
Sounding the buzzer.
•
Setting the date and time.
•
File delete/move/rename
•
Fetch disk information/fetch file information/set file information
•
Terminating the session.
•
Executing a child process.
•
Displaying a character string.
70
5.2.1 Card Backup Utility
Card Backup Tool is used to make a backup of or restore various user data on the terminal into memory card or
FlashDisk. Should user data accidentally be corrupted, use this backup utility to properly recover (restore) the user
data.
Backed-up contents
•
•
•
Files
Include those which are created with user application, additionally installed program, and files transferred
from desktop PC, and so on.
Registry
Contains various settings of WindowsCE and built-in program setup information, and so on.
Database
Includes data in the Inbox.
Notes:
•
Data backup (and restoring from the backed-up data) takes several tens of seconds to several minutes
depending on the volume of data.
•
For security purpose it is possible to enter a user password at the beginning of backup. This results in that data
cannot be restored unless the correct password is entered.
•
It is recommended to make backup while the power is supplied via Cradle or Battery charger.
•
On this terminal the destination of backup and restore can be selected, since two storage cards of PCMCIA
and CF and FlashDisk are available.
71
Backup
Select and execute the card backup tool with the following operation sequence: Start→ Programs→ Utility.
1. Close all open dialog boxes, if any. Also, make sure that sufficient battery voltage remains.
2. If the backup destination is a CF card, insert the memory card into the CF card slot.
3. Initiate the card backup tool by executing Start→ Programs→ Utility→ Card Backup operation
sequence.
4. Select the backup destination from the list box that appears. If the CF card is replaced with another one after
application is initiated, perform the following operation after making sure that the display contents have been
changed.
5. Tap Backup now button with stylus.
6. If the user wants to input a password, it must consist of no more than 256 characters. Since the password
specified here will be embedded as backup image, the user will be asked to re-enter it at subsequent system
restoration. Make note of the password. Enter the password two times for confirmation.
7. When Yes button is tapped with stylus, a flywheel icon indicating that backup is in progress appears, and
backup will be started.
8. A backup will be made in the selected folder, \Backup\backup.dat.
9. Several minutes are required to make the backup. During this interval, do not perform any operation,
including keyboard input and tapping on the touchpanel.
10. The current process can be aborted if Cancel button in the “Backup in Progress” dialog is tapped with stylus.
Screen Display
Storage card: ******* available
Data memory: ****** used
: Free space on the selected memory card
: Memory space used by the system
If the display shows the following message, backup data can be stored successfully.
Storage card > Data memory
Restore
1.
2.
3.
4.
5.
6.
7.
8.
Perform a Full Reset on the terminal in advance to clear all data. If required, secure sufficient memory space
through Settings→ System→ Memory execution sequence.
If backup data has been stored in CF card, insert it in the CF card slot.
Start up the card backup tool through Start→ Programs→ Utility→ Card Backup execution sequence.
Tap Restore now button with stylus.
Enter the same password that was specified during the backup operation.
A flywheel icon indicating that restoration is in progress appears, and restoration will be started.
The restoration process requires several minutes. During this period do not perform any operation, including
keyboard input and tapping on the touchpanel.
Before returning to your operation, reset the terminal.
Note:
If the restore operation is not successful or if it is aborted in mid-course, system operation may become
unstable. If this occurs, always perform a full Reset, and then perform restoration again.
72
Delete backup data
1.
2.
Use stylus to tap “Backup File Delete” on the backup tool start-up screen.
When Yes button is tapped with stylus, the backup file will be deleted.
Error handling
If one of the following conditions exists, a manual backup, automatic backup or restore operation results in an error
and a corresponding error message will be displayed. In this case, solve the problem then make another attempt.
•
Battery voltage is low.
•
CF card is not inserted.
•
Insufficient CF card capacity
•
Backup data does not exist (at time of restoration).
Help
The user can invoke the Help screen with the following procedure.
•
Tap Start→ Help, in this order, with stylus.
•
To return to application, tap OK button in the top right of the screen.
Command Line Start-up Option
It is possible to call and use Backup Tool from the application by setting option parameters to the command line.
Syntax : CF_Backup.exe /*1/*2/*3
*1 : R, B
*2
*3
Either upper case or lower case will do.
R : Restore
B : Backup
Backup storage directory
For example, when stored in FlashDisk.
CF_Backup.exe /B/FlashDisk
\FlashDisk\Backup\Backup.dat will be created.
When restoring from Storage Card
CF_Backup.exe /R/Storage Card
Will be restored from \Storage Card\Backup\Backup.dat
Password
Only necessary when a password is needed to be set. It is OK not to set.
73
5.2.2 Automatic Recovery Tool
The Automatic Recovery Tool has been developed to recover immediately the memory contents in the
terminal to “Default settings” when the memory contents are not being retained by the operating battery pack
(DT-5023BAT or DT-5025LBAT) or by the memory backup battery if both batteries run down simultaneously.
However, data in the RAM area cannot be restored using this tool.
This tool comes with the DT-X10 Service Pack 1.
Preparation
Follow the steps to prepare the tool. It must be carried out manually.
•
Because Restore.exe is renamed to Setup.exe in Step 3 of this preparation procedure, rename
Setup.exe in folder of “\FlashDisk\CE\ARM” to SetApl1.exe which is the installer for Service Pack 1. If
file names SetApl2.exe and SetApl3.exe for user application program are generated in the folder of
"\FlashDisk\CE\ARM", both the files will be installed automatically when restoration is carried out. Using
this method, two user original application programs can be restored automatically.
Fig. 5.1 List of files in "\FlashDisk\CE\ARM"
•
Various settings such as IP address, SSID, WEP, etc and user application programs can be backed up and
then restored. Perform necessary settings at this preparation step.
74
•
Execute Restore.exe program in folder of “\FlashDisk\CASIO“ by double tapping the name on the screen.
Figures 5.2 to 5.4 below show screen transition from initiating the program until the backup is complete.
Fig. 5.2
Fig. 5.3
Fig. 5.4
75
Process flow of Restore.exe
1.
2.
3.
4.
Setting information about SetApl1.exe (for Service Pack), SetApl2.exe (for user application) and
SetApl3.exe (for user application) is registered in the registry file for their restorations.
Backup.dat file in folder of “\FlashDisk\Backup” is generated according to information in the RAM.
Restore.exe in folder of “\FlashDisk\CASIO” is renamed to Setup.exe and overwritten to "Setup.exe"
for service pack in folder “\FlashDisk\CE\ARM”.
Register a backup completion flag to the registry file.
Fig. 5.5
The following figures (Fig. 5.6) show an image of process flow of Restore.exe. Numberings 1 to 4 in Fig. 5.6
correspond to Steps 1 to 4 of “Process flow of Restore.exe” above.
RAM
FLASHDISK
CE
Windows
ARM
Registry
1.
SetApl1.exe (Driver etc.)
Driver etc.
SetApl2.exe (Application1)
Applications
SetApl3.exe (Application2)
Setting files
Setup.exe (Restore.exe)
SP.cab
3.
2.
CASIO
Restore.exe
Backup
Backup
Backup.dat
completion flag
Fig. 5.6
76
4.
Recovery Process 1
This is a recovery process for an event that data in the memory has not been deleted. Such event is “User reset
operation”.
1. When the reset switch is pushed, Setup.exe in folder of “\FlashDisk\CE\ARM” is initiated automatically to
check if a backup completion flag is registered in the registry file.
2. In case it is registered, Setup.exe checks each flag information of SetApl1.exe, SetApl2.exe and
SetApl3.exe and execute them if necessary.
Recovery Process 2
This is a recovery process for an event that data in the memory is deleted by performing a full reset or run down of
battery.
1. When the reset switch is pushed, Setup.exe in folder of “\FlashDisk\CE\ARM” is initiated automatically to
check if a backup completion flag is registered in the registry file.
2. In case, a backup completion flag has not been registered due to initialization of the memory caused by full
reset or run down of battery, the tab for Date and Time properties will appear. Set a current date and time
manually on this tab (setting manually is only this case).
Fig. 5.7 Date and Time Properties screen
3.
4.
5.
6.
Data is automatically restored from Backup.dat file in folder of “\FlashDisk\Backup” into the RAM. See
figure (Fig. 5.8) on the next page.
It registers also a backup completion flag in the registry file.
A tab requesting you to perform the reset will appear. After setting on the screen, tap OK button to close the
tab. A few seconds later the reset process starts automatically. This software reset is “MUST” to validate the
restoration.
After the software reset, SetApl1.exe or SetApl2.exe or SetApl3.exe or all will be initiated if necessary.
And then Service Pack and user application program will be restored.
77
The figure (Fig. 5.8) below shows an image of the process flow described in Steps 3 to 6 on the previous page.
RAM
FLASHDISK
CE
Windows
ARM
Registry
SetApl1.exe (Driver etc.)
Driver etc.
SetApl2.exe (Application1)
SetApl3.exe (Application2)
Applications
1.
Setting files
Setup.exe (Restore.exe)
SP.cab
CASIO
Restore.exe
Backup
Backup
Backup.dat
2.
completion flag
Fig. 5.8
Notes:
•
Service Pack and application programs will be overwritten automatically even if the files are same with ones
before the backup considering that the Service Pack and application programs are being updated after the
backup.
•
Log function
Log history for maximum 30 times of backup and restoration is saved in \FlashDisk\CE\ARM\Restore.log.
For any log history exceeding over 30 times, older ones will be deleted first.
•
To skip restoration
To terminate the restoration operation press 5 key to skip the restoration. The buzzer sounds in a short period
and then the restoration is skipped.
78
Example of System Configuration for Recovery (Automatic timer setting)
The figure (Fig. 5.9) below shows an example system configuration for recovery. It is for automatic timer setting.
Either the terminal is connected to the Clock Server via the cradle or via Access-Point in Wireless LAN
configuration to download data (green line in the figure) of the clock from the Server. And, it updates the internal
clock data in the terminal itself.
In case PC available in store
In case Clock Server in Headquarters
: download via the cradle
: download via the cradle
USB/RS-232C
IEEE 802.11b compatible
Cradle
LMWIN Server
(Clock Server)
Fig. 5.9 Example of system configuration for recovery
Note:
The recovery for automatic timer setting requires a menu such as “Set the timer automatically” in a user
application.
79
5.2.3 FLCE
FLCE is a program for not only communicating between two terminals but also communicating with the
upload/download utility of PC via the Bridge Satellite Cradle. File transfer can be executed by specifying each path
on the source side and destination side. On FLCE, all parameters for designating the operation, files to be
transmitted/received, storage destination, etc., will be specified as an argument.
Operation Procedure
FLCE is an executable program that can be operated in one of two ways:
•
Stand-alone
•
Child process to be called from user application
When FLCE is used as a stand-alone program, a dialog for entering parameters will appear when it starts up. Enter
the necessary parameters in the dialog, then press OK button. However, if this program is to be operated in the
idle-start mode, either press Cancel button or OK button without entering anything. In order to perform a file
transfer from user application, initiate FLCE as a child process with the specified arguments. After communication
is completed, the application will receive a termination code as return value in the process.
Input parameters
Operation parameter
Registry
: Communication command, communication option, transfer pathname, I/O interface to
be used, baud rate, and mode
: Set up the registry only if the default value of the following items need to be modified.
I/O interface (IrDA or RS-232C), baud rate, and assignment of single character to
drive name
Output parameter
Return value of Winmain
: Termination code
80
Specifying the communication functions
Operational designation to FLCE should be made either by entering the following command in the dialog that
appears at start-up or by starting FLCE with the additional arguments. More than one operation command
(maximum 20) can be specified at a time. In this case, the order of execution is from left to right. The operation of
commands to the right of the command that caused the error will not be processed. If the environment setup
command is not specified, its default value will be used.
