SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
1
DL6960 Demo Software User's Guidev1.4
1. Parameter interface operation............................................................. 1
1.1 Open Port.............................................................................................................................1
1.2 Parameter Setting:.............................................................................................................. 2
2. Set work mode parameter.................................................................... 4
2.1 Auto-running mode Setting:.............................................................................................. 4
2.2 Real-time-inventory Setting:..............................................................................................7
3. The Necessary Knowledge.................................................................... 8
3.1 EPCC1G2 tag memory.......................................................................................................8
3.2 18000-6B tag........................................................................................................................ 8
3.3 Data display (tag ID, passwords, memory data is display in 16 hexadecimal).............8
4. EPCC1-G2 Test operation.................................................................... 9
4.1 Query Tag EPC(The operation needing to choose the tag all need to query tag first)9
4.2 Query Tag TID.................................................................................................................... 9
4.3 Read Data, Write Data, Block Erase.................................................................................9
4.4Revise the password...........................................................................................................12
4.5 Write EPC (Needn’t query tag).......................................................................................13
4.6 Set the state of read and write protection.......................................................................13
4.7 Read Protection.................................................................................................................14
4.8 EAS Alarm.........................................................................................................................15
4.9 Kill Tag(Permanently Kill)......................................................................................... 16
4.10 Mask conditions.............................................................................................................. 16
5. Mix-Test Operation............................................................................. 17
6. Buffer Operation..................................................................................18
7. 18000-6B Test Interface Operation....................................................18
7.1 Query Tag...........................................................................................................................18
7.2 Read and Write Data Block / Permanently Write Protect Block of Byte................... 21
8. Frequency Analysis Operation...........................................................22
9. Config TCPIP.......................................................................................22
9.1Web config.......................................................................................................................... 22
9.2Serial port config................................................................................................................24
DL6960 Demo Software User’s Guide v1.4
1
1. Parameter interface operation
1.1 Open Port
Before open com port, please make controller properly connected with the host using the
communication cable provided and then turn on the power.
(1)Auto Open Comport:
Value 255(0xFF) is broadcasting address. All controllers will respond the order with a
broadcasting address.
Other value (0x00~0xFE) is controller address. Only will the controller conforming to the
address respond the operation.
Click ,If reader connect the computer's COM1 ~ COM9, we can see the
port display in the place. the demonstration software to by connecting the
port and written communication, the connection to the port to have a beginning, such as :
else
(2)Open Designated Comport:
Click ,the Baud will Auto Select From 115200bps, 57600bps,
38400bps,19200bps,9600bps,if success
else
(3) Open USB port:
If the reader is set to usb communication, then we select “USB” ,and click
DL6960 Demo Software User’s Guide v1.4
2
.
(4)Open TCP/IP
Select ,and input reader ip and port: ,click
.
1.2 Parameter Setting:
(1) the new reader address to set. This address can't be 0xFF.
If set 0xFF, reader will return error information.
(2) set and save power configuration.
( 3 ) select the reader’s band, different band, the frequency is
different.
(4) Set reader working
Min Frequency and Max Frequency. In different places, the radio requires the rule to be
different. Users can follow the local situation and choose to read more sensitive frequency
range of the card. In single frequency point operation, only need to set two frequencies to
the same value. In frequency hopping operation, only need to set two frequencies to the
different value.
(5) demo software start run, default use the
baud rate 57600 to open COM port, reader power on, reader baud rate default is 57600.
After change the baud rate, reader use the new baud rate until power off. Close port and
open port, the baud rate no change. The demo software will use the new baud rate, until
close the demo software.
(6) set the inventory scan max response time
of reader. If demo software sends the inventory order, it will wait 30*10ms for reader
DL6960 Demo Software User’s Guide v1.4
3
response and exits.
(7)GPIO Operation
Select need pins , click , Can control the output state pins , Click
,can get output state pins.
( 8 ) , Select antenna 4 , click
,At this time, antenna 4 in working status, can also select multiple antenna
working together.
(9) ,this function is used to set weather
detect antenna before query tag.
(10) ,select release time
,click can set release time.
(11) ,select output port,click ,
Can install require notification output port.
(12) ,Choose buzzer switch state, click Settings button to
complete the operation, buzzer open, when reading or writing to label operation is successful have
prompt.
DL6960 Demo Software User’s Guide v1.4
4
( 13 ) , select click
,can get real
Clock time ,
if clock time is error,
can
select ,input right time
,click ,Can complete on
time of adjustment.
(14) Set or get saved EPC/TID length
in buffer.
(15) ,click ’Get’ button can get module version.
(16) click ‘Get’ button can get reader’s serial number.
(17) this function is used to change reader to flash module mode,
when changed, reset power can recover it.
2. Set work mode parameter
2.1 Auto-running mode Setting:
(1) ,select relay action,accuracy ,click
DL6960 Demo Software User’s Guide v1.4
5
,if successed ,can see .
(2 ) , choose mask area,for example
choose EPC , mask start bit address: , mask bit length , mask data
,if successed,can see
(3)
, choose
query tag type or ,
only choose ,
you can choose query
action, or or ,if successed,can see
.
( 4 ) , choose pulse time ,
click ,if successed,can see .
(5) ,only choose ,reponse pause
time effective,if successed,can see .(only choose
,can get Reader storage blocks Tag information.
( 6 ) , select trigger time
DL6960 Demo Software User’s Guide v1.4
6
,click ,if success,can see
(7) ,input
start address and read word number. click ,if success,can see
.
(8) ,
(only choose answer mode ,can
operate other page ) click if successed,can see
.
(9) ,click button,if successed,can see above six
parameter。
(10)Only set command notify can do following operation
,click ,if get tag information,can see:
click ,then will clear reader storge blocks tag information.
(11)Only set not command notify could get data,click ,if get tag information
show:
DL6960 Demo Software User’s Guide v1.4
7
,click will stop data getting。
2.2 Real-time-inventory Setting:
(1) select read tag type on real-time- inventory mode.
select read pulse time on real-time- inventory mode.
Select tag filter time, if select 0 is not filter.
Select Q and Session on real-time-query inventory.
When Session is AUTO, only effective with EPC query.
set mask conditions on real-time-
inventory mode, if you want it effective, you should check .
Set query TID parameter on real-time-query inventory, if
you want it effective, you should check .
set parameter with you select condition, get reader
parameter on real-time-inventory inventory.
(2) Set reader work mode, if it set to
DL6960 Demo Software User’s Guide v1.4
8
, we can get data from port by button
3. The Necessary Knowledge
3.1 EPCC1G2 tag memory
Tag memory divided into four storage areas, each storage area can be made up of one or
more memory words. The four storage areas:
EPC areas (EPC): Store the area of EPC number, this module stipulates it can store 15
word EPC number. Can read and can write.
TID areas (TID): Store ID number established by the tag production firm. There are 4
words and 8 words two kinds of ID numbers at present. Can read and
not can write.
User areas (User): This area of different manufacturers is different. There is no user area
in G2 tag of Inpinj Company. There are 28 words in Philips Company.
Can read and can write.
Password areas (Password): The first two words is kill password, the last two words is
access password. Can read and can write.
Can write protect in four storage areas. It means this area is never writeable or not writeable
under the non-safe state; only password area can set unreadable.
3.2 18000-6B tag
6B tag has a memory space, the minimum 8 bytes (byte 0- 7) is UID of the tag, and can't
be rewritten. Following byte all can be rewritten, can be locked too, but once locking, can't
rewrite again, can't unblock either.
3.3 Data display (tag ID, passwords, memory data is display in 16 hexadecimal)
