8525 30 G2 User Manual
8525 30 G2 User Manual
8525 30 G2 User Manual
Vehicle-Mount Computer
User Manual
December 4, 2007 Part No. 8100083.C
This document and the information it contains is the property of Psion Teklogix Inc.,
is issued in strict confidence, and is not to be reproduced or copied, in whole or in
part, except for the sole purpose of promoting the sale of Teklogix manufactured
goods and services. Furthermore, this document is not to be used as a basis for
design, manufacture, or sub-contract, or in any manner detrimental to the interests
of Psion Teklogix Inc.
The Bluetooth® word mark and logos are registered trademarks owned by
Bluetooth SIG, Inc. and any use of such trademarks by Psion Teklogix Inc. is
under license.
Support Services
Psion Teklogix provides a complete range of product support services to its custom-
ers. For detailed information, please refer to Appendix A: “Support Services And
Worldwide Offices”. This section also provides information about accessing support
services through the Psion Teklogix web site.
Note: Not all accessories or peripherals will have a RoHS logo due to physical
space limitations or as a result of their exempt status.
Disclaimer
Every effort has been made to make this material complete, accurate, and up-to-
date. In addition, changes are periodically added to the information herein; these
changes will be incorporated into new editions of the publication.
Psion Teklogix Inc. reserves the right to make improvements and/or changes in the
product(s) and/or the program(s) described in this document without notice, and
shall not be responsible for any damages, including but not limited to consequential
damages, caused by reliance on the material presented, including but not limited to
typographical errors.
TABLE OF CONTENTS
Chapter 5: Configuration
5.1 Remote Desktop Connection . . . . . . . . . . . . . . . . . . . . . . . 79
5.2 Pocket PC Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . 79
5.3 The Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
5.4 Control Panel Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
5.5 Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.5.1 Display Properties . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.5.2 Keyboard Properties . . . . . . . . . . . . . . . . . . . . . . . . 87
5.5.3 Volume And Sound Properties . . . . . . . . . . . . . . . . . . 96
5.5.4 Power Properties. . . . . . . . . . . . . . . . . . . . . . . . . . 97
5.5.5 Stylus Properties . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.5.6 Manage Triggers. . . . . . . . . . . . . . . . . . . . . . . . . 102
5.5.7 Certificate Assignment . . . . . . . . . . . . . . . . . . . . . 105
Chapter 7: Specifications
7.1 8525 G2/8530 G2 Vehicle-Mount Specifications . . . . . . . . . . . . 183
7.2 Radio Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
7.3 Bar Code Scanning. . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
7.4 External Scanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
7.5 Optional Internal Lithium-Ion Battery. . . . . . . . . . . . . . . . . . 186
IF YOU DO NOT AGREE TO THIS END USER LICENSE AGREEMENT (“EULA”), DO NOT
USE THE DEVICE OR COPY THE SOFTWARE. INSTEAD, PROMPTLY CONTACT PSION
TEKLOGIX INC. FOR INSTRUCTIONS ON RETURN OF THE UNUSED DEVICE(S) FOR A
REFUND. ANY USE OF THE SOFTWARE, INCLUDING BUT NOT LIMITED TO USE ON
THE DEVICE, WILL CONSTITUTE YOUR AGREEMENT TO THIS EULA (OR RATIFI-
CATION OF ANY PREVIOUS CONSENT).
GRANT OF SOFTWARE LICENSE. This EULA grants you the following license:
By clicking on the “Accept” or other appropriate assent button and/or installing the Software, you
agree to be and are hereby bound by the terms and conditions of this Agreement. If you do not agree
with this Agreement, we do not grant you a license to the Software, and you may not install or use the
Software or any accompanying documentation.
The Software is the property of Psion Teklogix Inc. or its licensors and is protected by copyright laws
and international copyright treaties, as well as other intellectual property laws and treaties. The Soft-
ware is licensed, not sold. Psion Teklogix Inc. provides the Software and licenses its use worldwide.
You assume responsibility for the selection of the Software to achieve your intended results, and for the
use and results obtained from it.
1. GRANT OF LICENSE
We hereby grant you and you hereby accept a non-exclusive, non-transferable,
limited license to install and use the Software in object code form only, subject to
the terms and restrictions set forth in this Agreement. Except as explicitly set forth
below, (i) you are not permitted to copy, sell, lease or rent, distribute or sublicense
the Software or to use the Software in a time-sharing arrangement or in any other
unauthorized manner; (ii) no license is granted to you in the human readable code of
the Software (source code); and (iii) this Agreement does not grant you any rights to
patents, copyrights, trade secrets, trademarks, intellectual property or any other
ownership rights with respect to the Software.
2. DESCRIPTION OF REQUIREMENTS, RESTRICTIONS, RIGHTS AND
LIMITATIONS
a. Copy. The right and license granted to you shall be limited to installation and use
of the Software up to but not exceeding the number of copies you have licensed.