Table 5.3
Type
Setup
command
Operation
command
Function
Communication
environment setup
Command
/Y={device baud
rate, mode}
Special option
None
File send
/S
O, R
File receive
/R
O, R
File send (append)
/A
None
File delete
/D
O, R
File move
/N
None
Clock send
/T
None
Idle start
None
Script file name
Remark
Device= COM1/IrDA
Baud rate= 9,600 to 115,200
Mode= h: 1 minute of timeout
i: Infinite timeout
Valid only for HT-to-HT
transfer
Options
O (Overwrite): Specifying forcible overwrite of read-only file
•
Specification of this option results in that read-only files are also overwritten.
•
If this option is not specified, an attempt to write in a read-only file will cause abnormal termination.
•
The file attribute after overwrite will be that of the source file.
R (Recursive call):
•
The target of this operation will include all files under specified directory. If the specified directory is
followed by sub-directories, they will also be included.
•
The directory should have no more than a maximum of 16 levels.
•
If this option is not specified, the target of processing includes only files that are specified by each
pathname.
81
Commands and options
The following describes the method of specifying the start-up parameters and their definitions.
The total length of the start-up parameters including “FLCE” should be 255 characters or less. If there are any
incorrect scripts, incorrect commands, options that cannot be set for the command, or incorrect parameters,
communication will not be commenced and will immediately be terminated in error.
Rules of writing parameters
•
Separate parameters with a one-byte space.
•
The /Y command can be specified at the top of the command line only once (can be omitted).
•
A maximum of 20 commands can be specified continuously after the required parameters.
•
Both upper-case and lower-case characters can be used for commands and options.
•
The order in which options are specified is not important.
•
Each option must be specified so that it directly follows the command, with no space between a command
and an option.
•
In order to specify more than one option, specify them without inserting a space after each.
In the following explanations “[ ]” means a parameter that can be specified optionally, whilst other parameters
cannot be omitted.
1. Communication environment setup
Specification method;
/Y={ [device],[baud rate],[mode] }
Functions;
•
Specify device, baud rate, and communication mode used for communication.
•
If this command is omitted, the default value of {IrDA} will be used. (See Chapter 4.2.2.)
•
Each of the parameters can be omitted. However, if this is done, the default value of the omitted parameter
will be used. (See Chapter 4.2.2.)
•
Be sure to make the description immediately after “FLCE”. A specification made in other locations will
cause a parameter error.
Parameters;
•
Command
/Y={ [device],[baud rate],[mode] }
•
Device
Select either “IrDA” or “COM1”.
•
Baud rate
If “IrDA” is selected: Cannot be specified.
If “COM1” is selected: One of the following baud rates can be specified as the communication speed of
RS-232C.
9600, 19200, 38400, 57600, 115200
Note:
Parameter combinations other than those given above cannot be specified. They will cause a parameter error.
82
Mode
•
“H”; HT-to-HT command specification mode
Always specify this option at one HT that is assigned the role of specifying the operation command for
performing communications between two terminals (FLCE on the partner side should be executed by
idle-start).
•
“I”; The connection wait timeout will be set to infinite.
•
The connection wait time will be one minute if no parameter is specified or if “H” is specified.
•
Only “H” or “I” can be specified.
Table 5.4
Start-up
Idle (including script)
Specification of operation command
Communication partner
PC (Cradle)
HT
PC (Cradle)
HT
Connection wait timeout
1 minute
Infinite
No mode specification Mode specification I
Mode specification H
(Specification not
possible)
2. File transmission
Specification method
/S[Option] Transmission file pathname [Transmission file pathname] [•••] Destination directory pathname
Functions
•
Transfers a file that exists on the user’s terminal to a communication partner.
•
Overwrites a file with the identical file name, if the file name already exists in the destination directory of the
communication partner.
•
If a directory specified as the destination directory does not exist in the communication partner, that directory
will automatically be created there.
•
The transmission file pathname is checked first. If any of the transmission file pathnames that do not exist on
the user’s terminal is specified, FLCE will be immediately terminated with an error. (In this case, even files
existing on the user’s terminal will not be transmitted.)
•
Displays progress as a percentage.
Parameters
•
Command
/S=(Sending): Transmitting file
•
Options
O (Overwrite): Specifying forcible overwrite of a read-only file
- Specification of this option results in that read-only files are overwritten.
- If this option is not specified, an attempt to write over a read-only file will result in abnormal termination.
R (Recursive call):
- The target of file transmission will include all files under the directory specified by the transmission file
pathname. If the specified directory is followed by sub-directories, they will also be included in the
targets of file transmission.
- The directory should have no more than a maximum of 16 sub-menus.
- Even if this option is specified, specify the transmission file by its full pathname.
- If this option is not specified, the target of file transmission includes only files that are specified by the file
pathname.
•
Transmission file pathname
- Always specify files in full pathname that exist on the user’s terminal.
- To specify all files, enter “*.*” as the file name.
- Wild card specification can be applied to file names.
- Double-byte characters can be used for directory names and files names.
83
•
Destination directory pathname
- As the last parameter for this command, specify the destination directory pathname on the
communication partner.
- If the specified directory does not exist on the destination, a directory that has the specified name will be
automatically created.
- Enter “\” as the terminator of the directory name. Otherwise, a parameter error will result.
- Double-byte characters can be used for directory names.
- For destination directory pathnames, follow the naming rule of the OS on the communication partner
side.
3. File reception
Specification method;
/R[Option] Request file pathname [Request file pathname] [•••] Reception directory pathname
Functions;
•
Specifies a file that exists on the communication partner side using the request file pathname, then receives
the file.
•
Overwrites a file with the identical file name, if it already exists under the reception directory on the side of
the user’s terminal.
•
If a directory specified as the reception directory does not exist, that directory will automatically be created.
•
For information about the operation that depends on the communication partner, refer to “8. Idle start” on
page 88.
•
Displays progress as a percentage.
Parameters;
•
Command
/R (Receive): Handling a file reception request
•
Options
O (Overwrite): Specifying forcible overwrite of read-only file
- Specification of this option causes read-only files to be overwritten.
- If this option is not specified, an attempt to write in a read-only file will cause an abnormal termination.
R (Recursive call):
- The target of file transmission will include all files under the directory specified by the request file
pathname. If the specified directory is followed by sub-directories, they will also be included in the
targets of file transmission.
- If this option is not specified, the target of file transmission includes only files that are specified by the
request file pathname.
- Even when this option is specified, specify the request file in full pathname.
•
Request file pathname
- Always specify files in full pathname existing on the communication partner side.
- Wild card specification can be applied to file names.
- To specify all files, enter “*.*” as the file name.
- Double-byte characters can be used for directory names and file names.
- For request file pathnames follow the naming rule of the OS on the communication partner side.
84
•
Reception directory pathname
- As the last parameter for this command, specify the reception directory pathname.
- For the reception directory, specify the destination directory name to store the received file.
- If the specified directory does not exist, the directory that has the specified name will automatically be
created.
- Enter “\” as the terminator of the directory name. Otherwise, a parameter error will result.
- Double-byte characters can be used for directory names.
4. File transmission (append)
Specification method;
/A Appended file pathname Target file pathname
Functions;
•
Transfers the contents of a file, which exists on the user’s terminal and is specified by the target file pathname,
to the communication partner, and append it to the end of a file in the communication partner.
•
If a file specified by the target file pathname does not exist on the communication partner, that file will
automatically be created.
•
Date and time of the target file corresponds to the system date and time of the terminal in which the target file
exists when this append operation is performed.
•
If file transmission fails in mid-course, the target file maintains the settings it had before communication was
started.
•
File append will be made by units of binary data. (This means that the data will be appended after an EOF
code, if one exists).
•
Displays progress in percentage.
Parameters;
•
Command
/A=(Append): Handling a file append request
•
Appended file pathname
- Specify a desired file in full pathname that exists on the side of the user’s terminal.
- Wild card specification is not permitted for file names.
- Double-byte characters can be used for directory names and files names.
•
Target file pathname
- Specify a file in full pathname that exists on the communication partner to be appended.
- If the specified file does not exist, it will be created with the specified file name.
- Wild card specification is not permitted for file names.
- Double-byte characters can be used for directory names and files names.
- For target file pathnames follow the naming rule of the OS on the communication partner side.
85
5. File deletion
Specification method;
/D[Option] Deleted file name [Deleted file name] [•••]
Functions;
•
Specifies a file or directory that exists on the communication partner side, and deletes it.
•
For information about the operation that depends on the communication partner side refer to “8. Idle start” on
page 88.
•
Does not display progress in percentage.
Parameters;
•
Command
/D: Deletes the target file or directory that is specified by the deletion pathname.
•
Options
O (Overwrite): Specifying forcible deletion of read-only file
- Specification of this option results in that read-only files are also deleted.
- If this option is not specified, an attempt to delete a read-only file will cause abnormal termination.
•
R (Recursive call):
- The target of file deletion will include the directory specified by the deletion file pathname, and all files
and directories under the directory.
- If the specified directory is followed by sub-directories, they will also be deleted.
- The directory should have no more than a maximum of 16 sub-menus.
- When this option is specified, specify a directory name as the deletion pathname using the full pathname.
- If this option is not specified, only files that are specified by the deletion file pathname will be deleted.
•
Deleting pathname
In case without “R” option
- Specify a file that actually exists on the communication partner side and is to be deleted. Wild card
specification can also be used.
- To specify all files, enter “*.*” as the file name.
In case with “R” option
- Specify a directory in full pathname that actually exists on the communication partner side and is to be
deleted.
- Enter “\” as the terminator of the directory name.
- Double-byte characters can be used for directory names and file names.
- For request file pathnames follow the naming rule of the OS on the communication partner side.
86
6. File move or rename
Specification method;
/N Move source pathname Move destination pathname
Functions;
•
Moves the specified file (move source pathname) that exists on the communication partner side to the move
destination pathname.
•
If the move destination pathname is a directory name, the file name at the move source pathname will be
used without modification. If the move destination pathname is a file name, the moved file uses the file name
at the move destination.
•
For information about the operation that depends on the communication partner, refer to “8. Idle start” on
page 88.
•
Does not display progress in percentage.
Parameters;
•
Command
/N: Moves the objective file specified by the move source pathname to the move destination pathname.
•
Move source pathname
- Specify a file that actually exists on the communication partner side and is to be moved.
- Wild card specification cannot be used.
- Double-byte characters can be used for directory names and file names.
- For move source pathnames follow the naming rule of the OS on the communication partner side.
•
Move destination pathname
- Specify the destination of the move on the communication partner side in full pathname.
- If a file with the identical name exists on the destination side, an error code will be returned.
- When specifying a directory, enter “\” as the terminator.
- If a file name is specified, the moved file uses that file name.
- If a directory with the specified pathname does not exist, a directly with the specified name will
automatically be created.
- Wild card specification cannot be used.
- Double-byte characters can be used for directory names and file names.
- For move destination pathnames follow the naming rule of the OS on the communication partner side.
7. Time transmission
Specification method;
/T
Functions;
•
Transmits the system date and time of the user’s terminal to set date and time of the communication partner
side.
•
The transmitted date and time will be the local date and time.
•
Depending on the conditions of the communication line, there may be a difference of several seconds.
•
This is valid for an HT-to-HT connection.
87
8. Idle start
Start-up method;
Only the /Y command can be specified.
FLCE [/Y={[device],[baud rate],[mode]} [Script file name]
Functions;
•
Assigns the right of request to the communication partner side, and operates in accordance with the function
requested by the partner side.
•
To initiate the system in this mode, only the /Y command can be specified. (If another command is specified,
the normal start-up mode, rather than the idle start-up mode, will be used. If a script file name is specified, this
function will cause a parameter error and will terminate as an error.)
•
If /Y is specified, do not specify “H” for the mode parameter (otherwise, a parameter error occurs and the
function is terminated as an error).
•
This function will be terminated when it receives a designation of termination, except when it is abnormally
terminated.
•
If a script file name is specified, communication will be performed according to the contents of the script file
that exists on the communication partner.
•
The specification of a script file is valid only when communicating with a PC.
•
If a script file name that does not exist on the communication partner is specified, an error code will be
returned. (In the case of HT-to-HT communication, the script file will be ignored since it cannot be
processed.)