DL6960 Demo Software User’s Guide v1.4
9
Display in Hex, then 11 is first byte, 22 is second byte, and 1122 is first word.
Total 8 bytes, in other words, total 4 words.
4. EPCC1-G2 Test operation
4.1 Query Tag EPC(The operation needing to choose the tag all need to query tag
first)
( 1 ) Every 50ms issued a command checks. Select
, ,
if Session select AUTO, only effective by query EPC.
(2)
can see
4.2 Query Tag TID
(1)Select
(2)Input query tag TID conditions
(3)
can see
4.3 Read Data, Write Data, Block Erase
(1) Read data operation
DL6960 Demo Software User’s Guide v1.4
10
<1> Choose tag
<2> Choose memory
<3> Write
Start address: 0x00 stand in start to read data from first word in the designated
storage area, 0x01 stand in start to read data from second word in the designated
storage area, and so on.
Read the length: Number of the word to be read. It read 120 words at most. Can not set 0
or 120, otherwise, return the parameter error information.
Access password: From left to right it is the former high-word, low word in the
access password. If operation don’t need access password, it can be the arbitrary value,
but can't lack.
<4> Click can see
(2) Write data operation
<1> Choose tag
<2> Choose memory
<3> Write (EPC memory Address of tag
is 2)
Start address: 0x00, the first word of data (from left) is written in address 0x00 of the
designated storage area, and so on.
<4> Click can see
DL6960 Demo Software User’s Guide v1.4
11
Note: write data can be used to change the EPC number
(the method is as follows)
<1> Choose tag
<2> Choose memory ,and
select
<3> Write (EPC memory Address of
tag is 2)
<4> Click can see
Then query tag EPC,can see
(3) Block Erase Operation (write 0 to the designated data )
<1> Choose tag
<2> Choose memory
<3> Write
Start address: 0x00 stand in start to erase data from first word in the designated
storage area, 0x01 stand in start to erase data from second word in the designated
storage area, and so on.
The difference from write operation: Needn't fill in the data.
<4> Click can see
(4) Write block operation
<1> Choose tag
DL6960 Demo Software User’s Guide v1.4
12
<2> Choose memory
<3> Write (EPC memory Address of tag
is 2)
Start address: 0x00, the first word of data (from left) is written in address 0x00 of the
designated storage area, and so on.
<4> Click can see
4.4Revise the password
(1) Choose tag
(2) Choose memory
(3) Write access password
Access password: From left to right it is the former high-word, low word in the
access password. If operation don’t need access password, it can be the arbitrary value,
but can't lack.
(4) Revise the access password 12345678: Write
Click
(5) Revise the kill password 12345678: Write
Click
DL6960 Demo Software User’s Guide v1.4
13
(6) If succeed, we can see
4.5 Write EPC (Needn’t query tag)
(1) Write access password (If EPC area of the tag has not set password protection, we can write
8 data arbitrarily)
(2) Write EPC.
(3) Click . (Random write one tag in the effective range of antenna)
When there are many or EPC pieces of tag in the effective range of antenna, and the access
password of one tag is the same as you entered, or EPC area of tag set no password protection,
click at a time, random write EPC number of one tag in the effective range of
antenna.
4.6 Set the state of read and write protection
(1) Choose tag
(2) Choose memory
(3) Choose protection type
(4) Write access password:
Any storage area in no password protection status still must write the
correct access password.(password can not be zero).
DL6960 Demo Software User’s Guide v1.4
14
4.7 Read Protection
(1) Set Single Tag Read Protection
<1> Choose tag
<2> Write tag access password
<3> Click
According to EPC number of the tag, setting read protection, make tag unable to be
read and written by any order, even if query the tag, it is unable to get EPC number of the
tag. Only NXP UCODE EPC G2X tags valid.
(2) Set Single Tag Read Protection without EPC
<1> Write tag access password
<2> Click can set tag read protection in the
effective range of antenna
The difference from : When there are
several tag in the effective range of antenna, reader don’t know the tag which the order
operate.
If operate several tags, then the access password of the tag had better be the same.
Only NXP UCODE EPC G2X tags valid.
(3) Reset Single Tag Read Protection without EPC
<1> Write access password
<2> Click
Use for reset the tag read protection.
Only put a tag in the effective range of antenna. Only NXP UCODE EPC G2X
tags valid.
Comments: If tag does not support the read protection setting, it must be
DL6960 Demo Software User’s Guide v1.4
15
unprotected.
(4) Detect Single Tag Read Protection without EPC
<1> Click
Can't detect tag whether it support read protection order, can only detect single tag
whether it is protected. If tag does not support the read protection setting, it must be
unprotected.
Make sure that there is single tag in the effective range of antenna. Only NXP
UCODE EPC G2X tags valid.
4.8 EAS Alarm
(1) Alarm setting
<1> Choose tag
<2> Write access password
<3> Choose alarm
Set or reset the EAS status bit of tag. Only NXP UCODE EPC G2X tags valid.
(2) Check alarm without EPC and access password
<1> Click check alarm
Check the EAS alarm of tag. Only NXP UCODE EPC G2X tags valid.
<2> EAS alarm:
No EAS alarm:
DL6960 Demo Software User’s Guide v1.4
16
4.9 Kill Tag(Permanently Kill)
(1) Choose tag
(2) Write
Kill password can not be the whole 0. Otherwise, the tag can not be killed, and the tag
return response with parameter error.
4.10 Mask conditions
(1)check enable
Only check enable can do mask operation。
For example, EPC mask:
Choose EPC area:
Only the first byte of tag’s EPC is DA could response.
For example, TID mask:
<1>Query TID
Can see TID
<Mask condition>
DL6960 Demo Software User’s Guide v1.4
17
For example change EPC :
<2> select
and
<3> Write (EPC memory Address of tag
Is 2)
<4> Click can see
Then query tag EPC,can see
5. Mix-Test Operation
(1) Select antenna, Q value and session for example:
.it means read tag epc and tid, tid is form
2 ,read 4 words.
(2)Click ,if there are tag, can see:
DL6960 Demo Software User’s Guide v1.4
18
6. Buffer Operation
(1) Select EPC/TID query. For example: EPC
This demo is used Q=4,S=auto, if there are some tag
(2) is used to read tag in the buffer, if there are tag
(3) is used to clear tag information in the buffer.
(4) is used to read out tag and clear tag in the buffer.
(5) is used to get tag number in the buffer.
7. 18000-6B Test Interface Operation
7.1 Query Tag
DL6960 Demo Software User’s Guide v1.4
19
(1) send a inventory command every
50ms.
(2)
Only query the single tag. If many tags are in the effective range of antenna at the same
time, it may be unable to query the tag.
(3)
<1> Unequal Condition:
Note:
The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233)
Figure, query condition begin to compare from the tag data address 0. The comparative
content is 22.
Click
See
Figure, from the tag number we can see the addresses 0 of tag data: 00, 00, 11, 11.
Unequal condition 22, therefore, the four tags are read.
<2> Equal Condition:
DL6960 Demo Software User’s Guide v1.4
20
Note:
The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233)
Figure, query condition begin to compare from the tag data address 0. The comparative
content is 00.
Click
See
Figure, from the tag number we can see the addresses 0 of tag data: 00, 00.
Equal condition 00, therefore, the two tags are read.
<3> Greater than
Note:
The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233)
Figure, query condition begin to compare from the tag data address 0. The comparative
content is 00.
Click
See
DL6960 Demo Software User’s Guide v1.4
21
Figure, from the tag number we can see the addresses 0 of tag data: 11, 11.
Great than 00, therefore, the two tags are read.
7.2 Read and Write Data Block / Permanently Write Protect Block of Byte
(1)
(2) Read data:
Start address: 0x00 stand in start to read data from first word in the designated
storage area, 0x01 stand in start to read data from second word in the designated
storage area, and so on. Range is 8~223. Beyond this range, reader will return
parameter error.
Read length: pointed to the number of bytes to read. Range is 1~32. If Start
address + Read length greater than 224, or Read length greater than 32 or is zero,
reader will return parameter error information. The high bytes of Read length
write in the low address in tag.
(3) Write data:
Write data: Range is 1~32. If Start address + Write length greater than 224, or
Write length greater than 32 or is zero, reader will return parameter error
information. The high bytes of Read length write in the low address in tag.
(4) Permanently Write Protect: lock the designated byte.
DL6960 Demo Software User’s Guide v1.4
22
(5) Check Protect: check whether the designated byte is locked.
(6) If succeed, we can see:
8. Frequency Analysis Operation
Click ,can see
The larger of the percentage ,the better of the results.
9. Config TCPIP
9.1Web config
1.Select ,click Search.
If device connected.
Select the device
DL6960 Demo Software User’s Guide v1.4
23
2.Select ,default user name and password are admin.
Login.
(1)Select ,default:
Finished click
(2)Select ,set TCP.
DL6960 Demo Software User’s Guide v1.4
24
Finished click .
(3)Select set device IP.
Finished click .
(4)The end select .Click ,Restart your device.
9.2Serial port config
1.Serial config IP need to set AT mode , ,click ,if
successed you can see 。
2.
/’
”Get” button can read current property.
DL6960 Demo Software User’s Guide v1.4
25
“Set” button,can set property which you need。
3
”Get” button can read current config.
“Set” button,can set property which you need.
4
”Get” button can read current config
DL6960 Demo Software User’s Guide v1.4
26
“Set” button,can set property which you need.
5. set to default property.
6. ,if you config successed,you need to save and restart module,that you can
enable new config
7. Last you need to exit AT mode,click button .