However, you may make a copy of the Software for backup or archival purposes.
You shall not remove any copyright notice or proprietary notices, labels or marks
in or on the Software.
b. Evaluation. As part of evaluation, you may install and use the Software only
during the specified evaluation period. Unless you register the license as
described below, the evaluation license shall expire upon the expiration of the
evaluation period.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This transmitter must not be co-located or operating in conjunction with any other
antenna or transmitter.
Some equipment in hospitals and aircraft are not shielded from radio frequency
energy. Do not use the 8525 G2/8530 G2 onboard aircraft, or in hospitals, without
first obtaining permission.
Do not use near pacemakers. The product may affect the operation of some
medically implanted devices such as pacemakers, causing them to malfunction.
Avoid placing your product next to such devices. Keep a minimum distance of 20
cm between the device and the product to reduce the risk of interference. If you have
any reason to suspect that interference is taking place, turn off the 8525 G2/8530 G2
and contact your cardiologist for assistance.
Note: In August 1996 the Federal Communications Commission (FCC) of the
US adopted an updated safety standard for human exposure to radio fre-
quency energy emitted by FCC regulated transmitters. The design of this
product complies with the FCC guidelines and those standards. To main-
tain compliance with the FCC RF exposure guidelines, ensure the
antenna is at least 20 cm from your body when transmitting.
Warnings To Users
RF EXPOSURE
Warning: To satisfy FCC RF exposure requirements for vehicle mount trans-
mitting devices, a separation distance of 20 centimetres should be
maintained between the antenna of this device and persons during
device operation. To ensure compliance, operations at closer than
this distance is not recommended.
CAUTION
Use of the Vehicle Mount Computer while charging the fork truck battery is
prohibited.
CAUTION
Use of additional wiring and attachments not recommended or sold by the
manufacturer may result in fire, electric shock or personal injury.
CAUTION
If using an AC adaptor, use only the AC adaptor recommended
by manufacturer.
CAUTION
Do not operate the vehicle-mount computer with a damaged cord or plug.
Replace immediately.
CAUTION
Make sure the cord is positioned so that it is not stepped on, tripped over or
otherwise subjected to damage or stress.
CAUTION
An extension cord should not be used unless absolutely necessary. Use of
an improper extension cord could result in fire or electric shock.
CAUTION
To reduce risk of electric shock, unplug the vehicle-mount computer from
the DC source before attempting any maintenance or cleaning.
Warning: Physically disconnect the 8525 G2/8530 G2 from the vehicle battery
during battery charging (into AC outlet).
- IBM JVM
- Standard protocol APIs
- Windows sockets (WinCE)
• Wireless Communication
- IEEE 802.11g, 54Mbps 2.4 GHz CF radio
Marvell-88W8300_802.11g_PC_Card (Model #RA2040)
- IEEE 802.11g, 54Mbps 2.4 GHz CF radio
Summit DC-802.11_SC_CF (Model #RA2041)
- External antenna options
- Integrated Bluetooth radio 2.4 GHz (5m range)
• Application Software
- Internet Explorer 6 for CE – HTML, XML, Jscript (Java available
with optional JVM plug-in)
- Open Tekterm V2.0
- Terminal Emulations
- ANSI, TESS
- IBM 3270, IBM 5250, HP 2392
- 802.11 security software
• User Interface
Colour Display:
8525 G2
- Transmissive industrial TFT for indoor/sunlight readability
- 1/2 VGA, 640 x 240, 8.8" diagonal
- CCFL Backlight, 220 cd/m2 backlight with brightness control
8530 G2
- Transmissive TFT industrial for indoor/sunlight readability
- SVGA, 800 x 600, 10.4" diagonal
- CCFL Backlight, 350 cd/m2 backlight with brightness control
8530 G2 Freezer Version
- Transmissive TFT industrial for indoor/sunlight readability
- VGA, 640 x 480 10.4" diagonal
- CCFL Backlight, 450 cd/m2 backlight with brightness control
Keyboards:
- 3 keyboard formats available
- ABC
- Qwerty
- Azerty
- 68-key PC like format
- Green EL backlight
- Ergonomic design
- Dedicated function keys
- Epoxy coated elastomeric keys
- 8530 G2 includes a Soft Input Panel along with an external keyboard.
The keypad layout is shared with the 8525 G2.
Touchscreen:
- Passive stylus or finger operation
- Signature capture
- Stylus holder
- Rugged 5-wire technology
• Indicators and Controls
- Internal 95 dBA beeper with volume control
- Power indicator on the radio dome
- 4 LED indicators: RX/TX, API, SCAN, PWR/CHG
• Internal Expansion Slots
- One SD I/O (Multimedia Card) slot
- One Type II Compact Flash
- One Type III PC Card slot
- Access to slots via sealed radio dome
• External Ports
- One Tether port with:
- one RS232 serial port (decoded scanner, printer)
- undecoded scanner port
- USB host port
- One port with:
- DB9 plug RS232 (optional +5V or +12V, 500MA on pin 9)
- One High density port with:
- one RS232 serial comm. port
- 1 USB device port
2. Choose the radio icon to open the Wireless LAN Settings window – in
the sample screen below, this is labelled PTXCF838.
highlight the network to which you want your 8525 G2/8530 G2 to con-
nect, and tap the Connect button.