Parameter;
Script file name .... Specify a script file name that actually exists on the communication partner side. Enclose the
script file name in a pair of double quotation marks.
88
9. Describing a pathname
•
•
•
Always enclose the pathname in a pair of double quotation marks. Also, one pathname should not be more
than a maximum of 256 characters, including the two double quotation marks. A two-byte character is
counted as one character.
Pathnames should be described in accordance with the naming rule of OS of the machine, in which the path
to be specified is located.
In the description of a pathname, drive symbols should conform to the following rules.
1. Describe the pathname on the terminal so that it begins with the root directory and without using a drive
symbol letter. (The same rule also applies when the Upload/Download utility for the host PC specifies a
file or directory path on the terminal.)
2. A drive symbol letter, if specified by the communication partner, will be ignored by FLCE on the
terminal side (i.e. the pathname will be treated in the same way it is specified so as to begin with the root
directory, and without using a drive symbol letter).
3. In order for a terminal to describe the path to a file or directory on the communication partner (PC, etc.)
that operates an OS that requires a drive symbol letter, always place the drive symbol letter as specified.
However, as an exception to the rule 2 above, let the drive symbol letter have the following effect, when the
communication partner side specifies a device on the terminal and performs formatting or issues an instruction
to get the disk information. These settings, however, can be modified by specifying the appropriate registry.
Default setting
Internal RAM → C:
The start-up drive is set to C: Conforms to PC/AT machine
specifications.
CF card → D:, E:
FlashDisk → F:
10. Specifying a non-existing file
If the pathname of a file or directory that does not exist on the communication partner is specified, it will be
processed as follows:
Table 5.5
Communication partner
Reception
Deletion
Move
Transmission,
Transmission (append)
Windows95/Windows NT
DOS
A
C
B
D
Windows CE
A
C
B
D
Description of the alphabets:
A) If any one of the specified pathnames does not exist, an abnormal termination will result. (The actually
existing files also will not be transmitted.)
B) If the specified pathname does not exist, an abnormal termination will result. (In this case the transmission
process is not executed.)
C) If the specified pathnames contain a pathname that does not actually exist, that pathname will be ignored. (All
the pathnames that actually exist will be successfully processed.)
D) A new file(s) will be created.
89
11. Functions and displays
Table 5.6
Order
Function (command on protocol)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
File transmission
File reception
File append
File or directory deletion
File move or rename
Directory creation
Time setting
Time request
Message display
Buzzer sound
Fetch file information
Set file information
Fetch disk information
Fetch session ID and system information
Idle notification
Designation of termination
Display type
Specified from
Requested from
FLCE
communication
partner
C
C
C
C
C
C
A
B
A
B
-
B
A
A
-
A
-
D
-
A
-
A
-
A
-
A
Description of the alphabets as status in the table;
A) Displays currently executed command or the one that issued the request.
B) In addition to A, displays the file or directory currently processed in the user’s terminal.
C) In addition to A, displays the file being transferred and the progress.
D) Displays text message sent from the communication partner.
90
Remark
Not necessary to
display, since
they are internal
protocol
commands.
12. Setting the registry
By writing a value in the registry it is possible to modify the default values of communication environment, etc.
Use the setup command (/Y) to specify the line or baud rate during normal use, and set the registry only if the
default values need to be modified. Also, if modifying the assignment of drive symbol letters, create keys of each
symbol letter and specify the pathname of the corresponding device. If the registry has been set, it continues to be
valid until the setting is modified or the system is cold booted. Items (keys) that are not set in the registry or items
(keys) that were incorrectly set will use their default values.
Setup items
•
RS-232C baud rate
•
Specification of communication line (COM1 or
IrDA)
•
Assignment of drive symbol letters
C
D
E
F
•
Location of the registry
•
Contents
Key name
Type
BAUD
DWORD
DEVNM
STRING
DRIVE\A
STRING
DRIVE\B
STRING
DRIVE\C
STRING
--DRIVE\Z
STRING
91
Default if no setting is made for the registry: 19,200 bps
IrDA as default if no setting is made for the registry:
Default if no setting is made for the registry:
: \ (Object storage area of internal RAM)
: \Storage Card\ (Storage Card)
: \Storage Card2\( Storage Card2)
: \FlashDisk\(NAND FLASH)
: \HKEY_CURRENT_USER\Software\CASIO\FLCE\
Value
Baud rate
Communication line (I/O device)
Path to a device that is assigned as Drive A.
Path to a device that is assigned as Drive B.
Path to a device that is assigned as Drive C.
Path to a device that is assigned as Drive Z.
13. Termination code
When the communication is closed, FLCE will return the termination code as described in Table 5.7. Upper-level
programs should refer to this value and take appropriate follow-up action. The termination code will be returned as
the return value of Winmain. Upper-level programs should refer to this return value with
GetExitCodeProcess function. In the following table the category code (upper bytes) shows the error category,
and the detail code (lower bytes) shows its error details.
Table 5.7 List of termination codes
Error Code
Category
Code
00h
DCh to
F5h
Meaning
Detail
Code
00h Normal termination
00h Normal termination
F6h
00h
F7h
00h
F8h
00h
01h
00h
02h
80h
02h
81h
02h
82h
02h
83h
02h
84h
0Fh
01h
0Fh
02h
A0h
10h
A0h
20h
A0h
30h
Cause
Remedies
Normal
-
The user station is ordered by the partner station to format Refer to Table 5.5 on page 89.
drives ‘A’ to ‘Z’ (for information about each drive symbol
letter refer to “9. Describing a pathname” on page 89.
Normal termination
The user station is ordered by the partner station to turn Turn OFF the power.
OFF the power.
Normal termination
The user station is ordered by the partner station to
Refer to Table 5.5 on page 89.
perform resetting.
Break termination
Communication is forcibly terminated because the Break Resume operation as
key on either the user station or partner station was
required.
pressed.
Protocol error
Data anomaly (Data error occurred in the communication Check for proper connection
line.)
of the communication route.
File not found.
A file that does not exist is specified.
Check the specified file or
directory.
Current directory
An attempt is made to delete the current directory.
Check the objective directory
deletion error
to be deleted.
File write error
Writing to the file is not possible for some reason.
Check if the file setting
allows writing.
File read error
Reading the file is not possible for some reason.
Check if the file setting
allows reading.
Read-only access error An attempt is made to overwrite or delete the read-only Specify another file name or
file.
cancel the read-only attribute.
Parameter error
Parameter specifying method is incorrect.
Check how the parameter is
described.
Too long parameter
Parameter is too long.
Limit the parameter length to
255 characters or less.
Communication port Other program uses COM1 or IrDA, or FLCE has
Terminate other program that
open error
already been initiated.
uses COM1 or IrDA.
Line break error
Either the cable is unplugged during communication or Check for proper cable
connection and make sure
the IrDA connection is broken (for example by
that the terminal is properly
dismounting the terminal from the Bridge Satellite
mounted on the Bridge
Cradle).
Satellite Cradle.
Connection wait
Connection could not be established within one minute Check for proper cable
timeout error
after start-up.
connection and make sure
that IrDA is ready for
communication.
92
14. Log file
FLCE creates log files to keep communication logs.
•
Log file name
Log file name is fixed to “FLCE.LOG”. This cannot be modified. To save a log file, change the file name.
•
Location
A log file is created under the “\Windows\” directory.
•
Creation method
- If a log file already exists, a new one will automatically be created.
- Log data will not be appended to the existing log file.
- If a log file cannot be created for some reason, it will not be created.
- If the command parameters contain some errors, a log file will not be created.
- Creation of a log file starts at the point in time when a connection trial is made to the communication
partner.
•
Format
This format consists of nine lines as shown below. Since with lines 2 to 4 the information obtained from the
communication partner will be output, these lines will be outputted as blank lines to a log file on the HT-side,
which runs in the emulated PC mode. Also, since one line must be less than 80 bytes long, if each file name in the
8th and 9th lines is longer than 65 bytes (15 bytes are used for the item name), characters on and after the 65th byte
will be omitted for output.
1st line
2nd line
3rd line
4th line
5th line
6th line
7th line
8th line
9th line
: Outputs the version information of FLCE.EXE.
: Outputs the version information (1 byte) of the protocol. The initial version is “1”.
: Outputs the communication partner machine code (maximum 3 bytes).
AT ... IBM-PC AT compatible machine
: Outputs the session ID information. This will be outputted as a hexadecimal number. (Ex. 0x0000)
: Outputs the final event information.
: Outputs the final phase information.
: Outputs the completion status information. This will be outputted as a hexadecimal number. (Ex.
0x0000)
: Outputs the final transmission file name.
: Outputs the final reception file name.
15. Help
If Start menu → Help menus are accessed in the Today screen or while executing an application, the Help file
will be opened in the screen.
93
5.2.4 Contrast/Backlight Utility
Contrast, backlight and auto-reduction of backlight intensity can be set up.
Contrast
The contrast can be set in 9 different gray scales. (Default = 5)
Backlight
For power supply source of how the terminal is powered by, either via Cradle/Battery charger or by installed
battery pack, the backlight can be set as follows:
Via Cradle/Battery charger
: 9 steps (Default = 9)
Battery powered
: 9 steps (Default = 7)
Auto dimmer can be set as follows:
Battery powered
: 8 steps. (Default = 3)
Auto-reduction of backlight intensity
The backlight intensity will automatically be reduced to conserve power if the system is in idle state and if no key
or touchpanel operation is performed while the power is on. It is also possible to set whether the intensity is to be
reduced (or turned OFF) and the time until it is reduced (or turned OFF) separately for each case when the system
is powered via Cradle/Battery charger or when it is powered by the battery pack.
94
5.2.5 Automatic Setup
Card slot
Setup.exe or AutoRun.exe located under the given directory of memory card will be automatically executed
when the terminal is reset or the memory card is inserted. This utility is an extra to allow automatic installation of
application program from a storage device.
The given directory: \Storage Card\CE\ARM (or \Storage Card2\CE\ARM)
•
The memory card driver will search in the memory card, for a given period of time (10 seconds) immediately
after reset, for the setup file registered in the registry. And, if that file is found, it executes the program.
[HKEY_LOCAL_MACHINE\Drivers\CASIO\UTIL\SETUP]
"1"= “\Storage Card\CE\\ARM\\Setup.exe"
"2"= “\Storage Card2\CE\\ARM\\Setup.exe"
•
Also, it will search for AutoRun.exe for a specified period (10 seconds) immediately after the memory
card is inserted in the slot. And if that file is found, it executes the program. It is also valid when the memory
card is replaced while the terminal power is off.
[HKEY_LOCAL_MACHINE\Drivers\CASIO\UTIL\AUTORUN]
"1"= “\Storage Card2\CE\\ARM\AutoRun.exe"
"2"= “\Storage Card\CE\\ARM\AutoRun.exe"
•
These utilities can be disabled by erasing the above described keys.
Setup program and automatic execution program
•
Since this utility is made to initiate Setup.exe each time the system is reset, take appropriate measures to
prevent it from making a duplicate setup. Since, AutoRun.exe is also made to run each time a memory
card is replaced, take appropriate measures not to initiate AutoRun.exe several times.
•
If both Setup.exe and AutoRun.exe exist at a reset, Setup.exe will be given a higher priority.
•
When both Slot 1 and Slot 2 have each memory card inserted, Slot 1 (PC card) will be recognized as the
StorageCard at the time of reset. (Even when a card is inserted later in Slot 1 and the folder is named
“StorageCard2”, it will be recognized as the StorageCard after reset. This is due to an OS’s restraints.)
FlashDisk
When the terminal is reset, the Flash installer will automatically execute Setup.exe under the given directory of
the FlashDisk. This utility is an extra to allow a patch or application program contained in the FlashDisk to be
installed. The given directory: \FlashDisk\CE\ARM
•
The Flash installer will sequentially search the FlashDisk for the setup file registered in the registry
immediately after a reset is executed. And if that file is found, it executes the program.