Weitere ähnliche Inhalte

Ähnlich wie Dl6960 Demo Software User's Guide v1.4

Setting up port forwarding on a router
Setting up port forwarding on a routerSetting up port forwarding on a router
Setting up port forwarding on a routerKim Harvey
 
Maharastra EXTC NetSim Experiment Manual
Maharastra EXTC  NetSim Experiment  ManualMaharastra EXTC  NetSim Experiment  Manual
Maharastra EXTC NetSim Experiment ManualDr Praveen Jain
 
NetSim Technology Library- Military radio-tdma-and-dtdma
NetSim Technology Library- Military radio-tdma-and-dtdmaNetSim Technology Library- Military radio-tdma-and-dtdma
NetSim Technology Library- Military radio-tdma-and-dtdmaVishal Sharma
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)Dinis Cruz
 
Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...
Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...
Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...Aymen Lachkhem
 
06 chapter03 04_control_logix_tags_memory_structure_fa16
06 chapter03 04_control_logix_tags_memory_structure_fa1606 chapter03 04_control_logix_tags_memory_structure_fa16
06 chapter03 04_control_logix_tags_memory_structure_fa16John Todora
 
Temperature Screening Kiosk Droid820covid19 User Manual
Temperature Screening Kiosk Droid820covid19 User ManualTemperature Screening Kiosk Droid820covid19 User Manual
Temperature Screening Kiosk Droid820covid19 User ManualAOK Displays
 