This tab lists available networks – any access points that are broadcasting
an SSID, and it lists preferred networks – networks that you have config-
ured. Since access points are generally secure, they will most likely not
be listed here. By default, the 8525 G2/8530 G2 attempts to connect to pre-
ferred networks. This behaviour can be changed by enabling ‘Automati-
cally connect to non-preferred networks’ in the Advanced dialog box
(page 23).
• To add a new configuration, double-tap on the Add New item listed with
the networks. A blank Wireless Properties dialog box is displayed.
5. Wireless Properties
Encryption
WEP (Wired-Equivalent Privacy) encryption prevents others from acciden-
tally accessing your network. If you are not using encryption, you can
choose Disabled from the dropdown encryption menu. Otherwise, leave
this field as is.
Note: WEP cannot be disabled if you are using WPA or WPA-PSK authentication.
TKIP (Temporal Key Integrity Protocol) is an encryption protocol included
as part of the IEEE 802.11 standard for wireless LANs. Designed to
enhance WEP, TKIP uses the original WEP programming but ‘wraps’ addi-
tional code at the beginning and end to encapsulate and modify it, encrypt-
ing each data packet with a unique encryption key.
Authentication
802.11 supports a number of subtypes of network authentication services:
Open, Shared, WPA and WPA-PSK.
Using Open authentication, any wireless station can request authentication.
The station that needs to authenticate with another wireless station sends an
authentication management frame that contains the identity of the sending
station. The receiving station then sends back a frame that indicates whether
it recognizes the identity of the sending station.
Using Shared authentication, each wireless station is assumed to have
received a secret shared key over a secure channel that is independent from
the 802.11 wireless network communications channel.
WPA (Wi-Fi Protected Access) uses the Temporal Key Integrity Protocol
(TKIP) to provide strong data encryption, and offers two user authentica-
tion and key management methods.
The first method of user authentication is intended for environments using a
centralized Authentication Server, such as RADIUS. User authentication is
based on IEEE 802.1X and mutual authentication based EAP.
In environments where a centralized Authentication Server or EAP frame-
work is not available, user authentication is based on a ‘Pre-Shared Key’
method – WPA-PSK. If you are using Pre-Shared Key authentication, you
will need to manually enter a password (Master Key) in the Access Point or
Wireless Router and enter the same password in each client device that
accesses the wireless network. The manually configured WPA password
(Master Key) automatically starts the TKIP data encryption process.
Network Key:
This text box is used to specify a 5 or 13 ASCII character sequence or an
equivalent 10 or 26 Hexadecimal digit sequence that matches the active
WEP key on the access point.
• To assign a Network key, tap in the checkbox next to ‘The key is pro-
vided automatically’ to remove the check mark next to this option.
The connection you created will be listed in the Wireless Information tab as a
preferred network. The radio will search for the SSID and will compare the WEP
and authentication information you specified. If there is a match between your 8525
G2/8530 G2 settings and the access point settings, the 8525 G2/8530 G2 will
communicate on the network through the access point.
• Make any necessary changes in the Wireless Properties dialog box, and
press [ENTER] to save the changes.
Note: You do not need to reset your 8525 G2/8530 G2 after configuring
the radio. Summit DC 802.11 SC (Model # RA2041) CF radio
Radio
Attributes
Important: To learn more about the other options available in the radio
attributes list, refer to “Config Tab” beginning on page 28.
To configure authentication:
• Tap on the EAP type dropdown menu, and choose the appropriate type of
authentication – LEAP, EAP-FAST, PEAP-MSCHAP, and PEAP-GTC.
• Next, tap on the Credentials button, and type credentials for IEEE 802.1X
EAP types.
To configure encryption:
• Tap on the Encryption dropdown menu, and choose the appropriate type of
encryption – Manual WEP, Auto WEP, WPA PSK, WPA TKIP,
WPA2 PSK, WPA2 AES, and CCKM TKIP.
If you choose Manual WEP, WPA PSK or WPA2 PSK:
• Tap on the WEP/PSK Keys button. For Manual WEP, choose up to four
static WEP keys. For PSK, type an ASCII passphrase or hex PSK.
• Configure any other settings that are supplied by the network administrator
for the SSID to which you will associate.
• Make certain that you tap on Commit following each change.
Once you’ve completed the configuration:
• Tap the Main tab. Tap on the Active Config button – your new config will
be listed in the dropdown menu.