[HKEY_LOCAL_MACHINE\Drivers\CASIO\UTIL\FLSETUP]
"1"= “\CE\ARM\Setup.exe"
If the setup file is to be used from user program, a sequential search will be executed by adding, for example,
the registry, as shown below.
"2"= “\CE\ARM\UserAppSetup.exe"
•
These utilities can be disabled by erasing the above described keys.
95
Setup program and automatic execution program:
Since this utility is made to initiate Setup.exe each time the system is reset, take appropriate measures not to
perform a duplicate setup from the second time onwards.
5.2.6 Copy To Another Terminal
This is a tool to easily create a child terminal. It copies the contents of a master terminal that has been properly set
up onto a child terminal via IrDA interface without modification.
Fig. 5.10
HTs copy tool
The terminal (HT) copy tool (HTCopy.exe) is used to easily create a child terminal. To do this, simply copy the
setup contents of the master terminal onto a target child terminal via the infrared interface.
The following contents can be copied:
•
Files existing in RAM
•
Files existing on FlashDisk
•
Registry information (various setup information)
•
Database information (information contained in the Inbox, etc.)
Move through Start → Program → Utility → Copy Device command sequence to start the session.
Fig. 5.11
96
Fig. 5.12
Fig. 5.13
At the transmission-side terminal check the objective files and registries for transmission against the Transmission
Setup dialog, which is invoked by tapping Start button.
When Start button is tapped, transmission will start as soon as the transmission contents are successfully checked.
The following contents can be set with the Transmission Setup dialog:
: Files in RAM
• RAM disk
: Files in FlashDisk
• FlashDisk
: Files for the date and time
• Date and time
: The entire registry information (Reg.User and Reg.Display are also checked.)
• Reg.ALL
: User registry information
• Reg.User
: Other registry information
• Reg.Display
: Database such as Inbox, etc.
• Database
At the reception-side terminal, start reception by tapping Start button in the Reception Setup dialog.
The menu item configuration is as follows:
[File] - [Send]
: Displays the transmission setup dialog.
[File] - [Receive]
: Displays the reception setup dialog.
[File] - [Close]
: Terminates the execution of the HT copy tool.
97
5.2.7 User Notification Message List
The following table shows the list of messages to be issued from the system to the user application.
Table 5.8 List of user notification messages
Content
Message
Power-ON notification
WM_POWERBROADCAST
wPARAM
PBT_APMRESUMESUSPEND
IPARAM
0
Power-OFF notification
(only when the Power OFF key
is disabled.)
Low main battery voltage
warning notification
Mounted on Satellite
Cradle/dismounted notification
Fn key ON/OFF notification
WakeOnRing notification
WM_POWERBROADCAST
PBT_APMRESUMESUSPEND
0
WM_POWERBROADCAST
PBT_APMBATTERYLOW
0
WM_USER+0x500
0: Dismounted / 1: Mounted
0
WM_USER+0x502
WM_USER+0x503
0: OFF / 1: ON
1
0
0
Trigger key pressed notification
Key mode notification
WM_USER+0x504
WM_USER+0x506
1
Key mode
0
0
5.2.8 Welcome Wizard
The Welcome wizard function and user setup information installed in the conventional PPC can be skipped over.
5.2.9 Diagnosis
This is the diagnosis program for the terminal hardware. The target of use is supposed to be the Production
Department of a factory and Service Sections.
98
5.2.10 Browser
This browser software uses the Internet Explorer 5.5 module from Microsoft. The supported security functions are
Kerberos, TLS Ver. 1.0, SSL Ver. 2.0 and 3.0, and SGC. In addition, the installed JScript 5.5 conforms to the
ECMA 262 language specifications (ECMA Script Edition 3). For detailed information about this module visit the
Microsoft site at the following URL:
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wceie55/htm/cerefInternetExplorer55.asp?frame=
true
The tool bar icons includes the following:
: Returns to the previous page
: Advances to the next page
: Reloads the current page to update it
: Displays the home page
: Invokes My Favorites menu
• Adds to or edits My Favorites
• Displays the favorite page
Fig. 5.14
The menu command configuration is as follows:
[Menu] - [Open]
: Displays an HTML or JPEG file
[Menu] - [Save As]
: Saves in the HTML, TEXT, GIF, or BMP format.
[Menu] - [Edit]
: Edits text on the page
[Menu] - [Adjust to screen]
: Switches from the reduced page size
[Menu] - [Address bar]
: Switches the address in the address bar
[Menu] - [Character size]
: Specifies the size of the displayed character
[Menu] - [Specify language]
: Specifies the language to be displayed
[Menu] - [History]
: Moves to the specified page in the history list
[Menu] - [Search page]
: Searches for a piece of text on the page
[Menu] - [Option]
: Sets options such as those for the security function, etc.
[Menu] - [Property]
: Displays the property of the page
[Menu] - [Exit]
: Exits the present browser
99
5.2.11 Mailer
This mailing software uses the Microsoft Inbox module and can be stated up by tapping bmail icon in Windows
folder. It consists of three units - Main, View, and Prepare screens - to allow the user to receive, send, or transfer
mail, reply to mail, and perform transmission with an attached file(s).
Fig. 5.15
The Main screen displays a list of mail contained in the folder specified by the user. The menu command
configuration is as follows:
[New]
: Creates a new piece of mail (moves to the preparation screen).
: Edits the folder content.
[Tool] - [Folder Management]
[Tool] - [Void the removed item]
: Removes the mail in Removed Item folder.
[Tool] - [Edit MyNotebook]
: Edits the sample text/subject/address.
[Tool] - [State]
: Displays the number of pieces of mail.
[Tool] - [Option]
: Sets the security environment and mail addresses.
[Service] - [Connection]
: Connects to the main server.
[Service] - [New Service]
: Sets the destination of the connection.
[Service] - [Clear All]
: Deletes the selected text.
The tool bar icons include the following:
[Connect]
: Connects to the mail server through the specified service.
[Send/Receive Mail]
: Sends or receives a piece of mail.
100
The View screen will display the header part (sender/address/subject/date and time) and main text of the mail
specified in the Main screen. The menu command configuration is as follows:
[New]
: Creates a new piece of mail (moves to Prepare screen)
[Edit] - [Make it un-browsed]
: Restores the un-browsed state
[Edit] - [Move to folder]
: Moves to the specified folder
[Edit] - [Language]
: Specifies the display language
[Edit] - [Select All]
: Selects all the text on the screen
[Edit] - [Copy]
: Copies the selected text
[Edit] - [Edit MyNotebook]
: Edits the sample text/subject/address.
The tool bar icons include the following:
[Delete]
: Moves the displayed mail to the Removed item folder
[Transfer/Reply]
: Transfers, replies, or replies to all for the displayed mail
[Previous]
: Displays the prior piece of mail
[Next]
: Displays the following piece of mail
Fig. 5.16
The Prepare screen is used to create a piece of mail. The menu command configuration is as follows:
[New]
: Creates a new piece of mail (moves to Prepare screen)
[Edit] - [Cut]
: Cuts the selected text
[Edit] - [Copy]
: Copies the selected text
[Edit] - [Paste]
: Pastes the text from the clipboard at the current cursor position
[Edit] - [Clear]
: Removes the selected text
[Edit] - [Select All]
: Selects all the text on the screen
[Edit] - [Edit MyNotebook]
: Edits the sample text/subject/address
[Edit] - [Append File]
: Specifies the file to be appended
[Edit] - [Language]
: Specifies the display language
[Edit] - [Cancel Message]
: Deletes the mail being prepared
The tool bar icons include the following:
[Send Mail]
: Sends the created mail
[MyNotebook]
: Selects the sample text/subject/address
With MyNotebook the user can register model text, subjects, and addresses that have a high frequency of use in
advance so that an appropriate one can be retrieved when creating a new piece of mail.
101
5.3 Casio Original Application Programs (2)
In this chapter, the Casio original application programs available to the terminal will be explained. The application
programs in this chapter are not preinstalled in the ROM. You need to install each one of them as required.
5.3.1 FCHKCE
This software is not the ones pre-installed in the terminal. To use the available functions the software must be
installed in the terminal prior to use. The software is a file check utility to check if file copied from PC, etc., has
been properly installed in the target terminal. It has the following functions.
Function
1. Creating a list file
•
If a file name to be transferred from the terminal is specified, a list file will be created from the list of
transferred files and checksum data, which is calculated for all the files to be transferred. Checksum data of
the list file will also be created.
•
The name of a list file created with this function is fixed to FCHK.LOG.
•
The return value of 0 (zero) will be set as the program termination code if the creation of a list file is
successful, otherwise a return value other than 0 will be set as the abnormal termination code. At this point in
time a history file is also created (FCHK.LOG is created under [FCHK.LOG File output Directory name]).
•
This history file automatically records the operations used for creating the list file. However, the user must
also copy (transfer) the list file created with this function to the partner station (child terminal) at file transfer
(file copy).
•
Information items to be contained in the list file include:
- File size
- Date and time of update
- Transfer (copy) destination path (file) name
- Number of transferred (copied) files
- Checksum data of all files to be transferred (copied)
- Checksum data of the list file
•
•
The checksum data of all files to be transferred (copied) should be the result of exclusively ORing every pair
of consecutive words of data of all files to be transferred (copied). The checksum data of the list file should be
a value, which produces zero if it is added to the result of summing every two consecutive words of list file
contents.
The checksum data will be outputted for the list file as follows:
FILE_CHECKSUM=HHHHLLLL( HHHH: HIGH-WORD / LLLL: LOW-WORD )
LIST_CHECKSUM=HHHHLLLL( HHHH: HIGH-WORD / LLLL: LOW-WORD )
The existing list file (LOG file) will be deleted if an error occurs during the creation of the list file with this
function. However, the existing list file will not be deleted due to errors that may occur during command
parameter analysis.
102
Comparison of list files
•
File information of a file transferred from the partner station (parent terminal) and the contents of a list file
(FCHK.LOG) are compared, the checksum data of the list file is calculated and compared, and the checksum
data of all the transferred (copied) files is calculated and then compared with the checksum data of the list file.
•
If the comparison result is correct, this function will have a return value of 0 (zero) as the program
termination code, and will be abnormally terminated if the return value is a value other than zero.
Also, at this point in time, the history file is created (FCHKG.HIS is created in <FCHL.LOG log file pass
name>). The history file records the operations when the copied file and file list are compared.
•
File information to be compared includes:
- File size
- Date and time of update
- Transfer (copy) destination path (file) name
- Number of transferred (copied) files
- Checksum data of all files to be transferred (copied)
- Checksum data of the list file
•
The checksum data of all files to be transferred (copied) should be the result of exclusively ORing each pair
of consecutive words of data of all files to be transferred (copied). The checksum data of the list file should be
a value, which produces zero if it is added with the result of summing each pair of consecutive words of list
file contents.
Function details
FCHKCE /G
Specify the file name to be transferred (copied) from the terminal, and create a list file from the list of transferred
(copied) file names and checksum data, which is calculated for the checksum of all the files to be transferred. The
number of target files for which logs must be taken is 65,000. The maximum file size of a script file is 32,000
bytes.
•
Format
FCHKCE /G [</Option>] <file name list or Script file name> <Destination directory name>
[<FCHK.LOG File output Directory name>]
(Parameters enclosed in square brackets can be omitted.)
103
•
Parameters
Option
/SC: Specification of script file name
The file that is specified by the parameter is the script file, with which FCHKCE.EXE analyzes the
script file name to be transferred for creating a list file.
/R: Specification of recursive call
All files under the directory having a pathname specified by the parameter become the target of list file
creation. If the specified directory is followed by sub-directories, these directory names are added for
creating the list file.
The depth of the directory should not be more than a maximum of 16 levels.
If this option is not specified, only files specified by the file name list become the target of list creation.
/AO: Append output
If the FCHK.LOG file exists in the directory specified by [FCHK.LOG File output Directory name], a
logging file will be additionally created.
If the above mentioned file does not exist, a new FCHK.LOG file will be created. (However, the
function will be abnormally terminated if the specified directory does not exist.)