VVDI2 Commander Transponder Key programmer user manual-vobdii.com
VVDI2 Commander Transponder Key programmer user manual-vobdii.comVVDI2 Commander Transponder Key programmer user manual-vobdii.com
VVDI2 Commander Transponder Key programmer user manual-vobdii.comSerena Kong
 
Skp1000 tablet key-programmer user manual - vobdii.com
Skp1000 tablet key-programmer user manual - vobdii.comSkp1000 tablet key-programmer user manual - vobdii.com
Skp1000 tablet key-programmer user manual - vobdii.comSerena Kong
 
Ec 1303 microprocessor_its_applications
Ec 1303 microprocessor_its_applicationsEc 1303 microprocessor_its_applications
Ec 1303 microprocessor_its_applicationsMerin Jesuraj
 
EMERSON EDUARDO RODRIGUES Zxpos cnt1 release notes(eng)
EMERSON EDUARDO RODRIGUES Zxpos cnt1 release notes(eng)EMERSON EDUARDO RODRIGUES Zxpos cnt1 release notes(eng)
EMERSON EDUARDO RODRIGUES Zxpos cnt1 release notes(eng)EMERSON EDUARDO RODRIGUES
 
Router and switch basics configuration
Router and switch basics configurationRouter and switch basics configuration
Router and switch basics configurationMissangae
 
Rdl modbus protocol testing tool
Rdl modbus protocol testing toolRdl modbus protocol testing tool
Rdl modbus protocol testing toolResearch Design Lab
 

Ähnlich wie Dl6960 Demo Software User's Guide v1.4 (20)

Setting up port forwarding on a router
Setting up port forwarding on a routerSetting up port forwarding on a router
Setting up port forwarding on a router
 
Maharastra EXTC NetSim Experiment Manual
Maharastra EXTC  NetSim Experiment  ManualMaharastra EXTC  NetSim Experiment  Manual
Maharastra EXTC NetSim Experiment Manual
 
NetSim Technology Library- Military radio-tdma-and-dtdma
NetSim Technology Library- Military radio-tdma-and-dtdmaNetSim Technology Library- Military radio-tdma-and-dtdma
NetSim Technology Library- Military radio-tdma-and-dtdma
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...
Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...
Letselectronic.blogspot.com robotic arm based on atmega mcu controlled by win...
 
06 chapter03 04_control_logix_tags_memory_structure_fa16
06 chapter03 04_control_logix_tags_memory_structure_fa1606 chapter03 04_control_logix_tags_memory_structure_fa16
06 chapter03 04_control_logix_tags_memory_structure_fa16
 
Oc130 v4hp3000ug
Oc130 v4hp3000ugOc130 v4hp3000ug
Oc130 v4hp3000ug
 
Temperature Screening Kiosk Droid820covid19 User Manual
Temperature Screening Kiosk Droid820covid19 User ManualTemperature Screening Kiosk Droid820covid19 User Manual
Temperature Screening Kiosk Droid820covid19 User Manual
 
Chapter 4.pptx
Chapter 4.pptxChapter 4.pptx
Chapter 4.pptx
 
VVDI2 Commander Transponder Key programmer user manual-vobdii.com
VVDI2 Commander Transponder Key programmer user manual-vobdii.comVVDI2 Commander Transponder Key programmer user manual-vobdii.com
VVDI2 Commander Transponder Key programmer user manual-vobdii.com
 
Dsplab v1
Dsplab v1Dsplab v1
Dsplab v1
 
Skp1000 tablet key-programmer user manual - vobdii.com
Skp1000 tablet key-programmer user manual - vobdii.comSkp1000 tablet key-programmer user manual - vobdii.com
Skp1000 tablet key-programmer user manual - vobdii.com
 
Ec 1303 microprocessor_its_applications
Ec 1303 microprocessor_its_applicationsEc 1303 microprocessor_its_applications
Ec 1303 microprocessor_its_applications
 
8086 Microprocessor
8086 Microprocessor8086 Microprocessor
8086 Microprocessor
 
EMERSON EDUARDO RODRIGUES Zxpos cnt1 release notes(eng)
EMERSON EDUARDO RODRIGUES Zxpos cnt1 release notes(eng)EMERSON EDUARDO RODRIGUES Zxpos cnt1 release notes(eng)
EMERSON EDUARDO RODRIGUES Zxpos cnt1 release notes(eng)
 
Lab Manual.pdf
Lab Manual.pdfLab Manual.pdf
Lab Manual.pdf
 
Router and switch basics configuration
Router and switch basics configurationRouter and switch basics configuration
Router and switch basics configuration
 
Rdl modbus protocol testing tool
Rdl modbus protocol testing toolRdl modbus protocol testing tool
Rdl modbus protocol testing tool
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
TekTape Manual
TekTape ManualTekTape Manual
TekTape Manual
 

Mehr von Dony Riyanto

KNIME For Enterprise Data Analytics.pdf
KNIME For Enterprise Data Analytics.pdfKNIME For Enterprise Data Analytics.pdf
KNIME For Enterprise Data Analytics.pdfDony Riyanto
 
Implementasi Teknologi Industri 4.0 pada TNI AD
Implementasi Teknologi Industri 4.0 pada TNI ADImplementasi Teknologi Industri 4.0 pada TNI AD
Implementasi Teknologi Industri 4.0 pada TNI ADDony Riyanto
 
Blockchain untuk Big Data
Blockchain untuk Big DataBlockchain untuk Big Data
Blockchain untuk Big DataDony Riyanto
 
Mengenal ROS2 Galactic
Mengenal ROS2 GalacticMengenal ROS2 Galactic
Mengenal ROS2 GalacticDony Riyanto
 
Membuat Desain Roket Amatir dan Menjalankan Simulasi
Membuat Desain Roket Amatir dan Menjalankan SimulasiMembuat Desain Roket Amatir dan Menjalankan Simulasi
Membuat Desain Roket Amatir dan Menjalankan SimulasiDony Riyanto
 