When you tap on the config you created, the Summit DC-802.11_SC_CF (Model
#RA2041) radio module attempts to connect to the network using these steps:
- Associate to the SSID.
- Authenticate to the network.
- If EAP authentication is being used, derive dynamic encryption keys.
- If DHCP is being used by the network, obtain an IP address.
If the Summit DC-802.11_SC_CF (Model #RA2041) is not connecting:
• Tap on the Status tab.
The Status dialog box lists the IP and MAC address, and indicates the cur-
rent state of the radio, the signal strength, channel and so on.
You can also use the Status screen for DHCP renewal and ICMP Echo
Requests (Pings).
Important: For details about the Status dialog box, refer to “Status Tab” on
page 35.
Radio
Attributes
The config you create and save is listed in the Active Config dropdown menu in the
Main tab. You can define up to 20 configs.
• Config: Used to choose the config to be viewed or edited. If ThirdParty-
Config is chosen, after the 8525 G2/8530 G2 goes through a power cycle,
WZC is used for configuration of the radio.
• Rename: Allows you to assign a config name.
• Delete: Deletes the config unless it is currently active.
• New: Allows you to create a new config with default settings and assign it
a name.
• Commit: Saves all changes.
• Radio Attributes: Lists radio attributes. These attributes can be individu-
ally chosen from this menu. When an attribute is chosen, an associated
list of options is displayed where you can assign new settings or view
existing settings.
The following table describes the options in the Radio Attributes dropdown menu:
2.10.2.3 ThirdPartyConfig
If you choose to configure ThirdPartyConfig, the SCU will work with the operating
system’s Windows Zero Config (WZC) to configure radio and security settings for
the CF radio installed in the unit.
Choosing this config means that WZC must be used to define the following radio
and security options: SSID, Auth Type, EAP Type and Encryption.The SCU settings
for ThirdPartyConfig include: Client Name, Power Save, Tx Power, Bit Rate and
Radio Mode. These SCU settings along with SCU global settings and the WZC
settings will be applied to the radio module.
The Global Settings outlined in the table below can be edited in the SCU:
The Status tab provides status information including IP address and MAC address
for the client radio, IP address and MAC address for the AP, signal strength,
channel, transmit power and data rate.
Ping Address
Ping Results
Use the Diags tab as a troubleshooting tool. The functions are as follows:
• (Re)Connect: Enables/Disables the radio, applies/reapplies current config
and tries to associate and authenticate to the wireless LAN, logging all
activity in the output area at bottom of the dialog box.
• Release/Renew: Obtains a new IP address through DHCP and logs all
activity in the output area.
• Start Ping/Stop Ping: Starts a continuous ping to the address in the text
box next to this button. This a toggle button so when you tap on it, it
changes to Stop Ping. Closing this window or tapping on another button
also stops the ping.
Cold Reset
There are two options when executing a cold reset: reset to BootLoader or reset
directly to Windows CE operating system.
To execute a cold reset and access the BooSt menu:
• Press and hold down the left [BLUE] key, the [ENTER] key and the
[SPACE] key simultaneously for a minimum of six seconds.
After a cold reset, the BooSt menu appears.
• If you want to load the Windows CE operating system, type 1.
• If you want a clean start, press ! (that is, [SHIFT] [1]). All data and settings
are lost. Files and data stored in flash are preserved.
Once the OS loads, any executables and cab files in the startup folders are run. The
cab files are deleted by the cab file installer unless they are marked read-only.
Radio Dome
Keyboard Port
If external power is reconnected before five minutes elapses, pressing [ENTER] will
wake the unit from suspend mode. On an 8530 G2, you can press the Power button
to wake the vehicle-mount. After five minutes, the vehicle-mount will shut down
and the RAM content is lost.
Note: When the vehicle-mount is initially installed, you need to provide external
power to the unit for at least four minutes to ensure that the super capaci-
tor is fully charged.
8525 G2/8530 G2 vehicle-mounts are equipped with a twelve macro keys that can
be programmed to replace frequently used keystrokes, along with the function of
executable keys like the [ENTER] key, the [BKSP] key, any function key and arrow
key, and so on.
• In the Control Panel, choose the Stylus icon to display the Stylus Proper-
ties window.
3.6.2 LEDs
The 8525 G2/8530 G2 is equipped with four tri-coloured LEDs located in the
upper-right corner of the keyboard. If you have an 8530 G2 and are using the
onscreen, soft keyboard, only the API and Rx/Tx LEDs are available in the taskbar.
LEDs
The taskbar changes dynamically, and only those icons that are applicable are
displayed. For example, if a radio is not installed in your 8525 G2/8530 G2, the
radio signal icon is not displayed in the taskbar.