With append output, another list file is simply added to the end of the existing list file. In order to
modify part of the existing file contents, do not use append output, rather, create another list file.
<File name list or Script file name >
Describe the list of file names to be transferred (copied). To do this, specify files that exist on the
transmission (copy) source side. When specifying multiple transmission (copy) source file names,
concatenate pathnames after inserting a one-byte space between two consecutive pathnames.
Wild card specification can be applied to file names. When /SC has been specified as the option,
specify the pathname to the location where the script file exists.
<Destination directory name>
Specify the directory name of the destination of transmission (copy).
For the directory name, observe the naming rule of the OS in the destination of transmission (copy).
The terminator of the directory name should be “\”.
[FCHK.LOG File output Directory name]
Specify the destination directory name of the FCHL.LOG log file.
For the directory name, observe the naming rule of the OS in the user’s terminal.
The terminator of directory name should be “\”.
If this parameter specification is omitted, the FCHL.LOG log file will be created in the current
directory.
•
Return value
Return codes (See Table 5.9 “Error messages/Return codes”.)
104
FCHKCE /C
File information about a file transferred (copied) from the partner station (parent terminal) and the contents of a list
file (FCHK.LOG) are compared with each other, the checksum data of the list file is calculated and compared, and
the checksum data of all the transferred (copied) files is calculated, then the result is compared with the checksum
data of the list file. A maximum of 65,000 files can be compared.
•
•
•
Format
FCHKCE /C [</Option>] <FCHK.LOG file pass name>
(Parameters enclosed by a pair of square brackets can be omitted.)
Parameters
Option
/D: Does not compare the date of update.
This is used to prevent comparison of the date of update, since it may be modified to the current date of
the terminal if a file transfer is made with the terminal’s Explorer. (However, the date of update will not
be modified by copying with the FLCE/PC card.)
<FCHK.LOG file pass name>
Specify the pathname to the location of the list file (FCHK.LOG) using the naming rule of the OS.
Return value
Return codes (See Table 5.9 “Error messages/Return codes”.)
Restraints
•
Due to WindowsCE specifications, some files in \Windows\ folder cannot be copied. Accordingly, they
cannot be written in the list file.
105
Error messages/Return codes
Table 5.9
Code
Message
00
Creation of list file completed.
List file contents consistent
with the real data.
01
Specified pathname not found
Meaning
Normally terminated.
Remedies
No problem.
File name specified during list file creation
does not exist.
Specify a file
name/pathname that
actually exists.
Execute the program again.
02
List file creation error
03
FCHK.LOG not found
04
09
List file contents inconsistent
with the real data (with respect
to pathname).
List file contents inconsistent
with the real data (regarding
size).
List file contents inconsistent
with the real data (with respect
to date and time).
List file contents inconsistent
with the real data (with respect
to the checksum of all files).
List file contents inconsistent
with the real data (with respect
to the checksum of list file).
Script file not found
0A
Script file syntax error
0B
List file read error
0C
0D
Illegal option
Parameter error.
10
Script file read error.
11
Exceeds the limit size of script
file.
Exceeds the limit number of
logging files.
An error occurred during the process of script
file read.
The specified script file size is 32,001 bytes
or more.
The number of target logging files is 65,001
files or more.
The specified output pathname
of the list file is not found.
The specified output destination pathname of
the FCHK.LOG file is not found.
05
06
07
08
12
13
Physical error occurred during the creation of
a list file.
List file (FCHK.LOG) could not be found in
the list file check.
Collation with the list file resulted in an
inconsistency with the real data (with respect
to the pathname).
Collation with the list file resulted in an
inconsistency with the real data (with respect
to size).
Collation with the list file resulted in an
inconsistency with the real data (with respect
to date and time).
Collation with the list file resulted in an
inconsistency with the real data (with respect
to the checksum of all files).
Collation with the list file resulted in an
inconsistency with the real data (with respect
to the checksum of list file).
Script file specified by the file name is not
found.
Specified script file has a syntax error.
Physical error occurred during read of list file
(FCHK.LOG) for the list file check.
The start-up option is illegal.
Specified parameter contains an error.
106
Specify the directory
where the list file is
located.
Execute the file check
utility again from the
beginning.
Execute the file check
utility again from the
beginning.
Execute the file check
utility again from the
beginning.
Execute the file check
utility again from the
beginning.
Execute the file check
utility again from the
beginning.
Specify a directory where
the script file exists.
Rewrite the script file
correctly.
Execute the program again.
Review the start-up option.
Review the specified
parameter.
Execute the program again.
Reduce the script file size
to 32,000 bytes or less.
Reduce the number of
target logging files to
65,000 or less.
Specify a directory that
actually exists.
5.3.2 Wireless LAN
Wireless LAN Setup Tool
Software configuration
Wireless LAN driver
Function setup tool
Power supply survey tool
: Supplied as an installed driver in ROM.
: Standard setup in the Control Panel can be used without specifically modifying the
tools provided m in setting various functions for Wireless LAN.
: This corresponds to the “Built-in Wireless LAN Power Supply” icon in the Control
Panel. Use this tool to select whether the Wireless LAN is used and set the power
supply mode applied when “Use” is selected.
Fig. 5.18
Fig. 5.17
107
5.3.3 Bluetooth Setup Tool
The Bluetooth setup tool is a utility used to set up and establish the connection with the Bluetooth device. Note, in
the following explanations, that the screens are only samples.
Fig. 5.19
The following menu items are available with the Bluetooth setup tool:
[File] – [Exit]
: Exiting the application.
[Device] – [Properties]
: Displaying the specified Bluetooth device property.
[Device] – [Trust This Device]
: Bonding with the specified Bluetooth device.
[Device] – [Send File]
: File transmission to the specified Bluetooth device.
[Device] – [Exchange vCards]
: Exchanging name cards with the specified Bluetooth device.
[Device] – [Find Devices]
: Inquiry for the Bluetooth device.
[Device] – [Add Device]
: Adding the Bluetooth device.
[Settings] – [Appearance]
: Setting the Bluetooth device on the terminal.
[Settings] – [Security]
: Setting the security of Bluetooth device on the terminal.
[Settings] – [Monitor]
: Setting the Bluetooth setup tool.
[Settings] – [Object Push]
: Setting the Object Push profile.
[Settings] – [View]
: Setting the icon display of the Bluetooth devices.
[Settings] – [Arrange Icons]
: Setting the icon alignment of the Bluetooth devices.
[Settings] – [Show Tree View]
: Setting whether to use a tree view for the Bluetooth devices.
[Help] – [About]
: Displaying the version information.
108
Executing an inquiry for the Bluetooth device
If Find Devices command is selected from Device menu, the inquiry of the Bluetooth device will begin (see
Fig. 5.20). After this inquiry the identified Bluetooth device information will be acquired sequentially (see Fig.
5.21). This inquiry can be executed at the initiation of an application.
Fig. 5.20
Fig. 5.21
Adding the Bluetooth device
If Add Device command is selected from Device menu, the Bluetooth address input window will appear. Then,
if you enter the Bluetooth address and tap OK button, the Bluetooth device that could not be found at the previous
inquiry can be added to the list.
Fig. 5.22
109
Getting Bluetooth device information.
If Properties command is selected from Device menu after selecting one of the Bluetooth device icons
displayed on the screen, the properties of that Bluetooth device will be displayed. The following properties are
included:
- Bluetooth device name
- Bluetooth address
- Bluetooth device type
By tapping Show Services button, it is possible to fetch the service information of the Bluetooth device.
Fig. 5.23
110
Bonding with the specified Bluetooth device
Select one of the Bluetooth device icons displayed on the screen and select Trust This Device command from
Device menu. After a moment the Pass Key input request screen will be displayed. With this screen enter an
optional Pass Key using a maximum of 16 characters. Enter the same Pass Key also on the Bluetooth device at the
communication partner which is the target of bonding. If the bonding is successful, the user will not be requested to
enter the Pass Key in subsequent connection and communication with the partner Bluetooth device that has been
bonded.
Fig. 5.24
Precautions
Depending on the Bluetooth device at the communication partner side, the user may not be permitted to set more
than 4 digits for the Pass Key. For more information refer to the manual accompanied with the Bluetooth device to
be communicated with.
111
File transmission with the Object Push profile.
If Send File command is selected from Device menu after selecting one of the Bluetooth device icons displayed
on the screen, the file selection screen will appear (see 5.25). If you tap OK button after selecting a file, the file
transmission in progress window will appear as the file transmission begins (see 5.26).
Fig. 5.25
Fig. 5.26
Precautions
Depending on the Bluetooth device at the communication partner side, the user may be permitted to transfer only
files with a particular extension (.vcf, etc.). For more information refer to the manual accompanied with the
Bluetooth device to be communicated with.
112
Various settings on the terminal
Make the various settings for the Bluetooth device on the terminal. The following tabs can be selected from
Settings menu.
Appearance
: Setting the Bluetooth device name and device type.
Security
: Setting the security level of the Bluetooth device.
Monitor
: Setting the Bluetooth Setup Tool operations.
Object Push
: Setting the Inbox and vCard data of the Object Push profile.
Even after any of the setup screens is displayed, it is possible to switch to other setup screen by selecting an
appropriate tab.
Fig. 5.27
Fig. 5.28
Fig. 5.29
Fig. 5.30
113
Setting the screen display
Set up how the Bluetooth Setup Tool screen is to look. The following tabs can be selected from Settings menu.
: Setting the Bluetooth device icon display.
View
Choose one from Large Icons/Small Icons/List/Detail.
: Setting the alignment of Bluetooth device icons.
Arrange Icons
: Choose one from by Name/by Address/by Type.
Show Tree View : Setting whether the Bluetooth devices are viewed as a tree structure.
Fig. 5.31 Screen where the icon display
manner is set to Detail.
Fig. 5.32 Screen where the tree display is not
employed.
Displaying the version information
Selecting About from Help menu displays the version information in the window.
Fig. 5.33
114
Quitting the application
If Exit command is selected from File menu, a screen to confirm the termination of the application will appear.
Tap Yes button to quit the application as appropriate (see Fig. 5.34). If you try to quit the application while the
hourglass is being displayed in the window, and error message will appear and the application will not be
terminated (see Fig. 5.35).
Fig. 5.34
Fig. 5.35
115
Screen for Bluetooth serial connection
When either an attempt to commence communication through the Bluetooth serial port, establish a dial-up
connection with the Bluetooth cellular phone, or establish the Bluetooth LAN connection, the corresponding
screen to select the Bluetooth device for each case will be displayed. So, to create the connection with the
Bluetooth equipment, select one of the Bluetooth devices displayed in the list and tap Connect button. Otherwise,
to display the latest list of Bluetooth devices, tap Refresh button. Even if the desired Bluetooth device to be
connected is not included in the list, it is still possible to connect with the specified Bluetooth device by tapping
Enter Address button, then directly enter the Bluetooth address.
Fig. 5.36
Changing the SR mode value
The registry is;
Key
: HKEY_LOCAL_MACHINE\Drivers\BuiltIn\CBTStack
Value
: SRmode (DWORD)
Setting value and SR mode;
If setting value (DWORD) is 0 → R0 mode
If setting value (DWORD) is 1 → R1 mode
If setting value (DWORD) is 2 → R2 mode
Notes:
•
If the registry has not been set or an illegal value has been set in the registry, the SR mode will be set to “R0”.
•
A change in the registry will become effective after a reset is performed on the terminal.
116
5.3.4 LMWIN (Host Utility)
The upload/download utility is executed on HOST PC, and provides the following functions to the handheld
terminals connected via the Bridge Satellite Cradle.
• File transmission/File reception
• File append transmission/File append reception
• Sounding the buzzer.
• Setting the date and time.
• File delete/move/rename
• Fetch disk information/fetch file information/set file information
• Terminating the session.
• Executing a child process.
• Displaying a character string.
This utility (Version 5.10 or later) will run under Windows NT 4.0.