Creating UDP Broadcast App Using Python Socket on WIndows & Linux
Creating UDP Broadcast App Using Python Socket on WIndows & LinuxCreating UDP Broadcast App Using Python Socket on WIndows & Linux
Creating UDP Broadcast App Using Python Socket on WIndows & LinuxDony Riyanto
 
Desain ground control & Sistem Pendukung untuk Male UAV/UCAV
Desain ground control & Sistem Pendukung untuk Male UAV/UCAVDesain ground control & Sistem Pendukung untuk Male UAV/UCAV
Desain ground control & Sistem Pendukung untuk Male UAV/UCAVDony Riyanto
 
Application Performance, Test and Monitoring
Application Performance, Test and MonitoringApplication Performance, Test and Monitoring
Application Performance, Test and MonitoringDony Riyanto
 
Cloud Service Design for Computer Vision, Image & Video Processing+Analytics
Cloud Service Design for Computer Vision, Image & Video Processing+AnalyticsCloud Service Design for Computer Vision, Image & Video Processing+Analytics
Cloud Service Design for Computer Vision, Image & Video Processing+AnalyticsDony Riyanto
 
RealNetworks - SAFR Platform Whitepaper
RealNetworks - SAFR Platform WhitepaperRealNetworks - SAFR Platform Whitepaper
RealNetworks - SAFR Platform WhitepaperDony Riyanto
 
Review of Existing Response System & Technology.
Review of Existing Response System & Technology.Review of Existing Response System & Technology.
Review of Existing Response System & Technology.Dony Riyanto
 
Beberapa Studi Kasus Fintech Micro Payment
Beberapa Studi Kasus Fintech Micro PaymentBeberapa Studi Kasus Fintech Micro Payment
Beberapa Studi Kasus Fintech Micro PaymentDony Riyanto
 
Rencana Pengembangan REST API dan Microservice pada MONEVRISBANG
Rencana Pengembangan REST API dan Microservice pada MONEVRISBANGRencana Pengembangan REST API dan Microservice pada MONEVRISBANG
Rencana Pengembangan REST API dan Microservice pada MONEVRISBANGDony Riyanto
 
Implementasi Full Textsearch pada Database
Implementasi Full Textsearch pada DatabaseImplementasi Full Textsearch pada Database
Implementasi Full Textsearch pada DatabaseDony Riyanto
 
Beberapa strategi implementasi open api untuk legacy system existing app
Beberapa strategi implementasi open api untuk legacy system existing appBeberapa strategi implementasi open api untuk legacy system existing app
Beberapa strategi implementasi open api untuk legacy system existing appDony Riyanto
 
Pengenalan Big Data untuk Pemula
Pengenalan Big Data untuk PemulaPengenalan Big Data untuk Pemula
Pengenalan Big Data untuk PemulaDony Riyanto
 
Introduction to BACnet: Building Automation & Control Network
Introduction to BACnet: Building Automation & Control NetworkIntroduction to BACnet: Building Automation & Control Network
Introduction to BACnet: Building Automation & Control NetworkDony Riyanto
 
Enterprise Microservices
Enterprise MicroservicesEnterprise Microservices
Enterprise MicroservicesDony Riyanto
 
Edge Exploration of QR Code Technology Implementation
Edge Exploration of QR Code Technology ImplementationEdge Exploration of QR Code Technology Implementation
Edge Exploration of QR Code Technology ImplementationDony Riyanto
 
GUGUS-a mini program prototype
GUGUS-a mini program prototypeGUGUS-a mini program prototype
GUGUS-a mini program prototypeDony Riyanto
 

Mehr von Dony Riyanto (20)

KNIME For Enterprise Data Analytics.pdf
KNIME For Enterprise Data Analytics.pdfKNIME For Enterprise Data Analytics.pdf
KNIME For Enterprise Data Analytics.pdf
 
Implementasi Teknologi Industri 4.0 pada TNI AD
Implementasi Teknologi Industri 4.0 pada TNI ADImplementasi Teknologi Industri 4.0 pada TNI AD
Implementasi Teknologi Industri 4.0 pada TNI AD
 
Blockchain untuk Big Data
Blockchain untuk Big DataBlockchain untuk Big Data
Blockchain untuk Big Data
 
Mengenal ROS2 Galactic
Mengenal ROS2 GalacticMengenal ROS2 Galactic
Mengenal ROS2 Galactic
 
Membuat Desain Roket Amatir dan Menjalankan Simulasi
Membuat Desain Roket Amatir dan Menjalankan SimulasiMembuat Desain Roket Amatir dan Menjalankan Simulasi
Membuat Desain Roket Amatir dan Menjalankan Simulasi
 
Creating UDP Broadcast App Using Python Socket on WIndows & Linux
Creating UDP Broadcast App Using Python Socket on WIndows & LinuxCreating UDP Broadcast App Using Python Socket on WIndows & Linux
Creating UDP Broadcast App Using Python Socket on WIndows & Linux
 
Desain ground control & Sistem Pendukung untuk Male UAV/UCAV
Desain ground control & Sistem Pendukung untuk Male UAV/UCAVDesain ground control & Sistem Pendukung untuk Male UAV/UCAV
Desain ground control & Sistem Pendukung untuk Male UAV/UCAV
 
Application Performance, Test and Monitoring
Application Performance, Test and MonitoringApplication Performance, Test and Monitoring
Application Performance, Test and Monitoring
 
Cloud Service Design for Computer Vision, Image & Video Processing+Analytics
Cloud Service Design for Computer Vision, Image & Video Processing+AnalyticsCloud Service Design for Computer Vision, Image & Video Processing+Analytics
Cloud Service Design for Computer Vision, Image & Video Processing+Analytics
 
RealNetworks - SAFR Platform Whitepaper
RealNetworks - SAFR Platform WhitepaperRealNetworks - SAFR Platform Whitepaper
RealNetworks - SAFR Platform Whitepaper
 
Review of Existing Response System & Technology.
Review of Existing Response System & Technology.Review of Existing Response System & Technology.
Review of Existing Response System & Technology.
 