Link Status
The Narrow Band radio displays one of three link state icons. An uppercase ‘LINK’
with a green background indicates the radio is powered on and that the unit is online
and locked onto a channel. A lowercase ‘Link’ with a yellow background indicates
that the radio is powered on but the 8525 G2/8530 G2 is not online or not locked
onto a channel. A lowercase ‘Link’ with a yellow background and a red ‘X’ through
it indicates that the radio is not powered on, is not online and is not locked onto
a channel.
Bluetooth Radio
This icon represents the Bluetooth radio installed in your 8525 G2/8530 G2.
Security Level
Security levels can be set to limit user access to 8525 G2/8530 G2 settings. In
addition, applications can be restricted to prevent inadvertent changes.
Battery Icons
Battery In Use
This icon indicates that the 8525 G2/8530 G2 is drawing power from the optional
backup battery rather than external DC power.
Battery Charging
This battery icon indicates that the vehicle-mount is running on external DC power,
and that the optional backup battery is present.
External DC Power
This external DC power icon is displayed in the taskbar when the unit is using
external DC power and the backup battery is not present.
Tethered Devices
When a peripheral is attached to the tether port and activated, an associated icon
appears in the taskbar.
3.7 Scanning
Non-decoded scanners are configured using the Scanner Properties dialog box in the
Control Panel.
Note: Refer to “Scanner Properties Setup” on page 137 for details.
Decoded scanners must be configured by scanning special configuration bar codes.
In these cases, the scanner manufacturer provides programming manuals for configura-
tion purposes.
The 8525 G2/8530 G2 supports a variety of one dimensional (1D) and two
dimensional (2D) laser scanners.
3.7.3 Troubleshooting
If the scanner is not working, investigate the following:
• Is the 8525 G2/8530 G2 on?
• Check that the bar code symbology being scanned is enabled for the 8525
G2/8530 G2 you are using. Check any other parameters that affect the scan-
ning procedure or the bar code.
• Check the bar code to make sure it is not damaged. Try scanning a different
bar code to verify that the problem is not with the bar code.
• Check that the bar code is within the proper range.
• Does the vehicle-mount display the warning without scanning? This sug-
gests a hardware problem in the 8525 G2/8530 G2.
• Is the laser beam scanning across the bar code?
• Once the scan beam has stopped, check the scanner window for
dirt or fogging.
• Aim at the bar code and press the trigger. A scan beam and a warning
indicator appear until a successful decode is achieved or six seconds
have elapsed.
• Aim at the bar code and press the trigger. The beam expands into a rectan-
gle covering the bar code to properly scan it. The scan beam and a warning
indicator are visible until a successful decode is achieved or three seconds
have elapsed.
Tether Port
Auxiliary USB
Connector Connector
• Back up 8525 G2/8530 G2 files to the PC, then restore them from the PC to
the vehicle-mount again, if needed, and so on.
To install ActiveSync, follow the step-by-step instructions provided with the
program’s setup wizard. Refer to the following website for details:
http://www.microsoft.com/windowsmobile/resources/downloads/pocketpc/activesync35.mspx
Note: You’ll need to run an application – usbsetup.exe – to configure Windows
to recognize the 8525 G2/8530 G2. For information about this USB appli-
cation, refer to Appendix C: USB Setup Application.
• Use only mild detergent or soapy water to clean the vehicle-mount unit.
• Avoid abrasive cleaners, solvents or strong chemicals for cleaning.
• To clean ink marks from the keypad and touchscreen, use isopropyl alcohol.
My Device
Choosing this icon displays the contents of your 8525 G2/8530 G2 computer. If
you’re not sure how to work with the files, folders and programs displayed, refer to
“Working With Files, Folders And Programs” on page 62.
Recycle Bin
The Recycle Bin temporarily contains items that were deleted, allowing you to
either permanently delete or restore these items.
Internet Explorer
Choosing this icon launches Internet Explorer – a standard Windows CE version. Keep
in mind that your supervisor will need to set up access using the Internet Options and
the Network and Dial-up Connections icons in the Control Panel.
Microsoft WordPad
Choosing this option launches Microsoft WordPad, a trimmed version of the Microsoft
Word application.
The 8525 G2/8530 G2 is equipped with a taskbar at the bottom of the screen. It
displays icons through which you can view the internal battery capacity, the radio
signal quality of your unit, and so on. If the vehicle-mount is attached to a peripheral
device, an associated icon is displayed. In addition, the taskbar displays the
application(s) currently running on your unit and the security level assigned to your
8525 G2/8530 G2.
The taskbar also displays active modifier keys – [SHIFT], [ALT], [CTRL], [BLUE]
and [ORANGE]. Keys that have been locked “on” are displayed in uppercase
letters. For example, if you press the [CTRL] key twice to lock it “on”, it is
displayed as CTRL KEY in the taskbar.
• Tap the stylus on the items you want to activate or deactivate. A check mark
indicates active items.
Note: The Advanced tab allows you to tap on a Clear button to delete the con-
tents of the Documents folder.
