
DualRunners – Communication Protocol v1.3 - 2 -
Data Capture
for Workforce
in Motion
SUMMARY
SUMMARYSUMMARY
SUMMARY
SUMMARY ................................................................... 2
REVISION HISTORY .......................................................... 4
1.
1.1.
1.
INTRODUCTION ........................................................ 5
1.1.
G
ENERALITIES
.......................................................... 5
1.2.
G
ENERIC PACKET
........................................................ 5
2.
2.2.
2.
COMMUNICATION PROTOCOL .............................................. 6
2.1.
B
IDIRECTIONAL PACKETS
................................................... 6
2.1.1. C
ONTROL MESSAGES
.............................................. 6
2.2.
S
CANNER TO HOST MESSAGES
................................................ 7
2.2.1. E
NCAPSULATION SCHEMA
........................................... 7
2.2.2. D
ATA STRING SCHEMA
............................................ 7
2.3.
H
OST TO SCANNER MESSAGES
................................................ 8
2.3.1. C
OMMUNICATION MESSAGES
......................................... 8
2.3.2. S
CANNER MESSAGES
............................................. 10
2.3.3. U
SER
I
NTERFACE MESSAGES
....................................... 12
2.3.4. M
ISCELLANEOUS MESSAGES
........................................ 15
2.3.5. C
APTURE MESSAGES
............................................. 19
2.3.6. A
DVANCED CAPTURE MESSAGES
..................................... 22
2.4.
D
ECODER
C
OMMUNICATION
P
ROTOCOL
.......................................... 24
2.4.1.
FRAME FORMAT
................................................ 24
2.4.2. H
EADER
..................................................... 24
2.4.3. T
YPE
....................................................... 25
2.4.4. S
IZE
....................................................... 25
2.4.5. C
OMMAND
.................................................... 25
2.4.6. E
XAMPLES
................................................... 33
E
XAMPLE
1.1
–
G
ETTING CONFIGURATION OF
C
ODE
39
SYMBOLOGY
. ................. 33
E
XAMPLE
2.1
–
S
ETTING A CONFIGURATION OF
C
ODABAR SYMBOLOGY
. ................ 34
E
XAMPLE
2.2
–
S
ETTING A CONFIGURATION OF ALL SYMBOLOGIES
. .................. 35
E
XAMPLE
3.1
–
M
ODIFYING A CONFIGURATION OF ALL SYMBOLOGIES
. ................ 35
E
XAMPLE
4.1
–
S
ENDING A SPECIAL COMMAND TO
C
ODE
39
SYMBOLOGY
. ............... 36
APPENDIX 1: BLUETOOTH PROTOCOL ........................................... 37
APPENDIX 2: RFID COMMUNICATION PROTOCOL .................................. 46
APPENDIX 3: RFID TAG DATA READ/WRITE EXAMPLES ............................ 54
(FOR BLACKBERRY, SYMBIAN & JAVA PLATFORMS) ............................... 54
1. INTRODUCTION .......................................................... 54
1.1
G
ENERALITIES
........................................................... 54
2.
2.2.
2.
MIFARE ULTRALIGHT TAGS ............................................. 55
Komentarze do niniejszej Instrukcji