Beberapa Studi Kasus Fintech Micro Payment
Beberapa Studi Kasus Fintech Micro PaymentBeberapa Studi Kasus Fintech Micro Payment
Beberapa Studi Kasus Fintech Micro Payment
 
Rencana Pengembangan REST API dan Microservice pada MONEVRISBANG
Rencana Pengembangan REST API dan Microservice pada MONEVRISBANGRencana Pengembangan REST API dan Microservice pada MONEVRISBANG
Rencana Pengembangan REST API dan Microservice pada MONEVRISBANG
 
Implementasi Full Textsearch pada Database
Implementasi Full Textsearch pada DatabaseImplementasi Full Textsearch pada Database
Implementasi Full Textsearch pada Database
 
Beberapa strategi implementasi open api untuk legacy system existing app
Beberapa strategi implementasi open api untuk legacy system existing appBeberapa strategi implementasi open api untuk legacy system existing app
Beberapa strategi implementasi open api untuk legacy system existing app
 
Pengenalan Big Data untuk Pemula
Pengenalan Big Data untuk PemulaPengenalan Big Data untuk Pemula
Pengenalan Big Data untuk Pemula
 
Introduction to BACnet: Building Automation & Control Network
Introduction to BACnet: Building Automation & Control NetworkIntroduction to BACnet: Building Automation & Control Network
Introduction to BACnet: Building Automation & Control Network
 
Enterprise Microservices
Enterprise MicroservicesEnterprise Microservices
Enterprise Microservices
 
Edge Exploration of QR Code Technology Implementation
Edge Exploration of QR Code Technology ImplementationEdge Exploration of QR Code Technology Implementation
Edge Exploration of QR Code Technology Implementation
 
GUGUS-a mini program prototype
GUGUS-a mini program prototypeGUGUS-a mini program prototype
GUGUS-a mini program prototype
 