Note: It is recommended that you enable ‘Allow Teklogix Security Level’ so that
authorized Psion Teklogix service personnel can access your unit should
it require maintenance.
4.4.3 Programs
• Tap on Programs to display a sub-menu of options.
This sub-menu allows you to choose ActiveSync, Demo and Command Prompt, and
you can access Internet Explorer, along with installed applications (e.g., Microsoft
WordPad), Remote Desktop Connection and Windows Explorer.
ActiveSync®
ActiveSync is used to connect your 8525 G2/8530 G2 to your PC.
Demo
The Demo folder contains demo programs available on the 8525 G2/8530 G2. Some
demo programs such as Sound and Imager require hardware support not available
on these vehicle-mounts.
Summit
The Summit folder provides access to the SCU (Summit Client Utility). The SCU is
the utility you will need to configure the Summit 802.11g Compact Flash radio
module, model number RA2041 so that it can communicate through a wireless LAN
effectively and securely.
Command Prompt
Command Prompt is used to access the DOS command prompt. At the prompt, you
can type DOS commands such as dir to display all the directories in the drive.
Internet Explorer
The 8525 G2/8530 G2 is shipped with the Microsoft Internet Explorer for Windows CE.
You can access the Internet Options icon through the Start Menu under
Settings>Control Panel or by double-tapping on the desktop icon labelled My Device
and then, double-tapping on the Control Panel icon.
Windows Explorer
The Windows Explorer installed on your 8525 G2/8530 G2 is consistent with all
Windows CE devices. You can access this option either from the Start Menu under
Programs>Windows Explorer or from your device desktop.
4.4.4 Shortcuts
When System Tray is chosen, you can access the taskbar icons using the arrow keys.
• Press the [LEFT] and [RIGHT] arrow keys to highlight the icon in the
taskbar about which you’d like more information – a tooltip is displayed as
each taskbar icon is highlighted.
• To display the Control Panel dialog box associated with the highlighted
icon, press [ENTER].
Cycle Tasks
When Cycle Tasks is selected (and the Task Manager is not open), you can cycle
through active applications. To choose this option:
• Choose Cycle Tasks from the Shortcuts menu, or
Press [ALT] [TAB].
4.4.5 Settings
• Tap on Settings to display a sub-menu of options.
Control Panel
The Control Panel contains applets used to configure hardware, the operating
system and the shell. If your 8525 G2/8530 G2 is running with the Psion Teklogix
Tekterm application or another application, additional configuration applets may
appear in the Control Panel.
4.4.6 Run
Choosing the Run option from the Start Menu displays a dialog box in which you
can enter the name of the program, folder or document you want to open or launch.
4.4.7 Shutdown
Choosing Shutdown displays a sub-menu of options, including Suspend, Warm
Reset and Cold Reset.
Note: This menu varies slightly depending on the security level chosen. When
the 8525 G2/8530 G2 is set to User level, the Shutdown option is replaced
by Suspend. A sub-menu is not available.
At Teklogix security level, an additional option is available in the
sub-menu – Bootloader. This option behaves like cold-reset, except
that the 8525 G2/8530 G2 starts Bootloader rather than Windows CE.
Suspend
The Suspend option suspends the 8525 G2/8530 G2 immediately – this is equivalent
to turning the vehicle-mount off.
Warm Reset
The Warm Reset option resets the 8525 G2/8530 G2, leaving all saved files and
(registry) settings intact. Any unsaved data is lost.
Cold Reset
The Cold Reset option resets the 8525 G2/8530 G2. Any files not stored in
permanent memory are lost. However, the registry settings are saved.
Note: If you’re using the touchscreen, use the stylus to tap on an element in a
dialog box to select or deselect it, display dropdown menus, save your
selections, and so on. If you’re using a keyboard, follow the directions
below.
Dialog boxes contain one or more of the following elements:
Tab: A tab separates different elements of a dialog box. Tap on a tab to display the
associated information.
Textbox: A textbox requires that you type information. Highlight the textbox with
the stylus and then type the appropriate information.
Dropdown: This type of menu is identified by up and down arrows next to the
dropdown menu to indicate that additional options are available. Tap the stylus on
the arrow to display the options in the menu.
Checkbox: This box allows you to select or deselect an option. To select or deselect
a checkbox, tap the stylus on the checkbox to select or deselect it.
Radio buttons: These buttons allow you to choose from a number of options. For
example, in the sample screen in Figure 4.2 on page 73 you can choose to ‘Obtain
an IP address via DHCP’ or ‘Specify an IP address’. Tap the stylus on the button
to select or deselect it.
Buttons: This type of button allows you to ‘Save’, ‘Delete’ and so on the options
you’ve chosen in a dialog box. Tap the stylus on the button to activate it.
Saving Your Choices: Once you’ve made all your changes, tap on OK to save your
changes and exit the window.
Note: A dialog box item that is displayed in grey text indicates that it is not
currently available.