117
5.3.5 C-MOS Imager Applications
This CASIO original applications provide the following three performances using the C-MOS Imager integrated in
the terminal.
•
•
•
Application for C-MOS Imager (“TDRead.exe”)
Application for C-MOS Imager Setting Tool (“TDSet.exe”)
Application for C-MOS Imager demonstration (“TDDemo.exe”)
Table 5.10 Major performances by application
Application
TDRead.exe
TDSet.exe
TDDemo.exe
Reading
symbologies
Yes (Note 1)
No
Yes
Setting the
parameters
No
Yes
No
Displaying images
and save
No
No
(Note 2)
Capturing
signatures
No
No
(Note 3)
Streaming
No
No
Yes
Notes:
1. A result of reading symbology will be output to the location where the curette is located.
2. An image will be saved in the fixed size to the file and folder both with predefined names.
3. The capturing a signature will be operable only with the fixed slip for the demonstration.
4. All the applications in the table above have been preinstalled in each terminal. Source code of TDDemo.exe
will be available at the CASIO web site.
118
Application for C-MOS Imager
This is an application program made available to the user of the terminal that enables reading 1D or 2D symbology
with the C-MOS Imager and outputting it in text data format. The application program is resident in the terminal
and intended for outputting a result of the reading to user’s application or to the browser. Therefore, the user should
not use it if he creates his own application to handle the C-MOS Imager. The outputting is carried out by copying
the data onto clipboard and then issuing a keyboard event generated by pressing the Control key + “v” key. If you
application cannot perform pasting data from the clipboard by operating the keys described above, the data read in
this demonstration program cannot be correctly handled by your application.
•
1.
2.
Operating the demonstration
Invoke the application.
TDRead icon will appear in the task tray as shown in Fig. 5.37.
Fig. 5.37
3.
4.
Invoke a user’s application program. In this explanation, “Inbox” is assumed to be the user’s application.
The reading on a symbol will start by pressing the Trigger key. It will terminate when the preset time set up
with the Setup Tool (“TDSet.exe”) elapses irrespective of either the Trigger key is still being pressed down
or it has been released. The data read with the C-MOS Imager will output to the location where the carrot is
located.
119
Fig. 5.38
5.
Tap the icon in the task tray to display the menu. The part of the parameters set with Setup Tool will appear as
shown in Fig. 5.39. For detailed the settings, refer to Application for C-MOS Imager Setting Tool.
Fig. 5.39
120
Descriptions about each menu in Fig. 5.39 are as follows.
Table 5.11
Menu
*** msec
Add
LED
Buzzer
Normal
Read Count
Default
Close TDRead
6.
Description
A time period in millisecond of the timeout to terminate the reading is indicated.
Characters to be appended and output after the data are displayed.
A complete indication with the LED after reading a symbol has been completed is set
enabled or disabled.
A complete indication with the buzzer after reading a symbol has been completed is set
enabled or disabled.
A read mode either “Normal” or “Multi-step” or “Package” is selected. A delimiter
character is indicated in ( ) for the “Package” mode.
The number of steps to read symbols in the Continuous read mode is indicated. It defines
how many symbols are to be read in the mode while the Trigger key is being continuously
pressed down.
A mode of the reading either “Outdoor” or “Indoor”, etc. is indicated.
Exits the application.
Select Close TDRead menu to exit the application.
Note:
The application, TDRead.exe, cannot run concurrently with the other C-MOS Imager related applications,
TDSet.exe and TDDemo.exe. Be sure to close these applications if running before invoking TDRead.exe
application.
121
Application for C-MOS Imager Setup Tool
This tool allows the user to change the parameters and operating modes required for reading 1D and 2D
symbologies. The changed parameters and the modes are saved in ini file and become effective automatically
when the TDRead application invokes.
The parameters and modes to be saved are;
- Readable 1D and 2D symbologies
- Enable/Disable on reading symbologies
- Number of minimum and maximum digits of symbology
- Check digit calculation
- Output format
- Operation parameters
- Decode centering mode
- LED illumination adjustment (Aiming LED, illumination LED)
- Scanning mode
- Print density adjustment
•
1.
2.
3.
Setting the parameters
Invoke the application.
Select an appropriate tab so that you can change the parameters in that tab.
Selecting 1D tab (or 2D tab) allows you to change and set up the parameters for reading 1D symbologies (or
2D symbologies). The parameters with a check mark enable the respective symbologies to be read. Or,
removing the check mark disables the symbology not to be read. See Fig. 5.40.
Fig. 5.40
122
4.
Select Post tab to set up the parameters for reading postal symbologies. The parameters with a check mark
enable the respective symbologies to be read. Or, removing the check mark disables the symbology not to be
read.
Fig. 5.41
5.
Select Option tab to set up the detailed parameters for reading the symbology. First, select a symbology in
the comb list box that you wish to read. See Fig. 5.42.
Fig. 5.42
123
The major setting items in the tab are;
: With a check mark, it is possible to read the symbology selected in the comb box.
Enable
: A symbology that you wish to read can be selected.
Comb box
: Species the effective range of reading the selected symbology, the pull-down menu
Digit Range
box on the left is for minimum number of digits and the box on the right is for
maximum number of digits. A symbol of the selected symbology meeting these
limitations can only be scanned and decoded.
6.
Select OCR tab to set up the parameters for reading OCR fonts.
Fig. 5.43
The setting items in the tab are;
: Selects an OCR font from the listed fonts below that you wish to set up for reading. Only one
Font
kind can be selected at a time.
OCR A
OCR B
OCR Money (The OCR font printed on US dollar bills)
: Selects a direction, either in vertical or in horizontal, of the target OCR font to be read.
Direction
Template, Group G, Group H, Check Sum
: Changes the setting of each template (syntax of the OCR font).
: Specifies the syntax of the target OCR font in character string. The number of characters in
Template
one string that is specified is up to 49 and the number of templates can be specified
concurrently is up to 10 by delimiting each template with “t”.
: Specifies a character specified with the character set in the template “g” that consists of up to
Group G
49 characters.
: Specifies a character specified with the character set in the template “h” that consists of up to
Group H
49 characters.
Check Sum : Specifies check sum in character string that consists of up to 49 characters.
These parameters setting are necessary to avoid a misreading of OCR font.
mod 10, mod 36
: If a check is made in the check box of Check Sum, these buttons become operable to set up
the Check Sum.
124
mod 10
mod 36
a to BS
a
c
d
e
l
r
t
g
h
BS
ISBN
: Enter “0123456789” and set it to the mod 10 check sum.
: Enter “”0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ” and set it to the mod 36
check sum.
: These characters are used as keyboard to enter a template. Pressing a button will enter the
corresponded character in the template box. Each alphabet in the template has a specific
meaning below.
: Alphabets and numeric
Represents one in “0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ” characters.
: Check character
Specifies the location where the check sum calculation takes place.
: Numeric
Represents one in “0123456789”.
: Alphabets, numeric and symbols
OCR A
: “0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ()<>/\+-*$”
OCR B
: “0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ()<>^+-*$”
OCR Money : “0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ”
: Alphabet
Represents one in “ABCDEFGHIJKLMNOPQRSTUVWXYZ”.
: Specifies the line change location for character string that consists of multiple lines.
: Species the delimiter location to delimit between two templates in case of specifying multiple
templates.
: Specifies the location of the user specified character (Group G).
: Specifies the location of the user specified character (Group H)
: Enters a back space.
: Sets up automatically a template to read ISBN symbology available in Japan.
Example 1;
Reads only a character string consisted of 8 numerals lined straight.
Template : dddddddd
37680981
Example 2;
Reads only a character string consisted of a specific character at specific location.
Template : dddABCddd
For example, the following shows a character string consisted of three numerals, “ABC” and three numerals lined
straight.
551ABC983
Example 3;
Reads only character string consisted of a space.
Template : ddd ABC ddd
For example, the following shows a character string consisted of three numerals, a space, “ABC”, a space, and
three numerals lined straight.
551 ABC 983
125
Example 4;
Reads only character string consisted of multiple templates.
Template : ddddddddtddddlldd
For example, the following shows a character string consisted of multiple templates. The multiple templates consist
of 8 numerals lined straight, 4 numerals, two alphabets, and two numerals delimited by “t”.
99028650 or 9902XZ50
Example 5;
Reads only character string consisted of multiple templates. Each template has a specific character at specific
location.
Group G : ABC
Template : ddddddggg
For example, the following shows multiple templates. Each template consists of 6 numerals lined straight and A or
B or C lined at the “g” specified location. Using the user definitions (Group G, Group H), it is possible to specify
multiple specific characters at the specified locations.
654321ABC or 654321BAC or 654321CCC
Example 6;
Reads only character string consisted of multiple lines.
Template : ddddddddrllllllllrlllldddd
For example, the following shows a character string consisted of multiple templates in multiple lines. Line change
is made by specifying “r”. The first template consists of 8 numerals lined straight. The second one consists of 8
alphabets lined straight. The third one consists of 4 alphabets and 4 numerals lined straight.
12345678
ABCDEFGH
ABCD1234
Example 7;
Reads character string using check sum calculation.
Template : dddddddc
Check Sum : 0123456789 (mod10 check sum)
For example, the following shows reading will become possible only if a calculated result meets the equation
below. “s” assumes the sum of 7 “d” at the template above.
(numeral at “c” location in the template) = 10 - (remainder of “s” /10)
(10 means “mod 10”.)
12345672
126
7.
Select Decode tab to set up the decoding mode for reading a symbol. See Fig. 5.44.
Fig. 5.44
The setting items in the tab are;
: Specifies the intensity in the range between 1 and 7 for target printed symbol. Setting
Print Weight
the value higher will improve reading a symbol printed in dark color, or lower will
improve reading a symbol printed in pale color.
: Specifies the area to set up reading valid. If a check is made in the box, the C-MOS
Centering Mode
Imager will read only symbols located within the specified area with Top, Bottom,
Left and Right parameters, and not read other symbols out side of the specified area.
Top, Bottom, Left, Right
: Specifies the area to set up reading valid with these four parameters. Each value to set
the area maximum is, Top → 0, Bottom → 479, Left → 0, and Right → 639.
127
8.
Select Exposure/LED tab to set up the scan mode and the intensity of LED.
Fig. 5.45
The setting items in the tab are;
Scan Mode : Selects a scanning mode in pull-down menu. This mode consists of the exposure parameter
and the LED intensity parameter which should be adjusted according to sunlight to set up
optimum scanning performance. Change the parameters to suit the surrounding condition.
Table 5.12
Pull-down menu
Default
Indoor (Near the window)
Indoor
Warehouse
User Setting
Description
Sets up the default scan mode.
Sets up the optimum scan mode under the brightness near by window.
Sets up the optimum scan mode under the brightness in room.
Sets up the optimum scan mode under the brightness in warehouse.
Sets up the default scan mode. This mode only can set up the intensity of the
illumination LED.
Site references described for each parameter above are just for reference. They do not guarantee you the scanning
performance with one of the scanning modes set up by following the explanation on this page.
LED Intensity
: Sets up the intensity of the illumination LED.
Table 5.13
Aimer LED
Illumination LED
Sets up the intensity of Aimer LED in a value between 0 and 100 percent.
Sets up the intensity of Illumination LED in a value between 0 and 100
percent. Unless the scan mode has been set to the manual mode, the fixed
value will be set in this parameter.
128
9.
Select Multi Step tab to set up the Multi-step mode.
Fig. 5.46
The setting items in the tab are;
: Sets up a decoding mode in this application.
Select Decode Mode
: Normal mode.
Normal Mode
: Reads symbols continuously while the Trigger key is being pressed down and
Multi Step Mode
outputs a result every time reading one symbol is complete.
: Reads symbols continuously while the Trigger key is being pressed down and
Package Mode
outputs a result of them after all the readings are complete. The output is not
made either if the Trigger key is released before readings for the specified
number of symbols are complete, or if the specified timeout has elapsed.
: Sets up the number of symbols to be read for the Multi-step and Package
Read Count
modes.