Kürzlich hochgeladen

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 

Kürzlich hochgeladen (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 

Dl6960 Demo Software User's Guide v1.4

  • 1. 1 DL6960 Demo Software User's Guidev1.4 1. Parameter interface operation............................................................. 1 1.1 Open Port.............................................................................................................................1 1.2 Parameter Setting:.............................................................................................................. 2 2. Set work mode parameter.................................................................... 4 2.1 Auto-running mode Setting:.............................................................................................. 4 2.2 Real-time-inventory Setting:..............................................................................................7 3. The Necessary Knowledge.................................................................... 8 3.1 EPCC1G2 tag memory.......................................................................................................8 3.2 18000-6B tag........................................................................................................................ 8 3.3 Data display (tag ID, passwords, memory data is display in 16 hexadecimal).............8 4. EPCC1-G2 Test operation.................................................................... 9 4.1 Query Tag EPC(The operation needing to choose the tag all need to query tag first)9 4.2 Query Tag TID.................................................................................................................... 9 4.3 Read Data, Write Data, Block Erase.................................................................................9 4.4Revise the password...........................................................................................................12 4.5 Write EPC (Needn’t query tag).......................................................................................13 4.6 Set the state of read and write protection.......................................................................13 4.7 Read Protection.................................................................................................................14 4.8 EAS Alarm.........................................................................................................................15 4.9 Kill Tag(Permanently Kill)......................................................................................... 16 4.10 Mask conditions.............................................................................................................. 16 5. Mix-Test Operation............................................................................. 17 6. Buffer Operation..................................................................................18 7. 18000-6B Test Interface Operation....................................................18 7.1 Query Tag...........................................................................................................................18 7.2 Read and Write Data Block / Permanently Write Protect Block of Byte................... 21 8. Frequency Analysis Operation...........................................................22 9. Config TCPIP.......................................................................................22 9.1Web config.......................................................................................................................... 22 9.2Serial port config................................................................................................................24
  • 2. DL6960 Demo Software User’s Guide v1.4 1 1. Parameter interface operation 1.1 Open Port Before open com port, please make controller properly connected with the host using the communication cable provided and then turn on the power. (1)Auto Open Comport: Value 255(0xFF) is broadcasting address. All controllers will respond the order with a broadcasting address. Other value (0x00~0xFE) is controller address. Only will the controller conforming to the address respond the operation. Click ,If reader connect the computer's COM1 ~ COM9, we can see the port display in the place. the demonstration software to by connecting the port and written communication, the connection to the port to have a beginning, such as : else (2)Open Designated Comport: Click ,the Baud will Auto Select From 115200bps, 57600bps, 38400bps,19200bps,9600bps,if success else (3) Open USB port: If the reader is set to usb communication, then we select “USB” ,and click
  • 3. DL6960 Demo Software User’s Guide v1.4 2 . (4)Open TCP/IP Select ,and input reader ip and port: ,click . 1.2 Parameter Setting: (1) the new reader address to set. This address can't be 0xFF. If set 0xFF, reader will return error information. (2) set and save power configuration. ( 3 ) select the reader’s band, different band, the frequency is different. (4) Set reader working Min Frequency and Max Frequency. In different places, the radio requires the rule to be different. Users can follow the local situation and choose to read more sensitive frequency range of the card. In single frequency point operation, only need to set two frequencies to the same value. In frequency hopping operation, only need to set two frequencies to the different value. (5) demo software start run, default use the baud rate 57600 to open COM port, reader power on, reader baud rate default is 57600. After change the baud rate, reader use the new baud rate until power off. Close port and open port, the baud rate no change. The demo software will use the new baud rate, until close the demo software. (6) set the inventory scan max response time of reader. If demo software sends the inventory order, it will wait 30*10ms for reader
  • 4. DL6960 Demo Software User’s Guide v1.4 3 response and exits. (7)GPIO Operation Select need pins , click , Can control the output state pins , Click ,can get output state pins. ( 8 ) , Select antenna 4 , click ,At this time, antenna 4 in working status, can also select multiple antenna working together. (9) ,this function is used to set weather detect antenna before query tag. (10) ,select release time ,click can set release time. (11) ,select output port,click , Can install require notification output port. (12) ,Choose buzzer switch state, click Settings button to complete the operation, buzzer open, when reading or writing to label operation is successful have prompt.
  • 5. DL6960 Demo Software User’s Guide v1.4 4 ( 13 ) , select click ,can get real Clock time , if clock time is error, can select ,input right time ,click ,Can complete on time of adjustment. (14) Set or get saved EPC/TID length in buffer. (15) ,click ’Get’ button can get module version. (16) click ‘Get’ button can get reader’s serial number. (17) this function is used to change reader to flash module mode, when changed, reset power can recover it. 2. Set work mode parameter 2.1 Auto-running mode Setting: (1) ,select relay action,accuracy ,click
  • 6. DL6960 Demo Software User’s Guide v1.4 5 ,if successed ,can see . (2 ) , choose mask area,for example choose EPC , mask start bit address: , mask bit length , mask data ,if successed,can see (3) , choose query tag type or , only choose , you can choose query action, or or ,if successed,can see . ( 4 ) , choose pulse time , click ,if successed,can see . (5) ,only choose ,reponse pause time effective,if successed,can see .(only choose ,can get Reader storage blocks Tag information. ( 6 ) , select trigger time
  • 7. DL6960 Demo Software User’s Guide v1.4 6 ,click ,if success,can see (7) ,input start address and read word number. click ,if success,can see . (8) , (only choose answer mode ,can operate other page ) click if successed,can see . (9) ,click button,if successed,can see above six parameter。 (10)Only set command notify can do following operation ,click ,if get tag information,can see: click ,then will clear reader storge blocks tag information. (11)Only set not command notify could get data,click ,if get tag information show:
  • 8. DL6960 Demo Software User’s Guide v1.4 7 ,click will stop data getting。 2.2 Real-time-inventory Setting: (1) select read tag type on real-time- inventory mode. select read pulse time on real-time- inventory mode. Select tag filter time, if select 0 is not filter. Select Q and Session on real-time-query inventory. When Session is AUTO, only effective with EPC query. set mask conditions on real-time- inventory mode, if you want it effective, you should check . Set query TID parameter on real-time-query inventory, if you want it effective, you should check . set parameter with you select condition, get reader parameter on real-time-inventory inventory. (2) Set reader work mode, if it set to
  • 9. DL6960 Demo Software User’s Guide v1.4 8 , we can get data from port by button 3. The Necessary Knowledge 3.1 EPCC1G2 tag memory Tag memory divided into four storage areas, each storage area can be made up of one or more memory words. The four storage areas: EPC areas (EPC): Store the area of EPC number, this module stipulates it can store 15 word EPC number. Can read and can write. TID areas (TID): Store ID number established by the tag production firm. There are 4 words and 8 words two kinds of ID numbers at present. Can read and not can write. User areas (User): This area of different manufacturers is different. There is no user area in G2 tag of Inpinj Company. There are 28 words in Philips Company. Can read and can write. Password areas (Password): The first two words is kill password, the last two words is access password. Can read and can write. Can write protect in four storage areas. It means this area is never writeable or not writeable under the non-safe state; only password area can set unreadable. 3.2 18000-6B tag 6B tag has a memory space, the minimum 8 bytes (byte 0- 7) is UID of the tag, and can't be rewritten. Following byte all can be rewritten, can be locked too, but once locking, can't rewrite again, can't unblock either. 3.3 Data display (tag ID, passwords, memory data is display in 16 hexadecimal)