The Control Panel folder contains icons used in the setup of your 8525 G2/8530 G2.
Bluetooth
A short-range wireless technology that enables data communication
between devices. It also provides the capability to use a Bluetooth-enabled
cellular phone as a data modem, exchanging information with other Blue-
tooth devices and providing network access.
Certificates
A public key is transmitted as part of a certificate. The certificate assigned
through this icon is used to ensure that the submitted public key is, in fact,
the public key that belongs to the submitter. The client checks that the cer-
tificate has been digitally signed by a certification authority that the client
explicitly trusts. “Certificate Assignment” on page 105 directs you to the
appropriate setup information.
Date/Time
Allows you to set the current Month, Date, Time and Time Zone on your unit.
Dialing
Specifies dialing settings, including area code, country code, dial type and
the code to disable call waiting. You can store multiple patterns – for exam-
ple, ‘Work’, ‘Home’, and so on using this dialog box.
Display
Changes the appearance (window colour scheme) on the unit desktop. This
applet can also be used to adjust the backlight level.
Input Panel
The 8525 G2/8530 G2 is equipped with the framework for a Soft Input
Panel (SIP) should you need to design your own SIP. On the 8530 only,
when a keyboard is not connected, a soft keyboard is available.
Internet Options
Used to configure your Internet browser including options such as identify-
ing the default and search page that the browser applies when connecting to
the Internet, setting the cache size, specifying the Internet connection
options, and defining the security level that is applied when browsing.
IPv6 Support
Refers to a new Internet Protocol specification (version 6) that has been
published to use 128-bit IP addresses (replacing version 4).
Keyboard
Toggles character repeat on and off and specifies delay and rate for repeated
characters. It also allows you to adjust the keyboard backlight threshold and
intensity. Additional tabs also allow the configuration of macros and
scanner key remapping.
Manage Trigger
Allows multiple-scanner triggering, including the ability to configure each
of the trigger buttons. You can configure the trigger ID for each trigger
button for both single- and double-click, the double-click time and the
double-click data.
Owner
Provides fields in which you can specify owner information. A ‘Notes’ tab
allows additional information to be entered and displayed when the unit is
powered up. ‘Network ID’ tab information is used to access network resources.
(This information should be provided by your System Administrator.)
Password
Allows you to assign a password to restrict access to elements of the unit.
Once assigned, password access cannot be circumvented so it is important
that you write down your password and keep it in a safe place. Refer to
“Security Levels” on page 66 for details.
PC Connection
Enables direct connections to a desktop computer. Selecting the ‘Change Con-
nection’ button allows you to change the type of direct connect to your PC.
Power
Allows you to define if, why and when the unit will automatically switch to
Suspend state. It also allows you to define which Card Slots are active
and to turn power for the card slots (PCMCIA and SD/MMC) on and
off. This dialog box also allows you to enable and disable the built-in Blue-
tooth radio.
RDC Licenses
The Terminal Services license server stores all license tokens that have been
installed for a group of terminal servers and tracks licenses issued. The
Remote Desktop Licenses (RDC) application displays license ‘tokens’ for
devices that connect to a Terminal Server.
Remove Programs
Lists the programs that can be removed from your unit. To remove a pro-
gram, choose it and then tap on the Remove button.
Stylus
Adjusts how Windows CE recognizes your double-tap (as slow or rapid
successive taps).
Under the Calibration tab, you can recalibrate your touchscreen by
tapping on the Recalibrate button and following the directions on the
calibration screen.
Storage Manager
Allows the user to view information about the storage devices that are
present, such as SD-MMC flash cards.
System
Displays system and memory properties. Under the Memory tab, you can
allocate memory between storage memory and program memory.
Teklogix Scanners
Used to set up scanner parameters and choose the bar code symbologies
that the 8525 G2/8530 G2 scanner will successfully read.
Total Recall
This is a Psion Teklogix utility developed to maintain applications and
setting over cold boots. This utility is based on a backup and restore concept
and is extended to incorporate powerful advanced features.
TweakIT Settings
Allows you to change Advanced System Settings (interface, network, and
servers), User System Settings (display font size), and provides the
Registry Editor.
SNMP
SNMP (Simple Network Management Protocol) is the protocol used to
monitor and manage devices attached to a TCP/IP network.
Wireless WAN
Provides access to technology like GSM/GPRS and CDMA which allows
wide area networking capability such as internet browsing via GSM/GPRS.
This option allows you to change the background colour or add an image.
This dialog box allows you to customize the display colour scheme.
Note: Backlight changes take effect immediately. You do not need to reset
the 8525 G2/8530 G2.
Intensity
This parameter is used to adjust the light intensity of the backlight. Sliding the bar to
the left lowers the light intensity, and sliding it to the right raises the intensity.
Bright For
The value chosen from this dropdown menu determines the duration of time that the
backlight stays on at the configured intensity when a unit is not in use.