: Sets up decoding result and character of the delimiter for decoding results in
Separator
output message for the Package mode.
129
10. Select System tab to set up the TDRead.exe application and a method to invoke the system.
Fig. 5.47
The setting items in the tab are;
: Sets up the Timeout for reading symbol. Reading will terminate either if the
Timeout
Trigger key is released or if the Timeout elapses while scanning continues.
: Specifies a character to be appended subsequent the output result.
Add Suffix
: Sets up the notification to be made if reading a symbol is complete.
Indicator
: Sets up the notification to be made with the LED.
LED
: Sets up the notification to be made with the buzzer.
Buzzer
Power up device with trigger key
: Sets up the Trigger key to turn on the power. With a check mark in the box, the
power on the terminal can be turned on when one of the Trigger keys is pressed
down.
130
11. Select About tab to indicate information about versions of the application and the library.
Fig. 5.48
12. Tap OK button at upper-right corner to close the application. All the settings will be saved in TDSet.ini file of
FlashDisk\CASIO.
13. Or, tap X button to close the application if you do not wish to save the settings.
131
Application for C-MOS Imager demonstration
This application demonstrates the performances of reading 1D and 2D symbologies with the C-MOS Imager.
1.
Invokes the application by accessing the menus in order of Start → Programs → Utility Scanner →
Demo.
•
1.
2.
Reading 2D symbologies
Select Read Symbol in File menu.
Press the Trigger key to read a symbol. A result of the reading, symbology and the number of digits are
displayed in the window. All the symbologies except OCR B and OCR Money symbologies can be read in
this demonstration. Multiple symbols can be read at the same if Number of Symbols in the window is
specified with a numeral between 1 and 9.
Fig. 5.49
132
•
1.
2.
3.
4.
Capture image
Select the menus in order of File → Capture to set the terminal in the capture mode.
Press the Trigger key to capture an image. The size of an image is 640 x 480 dots and the size of window in
which the captured image appears is 240 x 160 dots.
Select the menus in order of File → Capture Bitmap to set the terminal in the capture/storage mode.
By pressing the Trigger key, an image is captured, displayed in the window and then saved in the size of 320
x 240 dots to the bitmap file located at “My Documents\TDDemo\Picture**.bmp”. ** represent a numeral.
Fig. 5.50
•
1.
2.
3.
Streaming
Select the menus in order of File → Streaming to set the terminal in the streaming mode.
Press the Trigger key to capture images continuously. The size of images captured is 640 x 480 dots and the
size of window in which the captured images appear is 160 x 120 dots.
To terminate the streaming mode, press the Trigger key again.
Fig. 5.51
133
•
1.
2.
Capturing signature
Select the menus in order of File → Sign Capture to set the terminal in the sign capture mode.
Press the Trigger key to capture the signature and the symbol both printed on the demonstration slip and
display them on the screen as shown in Fig. 5.52.
Fig. 5.52
134
Specifications of the demonstration slip
11 mm
22 mm
The sample symbol
The area for signature
Fig. 5.53
The resolution of the symbol is 0.33 mm and the aspect ratio (the ratio of horizontal bar : vertical bar) is 30. Any a
pair of signature and symbol can be captured in the TDDemo.exe application as long as the relative position of
the signature and the symbol meets the specifications in Fig. 5.53.
135
•
1.
2.
Version information
Select the menus in order of Help → About to display the version of this application.
Tap X button at upper right corner in the screen to exit the demonstration.
Fig. 5.54
136
6. Security
6.1 Security Setup
Features
The terminal supports the following features to enhance the security performance.
•
•
•
•
Setting/reading individual IDs
CASIO will provide a dedicated tool to read the ID written in the given Flash ROM at the factory.
Setting/reading sales representative IDs
CASIO will provide a dedicated tool to write sales representative IDs for preventing illegal use of an
application and an API to read out the ID.
Support of VPN
VirtualPrivateNetwork (PPTP) function will be supported.
Support of WEP
The encryption function for send/receive data operating under Wireless LAN environment will be supported
by the driver that the Wireless LAN card manufacturer provides.
6.2 Copy Protect For Distributor’s Software
CASIO will provide a dedicated tool for writing a distributor code in the Flash ROM area as well as an API to
access the area.
•
With this tool write a distributor code in Flash ROM area.
•
With this API create a dedicated installer that contains the check function of the distributor code.
137
7. Development Environment
7.1 Development Environment With Microsoft Tools
Table 7.1
•
•
•
•
•
•
•
Development platform
Development language
Microsoft Windows 2000 (SP2 or later release)
Microsoft Windows XP
Microsoft VisualStudio.NET 2003
EmbeddedVisual C++ 4.0+SP1
SDK for DT-X10 series
CASIO LIB (support library)
C-MOS Imager SDK for DT-X10 series
System configuration
PC
LAN
LAN
card
ハブ
USB
4
Fig. 7.1
USB/RS-232C
Target
Emulation on PC
Use the WCE emulator on a PC to build a user program and to confirm its operation in the same environment.
Most of the debugging work can be performed in this emulation environment.
Remote debugging
Transfer the created application program onto an actual terminal and debug the program remotely from the
PC.
138
Confirming operations on the actual terminal
Use the integration environment to transfer the created program onto an actual terminal, then confirm program
operation on it.
Editing the source code
Editing the resources
Compile/link with WCE emulator
Emulation debugging
Compile/link with ArmV4T
Debug
Transmission of debugged
modules
Remote tool/Remote debugger
Execution of debugging
Compile/link with ARMV4T
Release
Transmission of debugged modules
Execution
PC side
Terminal side
Fig. 7.2
139
7.2 Local Fonts
Using Visual Studio .NET 2003, your local fonts can be displayed on the display of the terminal while an
application program is running. This chapter describes how to display your own local fonts.
Fig. 7.3 shows a screen shot of Microsoft Visual Basic .NET under the OS of Japanese version running on PC. The
form on left side of the screen is designed in “Japanese MS UI Gothic font”. If you deploy this application
software as is to the terminal from PC, it will erratically appear on the display as shown in Fig. 7.4. This is because
the terminal does not have the “MS UI Gothic font” file implemented.
Fig. 7.3
Fonts appeared erratically
Fig. 7.4
140
1.
In order to make the terminal display your local fonts, copy a font file of your own local font into Windows
folder of the terminal from PC.
The example below shows that fonts of “msgothic.ttc” appear on the display of the terminal while an
application is running except the system fonts circled by red line as shown in Fig. 7.5 after the font file is
copied from PC into the terminal.
Fonts of the system do not still appear in the local font.
Fig. 7.5
2.
On the PC, change the registry settings of the terminal to make the system fonts appear on the display as
shown in Fig. 7.6.
Create \Fontlink\SystemLink folder with Remote Registry Editor (see Fig. 7.7) and change each value as
follows:
Registration key
Name
Value
: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fontlink\SystemLink]
: Tahoma
: \Windows\msgothic.ttc,MS Gothic
Fig. 7.6
141
Fig. 7.7
Note:
If you wish to run eMbedded Visual C++4.0 to develop application program in your local font, change the registry
setting to the same as shown in the example above.
142
8. Precautions On Using C-MOS Imager
The DT-X10 provides capabilities for not only simply reading conventional 1D symbols but also for reading in the
2-Dimensional codes with a CMOS Imager, which has replaced the conventional laser scanner. In addition, the
improved camera function has added a new aspect of operation including image capturing and streaming, etc. In
association with these changes, the read and operation methods have also changed from those of conventional laser
scanners.
This chapter describes the performance and functions of the C-MOS Imager as well as operating precautions and
suggestions. Note that this chapter contains only supplement information for the imager, so please refer to DT-X10
Library Manual or relevant chapters in this manual for detailed information about each function.
The imager is explained by focusing on the following three points:
• Imaging performance by camera’s optical operability
• Imaging performance by print quality
• Imaging performance by read settings.
143
8.1 Imaging Performance By Camera’s Optical Operability
Soiled camera filter
If the camera filter inside the case is soiled or scratched, the captured image will lose its sharpness, making the
symbols difficult to read. If the filter is soiled with oil, finger prints, etc., wipe the filter with a soft, damp cloth to
avoid damaging the filter surface.
Focal plane and depth of field
As with a fixed-focus camera this imager has a limited range in which it can produce a sharp image. The subject
plane in which the camera can produce a sharp image is called the focal plane, the distance from the camera’s
device surface to the focal plane is called the focal distance, and the range within which the subject remains sharp
and in focus is called the depth of field.
The focal distance of the imager incorporated into the terminal, is 18 cm (or 7 inches), and the size of the focal
plane is 8 cm x 11 cm.
The depth of field is generally formed by two distances, one of which (near side) is calculated as one third of the
focal distance in the outward direction and the other (far side) is calculated as two thirds of the focal distance in the
inward direction. Accordingly, the depth of field of the camera is:
Near side : 18 x (1-1/3) = 12 cm
Far side : 18 x (1+2/3) = 30 cm
However, this range varies with the ambient brightness - it becomes smaller than that calculated above if the image
is captured in a dark place.
Focal plane
Focal distance
Depth of field
Fig. 8.1
144
Variation of ambient light
This imager will detect the ambient brightness from the obtained image and calculate the optimum exposure time
or sensitivity (gain) to prepare for the next image capture. Therefore, if a new capture is made in an environment
different from the previous capture, it may be required to repeat the capture several times until the optimum value
can be calculated. In addition, the imager is affected by various light-related conditions, such as a location by a
window, overcast weather, sun and shade, morning and evening settings, etc., which generally are not a conscious
consideration for humans (and are handled without conscious thought).
Reflected light from the illumination LED, backlight
In addition to direct light from the light source (producing the effect of backlight), reflected light of the illumination
LED, re-reflected light on the lens in an excessively bright environment, etc., may cause part of the symbol to
disappear into the white background or hamper the correct exposure calculation, resulting in decoding no longer
being possible. Such a detrimental effect of the illumination LED can be avoided by the “LED Light Intensity
Adjustment Function”, described later.
Position of the Imager
The Imager is oriented at a 45-degree downward angle, if the terminal is held horizontally. Thus, the Imager faces
obliquely upward if the terminal is held vertically as shown below, and faces obliquely downward if the terminal is
held horizontally. And, if the terminal is inclined 45 degrees, the Imager will now be held horizontally, so it will
face straight towards the object.
In order to avoid a mirror reflection (occurs within ±5 degrees from the shooting direction of the Imager), it is
recommended to hold the Imager at a 30 degree inward inclination so that image capturing can be performed under
a condition where the target symbol is slightly above the top edge of the terminal.
45°
30°
45°
Recommended position
Fig. 8.2
145
Moving object, hand blurring
The Imager requires a certain amount of exposure time for image capturing. This means that if the subject is
moving during this interval, the resultant image will be blurred. Therefore, if you need to capture a symbol while
looking for its location, it is advised to adjust the Imager to the location of the symbol with the aimer LED, then
perform reading with the Imager held still so that the objective symbol, as well as the resulting image of the symbol,
is also still relative to the Imager.
Sensitivity and noise
Due to the nature of CMOS sensor, it has poor sensitivity and the image is easily affected by noise. In particular,
this is significant when image capturing is attempted in a dark place or the subject is far from the Imager.
Points for optimum image capturing
•
•
•
•
•
•
Always keep the Imager filter clean.
Remember that the optimum image capturing distance is around 18 cm.
As much as possible, capture a symbol in a location where the variation in ambient light is small.
Hold the terminal so it is inclined 30 degrees inward and so that the symbol can be seen in a position slightly
above the terminal.
To read a symbol, first adjust the Imager position with the aiming LED and then begin capturing by holding
the terminal still (fixed).
In a dark location it is advisable to capture within the effective coverage of the illumination LED while
ensuring sufficient illumination for the distance area.