  • 10. DL6960 Demo Software User’s Guide v1.4 9 Display in Hex, then 11 is first byte, 22 is second byte, and 1122 is first word. Total 8 bytes, in other words, total 4 words. 4. EPCC1-G2 Test operation 4.1 Query Tag EPC(The operation needing to choose the tag all need to query tag first) ( 1 ) Every 50ms issued a command checks. Select , , if Session select AUTO, only effective by query EPC. (2) can see 4.2 Query Tag TID (1)Select (2)Input query tag TID conditions (3) can see 4.3 Read Data, Write Data, Block Erase (1) Read data operation
  • 11. DL6960 Demo Software User’s Guide v1.4 10 <1> Choose tag <2> Choose memory <3> Write Start address: 0x00 stand in start to read data from first word in the designated storage area, 0x01 stand in start to read data from second word in the designated storage area, and so on. Read the length: Number of the word to be read. It read 120 words at most. Can not set 0 or 120, otherwise, return the parameter error information. Access password: From left to right it is the former high-word, low word in the access password. If operation don’t need access password, it can be the arbitrary value, but can't lack. <4> Click can see (2) Write data operation <1> Choose tag <2> Choose memory <3> Write (EPC memory Address of tag is 2) Start address: 0x00, the first word of data (from left) is written in address 0x00 of the designated storage area, and so on. <4> Click can see
  • 12. DL6960 Demo Software User’s Guide v1.4 11 Note: write data can be used to change the EPC number (the method is as follows) <1> Choose tag <2> Choose memory ,and select <3> Write (EPC memory Address of tag is 2) <4> Click can see Then query tag EPC,can see (3) Block Erase Operation (write 0 to the designated data ) <1> Choose tag <2> Choose memory <3> Write Start address: 0x00 stand in start to erase data from first word in the designated storage area, 0x01 stand in start to erase data from second word in the designated storage area, and so on. The difference from write operation: Needn't fill in the data. <4> Click can see (4) Write block operation <1> Choose tag
  • 13. DL6960 Demo Software User’s Guide v1.4 12 <2> Choose memory <3> Write (EPC memory Address of tag is 2) Start address: 0x00, the first word of data (from left) is written in address 0x00 of the designated storage area, and so on. <4> Click can see 4.4Revise the password (1) Choose tag (2) Choose memory (3) Write access password Access password: From left to right it is the former high-word, low word in the access password. If operation don’t need access password, it can be the arbitrary value, but can't lack. (4) Revise the access password 12345678: Write Click (5) Revise the kill password 12345678: Write Click
  • 14. DL6960 Demo Software User’s Guide v1.4 13 (6) If succeed, we can see 4.5 Write EPC (Needn’t query tag) (1) Write access password (If EPC area of the tag has not set password protection, we can write 8 data arbitrarily) (2) Write EPC. (3) Click . (Random write one tag in the effective range of antenna) When there are many or EPC pieces of tag in the effective range of antenna, and the access password of one tag is the same as you entered, or EPC area of tag set no password protection, click at a time, random write EPC number of one tag in the effective range of antenna. 4.6 Set the state of read and write protection (1) Choose tag (2) Choose memory (3) Choose protection type (4) Write access password: Any storage area in no password protection status still must write the correct access password.(password can not be zero).
  • 15. DL6960 Demo Software User’s Guide v1.4 14 4.7 Read Protection (1) Set Single Tag Read Protection <1> Choose tag <2> Write tag access password <3> Click According to EPC number of the tag, setting read protection, make tag unable to be read and written by any order, even if query the tag, it is unable to get EPC number of the tag. Only NXP UCODE EPC G2X tags valid. (2) Set Single Tag Read Protection without EPC <1> Write tag access password <2> Click can set tag read protection in the effective range of antenna The difference from : When there are several tag in the effective range of antenna, reader don’t know the tag which the order operate. If operate several tags, then the access password of the tag had better be the same. Only NXP UCODE EPC G2X tags valid. (3) Reset Single Tag Read Protection without EPC <1> Write access password <2> Click Use for reset the tag read protection. Only put a tag in the effective range of antenna. Only NXP UCODE EPC G2X tags valid. Comments: If tag does not support the read protection setting, it must be
  • 16. DL6960 Demo Software User’s Guide v1.4 15 unprotected. (4) Detect Single Tag Read Protection without EPC <1> Click Can't detect tag whether it support read protection order, can only detect single tag whether it is protected. If tag does not support the read protection setting, it must be unprotected. Make sure that there is single tag in the effective range of antenna. Only NXP UCODE EPC G2X tags valid. 4.8 EAS Alarm (1) Alarm setting <1> Choose tag <2> Write access password <3> Choose alarm Set or reset the EAS status bit of tag. Only NXP UCODE EPC G2X tags valid. (2) Check alarm without EPC and access password <1> Click check alarm Check the EAS alarm of tag. Only NXP UCODE EPC G2X tags valid. <2> EAS alarm: No EAS alarm:
  • 17. DL6960 Demo Software User’s Guide v1.4 16 4.9 Kill Tag(Permanently Kill) (1) Choose tag (2) Write Kill password can not be the whole 0. Otherwise, the tag can not be killed, and the tag return response with parameter error. 4.10 Mask conditions (1)check enable Only check enable can do mask operation。 For example, EPC mask: Choose EPC area: Only the first byte of tag’s EPC is DA could response. For example, TID mask: <1>Query TID Can see TID <Mask condition>
  • 18. DL6960 Demo Software User’s Guide v1.4 17 For example change EPC : <2> select and <3> Write (EPC memory Address of tag Is 2) <4> Click can see Then query tag EPC,can see 5. Mix-Test Operation (1) Select antenna, Q value and session for example: .it means read tag epc and tid, tid is form 2 ,read 4 words. (2)Click ,if there are tag, can see:
  • 19. DL6960 Demo Software User’s Guide v1.4 18 6. Buffer Operation (1) Select EPC/TID query. For example: EPC This demo is used Q=4,S=auto, if there are some tag (2) is used to read tag in the buffer, if there are tag (3) is used to clear tag information in the buffer. (4) is used to read out tag and clear tag in the buffer. (5) is used to get tag number in the buffer. 7. 18000-6B Test Interface Operation 7.1 Query Tag
  • 20. DL6960 Demo Software User’s Guide v1.4 19 (1) send a inventory command every 50ms. (2) Only query the single tag. If many tags are in the effective range of antenna at the same time, it may be unable to query the tag. (3) <1> Unequal Condition: Note: The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233) Figure, query condition begin to compare from the tag data address 0. The comparative content is 22. Click See Figure, from the tag number we can see the addresses 0 of tag data: 00, 00, 11, 11. Unequal condition 22, therefore, the four tags are read. <2> Equal Condition:
  • 21. DL6960 Demo Software User’s Guide v1.4 20 Note: The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233) Figure, query condition begin to compare from the tag data address 0. The comparative content is 00. Click See Figure, from the tag number we can see the addresses 0 of tag data: 00, 00. Equal condition 00, therefore, the two tags are read. <3> Greater than Note: The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233) Figure, query condition begin to compare from the tag data address 0. The comparative content is 00. Click See
  • 22. DL6960 Demo Software User’s Guide v1.4 21 Figure, from the tag number we can see the addresses 0 of tag data: 11, 11. Great than 00, therefore, the two tags are read. 7.2 Read and Write Data Block / Permanently Write Protect Block of Byte (1) (2) Read data: Start address: 0x00 stand in start to read data from first word in the designated storage area, 0x01 stand in start to read data from second word in the designated storage area, and so on. Range is 8~223. Beyond this range, reader will return parameter error. Read length: pointed to the number of bytes to read. Range is 1~32. If Start address + Read length greater than 224, or Read length greater than 32 or is zero, reader will return parameter error information. The high bytes of Read length write in the low address in tag. (3) Write data: Write data: Range is 1~32. If Start address + Write length greater than 224, or Write length greater than 32 or is zero, reader will return parameter error information. The high bytes of Read length write in the low address in tag. (4) Permanently Write Protect: lock the designated byte.
  • 23. DL6960 Demo Software User’s Guide v1.4 22 (5) Check Protect: check whether the designated byte is locked. (6) If succeed, we can see: 8. Frequency Analysis Operation Click ,can see The larger of the percentage ,the better of the results. 9. Config TCPIP 9.1Web config 1.Select ,click Search. If device connected. Select the device
  • 24. DL6960 Demo Software User’s Guide v1.4 23 2.Select ,default user name and password are admin. Login. (1)Select ,default: Finished click (2)Select ,set TCP.
  • 25. DL6960 Demo Software User’s Guide v1.4 24 Finished click . (3)Select set device IP. Finished click . (4)The end select .Click ,Restart your device. 9.2Serial port config 1.Serial config IP need to set AT mode , ,click ,if successed you can see 。 2. /’ ”Get” button can read current property.
  • 26. DL6960 Demo Software User’s Guide v1.4 25 “Set” button,can set property which you need。 3 ”Get” button can read current config. “Set” button,can set property which you need. 4 ”Get” button can read current config
  • 27. DL6960 Demo Software User’s Guide v1.4 26 “Set” button,can set property which you need. 5. set to default property. 6. ,if you config successed,you need to save and restart module,that you can enable new config 7. Last you need to exit AT mode,click button .