146
8.2 Imaging Performance By Print Quality
Resolution of symbols
The resolution of symbols that can be read is as follows:
1D, stack-type 2D symbol : 0.20 to 1 mm
Matrix-type 2D symbol
: 0.38 to 1 mm
Size (width)
The view angle of the Imager is approx. 30 degrees, however, it is not always possible to read a whole symbol that
is contained in this range. The number of bars/cells that can be correctly identified is restricted depending on the
depth of field corresponding to each resolution and the number of sensor pixels (640 x 480).
Code39
0.20 … 100 (44 x 61) to 175 (77 x 107)
0.25 … 95 (42 x 58) to 215 (95 x 131)
0.38 … 65 (29 x 39) to 305 (135 x 186)
0.50 … 80 (35 x 49) to 350 (155 x 214)
1.00 … 150 (66 x 91) to 600 (266 x 366)
PDF417
0.25 … 100 (44 x 61) to 210 (93 x 128)
0.38 … 80 (35 x 49) to 280 (124 x 171)
0.50 … 100 (44 x 61) to 300 (133 x 183)
Data Matrix
0.38 … 90 (40 x 55) to 150 (66 x 91)
Fig. 8.3
0.50 … 110 (49 x 67) to 285 (126 x 174)
Depth of field in mm
Resolution of
symbol in mm
Figures in parentheses indicate the size of the view field (unit: mm) that is associated with each depth of field.
147
Print quality
Generally, a printer that has a resolution higher than 400 dpi is considered capable of printing symbols at a dot size
smaller than 0.125 mm. In an actual application it is preferable to perform printing so that one fine bar (cell)
consists of 3 to 5 dots, and in that case, the resulting dot size will be between 0.18 to 0.38 mm.
Some printers have the capability to emphasize fine lines, which may produce a difference in the width of
black/white bars (cells) from that produced with other printers, even if these two black/white bars (cells) indicate an
identical value. In this case, increase the width of the fine bars (size per cell) of each symbol to relatively reduce the
difference.
Also, if a symbol is duplicated by a copy machine or sent through a facsimile, the print quality of the entire symbol
is reduced. The readability becomes less than the original. Also, in this case it is possible to restrict the relative error
by printing the symbol so that it becomes larger in size than the original. However, an enlarged copy is useless,
since the printing error must also be relatively enlarged. Even with the given print quality it is sometimes possible
to improve readability by specifying “Print Weight”, as described on page 128.
Margins around a symbol, character, figure, peripheral object
A CMOS Imager is different from a laser scanner and will capture a symbol in terms of the area. Therefore, the
resulting image may contain characters, figures, and objects other than the target symbol and may require an
extended period of time to detect the symbol and increase the frequency of read errors, if a complex picture is
captured. To avoid this problem it is recommended to provide a sufficient margin around the symbol and to refrain
from printing unnecessary characters and figures. When detecting symbols it is possible to limit the target range of
the search by specifying the “Specifying capture range (Decode Centering Mode)”, as described on page 152.
Fig. 8.4
Fig. 8.5
1D symbol: 10 times of fine bar or 2.5 mm whichever is
larger.
148
2D symbol: 4 times larger than one cell.
Error correction for 2D symbols
The C-MOS Imager is provided with an error correction function that can handle various types of damage to
symbols, such as that caused by dirt and dust, scratches, faintness, etc. However, this function can only handle
damage that appears locally in the symbol area, and is not effective if the entire symbol is soiled or faint.
Furthermore, it is not possible for the Imager to read symbols if a cutout mark required for detecting the symbol
position is obscured.
Readable patters
Unreadable patters
Entirely faint
Entirely soiled
The cut-out mark is obscured.
Fig. 8.6
149
Symbols on glossy paper or under a film window
With the C-MOS Imager, the illumination LED will irradiate the target surface for reading symbols. This may
sometimes cause the objective symbol to fade into the background due to the adverse effect of the reflected light of
the LED when the symbol is printed on a glossy paper or covered by a film window.
In order to read symbols under such conditions, either reduce the LED illumination using the “Adjusting LED
illumination intensity”, as described on page 153, or turn off the LED so that the reading is made under the ambient
light only.
Mobile symbols (for a reference)
Mobile symbols (displayed on LCDs of cellular phones) can be read easily if you turn off the illumination LED
and turn on the backlight. However, the terminal does not formally support the mobile symbol read function.
Points for optimum image capturing
•
•
•
•
•
•
•
The printed bar width for 1D symbols and 2D symbols should be 0.2 mm or greater and 0.38 mm or greater,
respectively.
Be aware of the number of digits the symbol represents.
Check the resolution of the printer with regard to whether a fine bar consists of 3 to 5 dots.
Remember that a symbol copied or transmitted through a facsimile machine results in poor printed quality.
Do not overestimate the 2D symbol correction function.
Do not print extra characters and figures around the symbol.
Exercise care with the reflected light of the LED when reading a symbol on a glossy paper or behind a film.
150
8.3 Imaging Performance By Settings
Selecting only the symbol to capture
The C-MOS Imager can read various kinds of symbols. However, in general, symbols that the user must read
during actual daily operation are very limited only to several kinds. If the image capturing permission is set in such
a way that even unnecessary symbols are included, the search range for decoding will be widened, the time to
complete the capturing will be prolonged, and the frequency of read errors will increase, unnecessarily. It is
strongly recommended to limit the number of symbols to be given capture permission in accordance with user’s
daily application.
Specifying the limited number of digits
In addition to the above mentioned restriction that applies to the selected symbols, each of the symbols available
for the user has a specific number of digits that can be captured. Specifying the number of digits for which to
exceed the given range may cause errors (in particular, an abbreviated capture). To avoid this, as with the objective
symbols specification, specify an appropriate range of digits for the actual operation.
Check digit calculation
Some symbols contain a check digit (or check character) used to validate the contained data. The check digit
calculation function is essential for these symbols, however, it is recommended to also apply it to other symbols
that allow the selection of this function.
OCR fonts, Postal codes
The C-MOS Imager has function to capture OCR fonts and Postal codes in addition to capturing 1D symbols and
2D symbols. However, note that the performance of this C-MO Imager for OCR fonts and Postal codes is inferior
to that for reading 1D symbols and 2D symbols. (Furthermore, note that the OCR A font is designed for
mechanical readability only, and the OCR B font takes also operator legibility into account.)
When operating the terminal for application reading OCR fonts, use the following functions as much as possible.
• Limiting the candidate using the template
For reading OCR fonts it is necessary to specify the print format with an appropriate “template”. The
specification method includes “Numeric”, “Alphabet”, “Alphanumeric”, “All characters”, and the
user-specified character range (maximum two patterns). Depending on the character string to be used, specify
the optimum format to minimize the number of candidates.
• Using checksum
The OCR function, similarly to the function for reading other symbols, can also be used for checksum
calculation to validate the obtained data. If the user prefers to specify an original data format, it is
recommended to use this function.
151
Template
All characters [‘e’]
Alphanumeric [‘a’]
Line feed [‘r’]
Alphabet [‘l’]
Numeric [‘d’]
Separation between
templates [‘t’]
ABCDEFGHIJKLMNOPQR
STUVWXYZ
0123456789
Checksum [‘c’]
( )< >/ \ + - * $ \
Optional combination
Group G [‘g’]
Group H [‘h’]
Fig. 8.7
Specifying capture range (Decode Centering Mode)
Where there is more than one symbol printed in a single slip and if capturing is attempted without a particular
specification, an unintended symbol(s) may be decoded. If this is the case use this function to limit the capture
range so that only the symbols that overlap within this range can be selectively decoded. This is useful not only for
decoding the intended symbols but also for limiting the range to search for a symbol included in the obtained
image.
As shown in the following example if the range of capture is specified by the center rectangle and the captured
image has produced two symbols, only the symbol overlapping the specified rectangle will be decoded to yield
“CODE39 20CHAR 123456”.
001122334455667788991234
*CODE39
20CHAR
Fig. 8.8
152
123456*
Specifying the print density (“Print Weight”)
Suppose that two sets of black/white bars (cells), both indicating an identical value, are printed on different surfaces,
one of which is normal and the other of which is prone to be affected by the print intensity of the printer or the
reflection from a metallic surface. If these two printed results have a difference in appearance, it may be possible to
improve the capture accuracy with this function. Use a smaller value if the printed section (dark bar/cell) looks
thinner than that on the normal surface, and in contrast, use a larger value if the printed section looks thicker.
Print Weight
1
7
4
Fig. 8.9
Dark bar/cell
Thin
Thick
Adjusting LED illumination intensity
If the target symbol is printed on a glossy paper or behind a film that readily reflects incident light, or where the
scanning environment is bright enough to eliminate the use of illumination LED, it is possible to restrict reflected
light by modifying the illumination intensity of the LED itself. This is also useful for extending the battery life.
Points for optimum image capturing
•
•
•
Depending on your application, adjust the following settings to each optimum value:
- Symbols permitted for capture
- Number of digits to capture
- Check digit calculation
For OCR fonts capture, specify the most appropriate template and checksum.
Depending on your application, use the following functions.
- Print density
- Capture range
- LED illumination intensity
153
8.4 Troubleshooting
Table 8.1
Check item
Symbol cannot be captured.
Is the Imager filter soiled ?
Is the filter damaged ?
Is the symbol resolution too fine or
too rough ?
Is the symbol too large ?
Are symbols printed with a
sufficient contrast ? In addition,
does the printed surface look white
or have light-warm color, or is the
symbol printed in black or in a
dark-cool color?
Does the symbol have a sufficient
margin around it?
Is the paper on which the symbol
is printed glossy ? Is it covered by
a film, etc.?
Is the objective symbol enabled by
the setup for capturing ?
Is the parameter setting for the
symbol to be captured correct ?
Is the green LED irradiating the
symbol ?
Is the Imager too close to or too far
from the symbol?
Is the symbol or Imager fixed for
capturing ?
Is the environment for capturing
symbol dark ?
Is the symbol directly irradiated by
the illumination? In addition, is the
illumination beam an incident
beam or a reflected beam into the
Imager ?
Remedies
Reference
page
Wipe off the dirt with a soft cloth.
Replace the filter.
Printing should be made at a resolution of 0.2 to 1 mm for 1D
symbols, and 0.38 to 1 mm for 2D symbols.
If the full data is not contained in one symbol, divide it into
two or more symbols.
Print the symbol so that the contrast of the symbol is
significant. Also, print the symbol in black on a white
background.
144
144
147
Do not print extra characters or figures around the symbol.
Allow a sufficient margin around the symbol.
Symbols must be printed on paper with less gloss. Do not
overlap film, etc., on the symbol.
Reduce the LED illumination intensity of the Imager.
Set the symbol to be enabled for capturing.
148
Set the parameters correctly for the symbol.
• Check if the number of characters derived from the
symbol is within the specified range.
• Check if the check digit calculation is specified for
symbols that do not require the check digit calculation.
Turn on the green LED so as to irradiate the center of the
target symbol.
Try to change the distance between the Imager and the
symbol.
Fix the symbol or Imager for capturing.
151
Sufficiently illuminate the symbol to be captured.
Prevent the symbol and Imager from being directly irradiated
by intense light.
Continue.
154
147
--
150
153
151
-144
146
145, 146
145
The captured result is incorrect.
Are unnecessary symbols set to be
captured ?
Is the setup of the parameters for
the symbol correct ?
Are symbols close together or are
extra characters or figures printed
around the symbol ?
Is the symbol distorted or warped?
Does the symbol data contain
elements other than the character
code ?
Set only necessary symbols to enable for capture.
151
Make the correct settings for symbol parameters.
• Check if the setup for capture output is correct. (Check
the check digit output, start/stop character output, and
system number output.)
Print the symbols so as to allow sufficient space between
symbols and distance from other characters.
Use the specification of the capture range (Decode Centering
Mode).
151
Print symbols on a flat surface.
Control characters, extra characters, and special characters
may not be correctly displayed because they do not have
corresponding fonts. In order to display these characters it is
necessary to use a specific application to make the necessary
conversion.
• Control characters (Tab, CR, LF, etc.)
• Fnc1 (GS) of EAN 128
• Special characters (encircled numerals, roman numerals,
etc.)
• Pictogram
---
155
148
152