Dim For
The value chosen from this dropdown menu determines the duration of time that
the backlight stays on at half the configured intensity (dimmed backlight) when a
unit is not in use.
Repeat Delay
The position of the slider determines how long a key must be held down before it
begins to autorepeat.
Repeat Rate
The value assigned for the Repeat Rate parameter determines how quickly the key
you press repeats and is measured in characters per second (cps). Sliding the bar to
the left slows the repeat rate, and sliding the bar to the right increases the repeat rate.
Note: Use the field at the bottom of this dialog box to test the repeat delay and
rate settings you’ve chosen.
Intensity
This parameter is used to adjust the light intensity of the 8525 G2/8530 G2 keyboard
backlight. Sliding the bar to the left darkens the keyboard backlight intensity, and
sliding it to the right lightens the intensity.
Options – ON For
The value chosen from this dropdown menu determines the duration of time that the
keyboard backlight stays on when a unit is not in use.
Note: Tapping in the checkbox next to ‘When using external power, keep
the backlight always ON’ forces the keypad backlight to remain on
when the unit is operating with external power such as vehicle battery
or A/C adaptor.
The options in this tab allows you to determine how modifier keys on your 8525
G2/8530 G2 behave. For each modifier key–[ALT], [SHIFT], [CTRL], [ORANGE]
and [BLUE]–you have the following options in the drop-down menu: Lock, One-
Shot, and OneShot/Lock.
Note: Keep in mind that checking the taskbar lets you know whether or not
these keys are locked on. For example, if the [ORANGE] key is locked
‘on’, the taskbar at the bottom of the screen displays it in uppercase char-
acters – ORANGE KEY. If this key is displayed in lowercase characters in the
taskbar, you’ll know that the orange key is not locked. It will become inac-
tive following a key press.
Important: Once you’ve assigned a One Shot mode to a modifier key, you
need to tap on the OK button at the top of the tab to activate
your selection.
Lock
If you choose Lock from the drop-down menu, pressing a modifier key once locks it
‘on’ until you press the modifier key a second time to unlock or turn it off.
OneShot
If you choose OneShot, the modifier key remains active only until the next key is pressed.
OneShot/Lock
OneShot/Lock allows you to combine these functions. When you choose this
option and you press the modifier key once, it remains active only until the next key
is pressed.
If you press the modifier key twice, it is locked ‘on’, remaining active until the
modifier key is pressed a third time to turn it ‘off’.
A macro has 200 programmable characters (or “positions”). The macro keys can be
programmed to replace frequently used keystrokes, along with the function of
executable keys including [ENTER], [BKSP] and [DEL] ([BLUE]-[BKSP]),
function keys and arrow keys.
• Type the macro sequence you want to assign to the Macro key. You can
type text and numbers, and you can program the function of special keys
into a macro.
Note: Tap on the ‘Stop Recording’ button at any time to suspend the process.
• When you’ve finished recording your macro sequence, press the Stop
Recording button, or type the key sequence – [CTRL] [ALT] [ENTER].
A new screen – Verify Macro – displays the macro sequence you created. The Save
button is highlighted.
• Tap on the Save button.
Note: If you want to discard the macro you’ve just created, tap on the
‘Discard’ button.
Executing A Macro
To execute a macro:
• Press the macro key to which you’ve assigned the macro. For example, if
you created a macro for macro key ‘1’, press [M1] to execute the macro.
Deleting A Macro
To delete a macro:
• In the Macros tab, tap on the macro number you want to delete.
• Tap on the Delete button.
The Unicode Mapping tab is used to map combinations of virtual key values and
[CTRL] and [SHIFT] states to Unicode™ values. This tab shows the configured
Unicode character along with the Unicode value. Keep in mind that Unicode
configurations are represented as hexadecimal rather than decimal values.
All user-defined Unicode mappings are listed in the Unicode Mapping tab in order
of virtual key value, and then by order of the shift state. If a Unicode mapping is not
listed, the Unicode mapping is mapped to the default Unicode value.
• Tap on a value in the Unicode mapping list – in the sample screen above, a
value will be assigned to virtual key 0 (VK 0).
• Tap the stylus in the Unicode Mapping field, and type a Unicode value for
the highlighted key.
Note: To add a shifted state – [SHIFT] and/or [CTRL], tap the checkbox next to
‘SHIFT Pressed’ and/or ‘CTRL Pressed’. to select the shift state you want
to assign.
keyboard. A key can be remapped to send a virtual key (e.g. VK_F represents the
‘F’ key; VK_RETURN represents the [ENTER/ON] key, etc.), perform a function
(e.g. turn the scanner on, change volume/contrast, etc.) or run a macro.
There are three different tables of scancode mappings: the Normal table, the Blue
table and the Orange table. The Normal table defines unmodified key presses; the
Blue table defines key presses that occur when the [BLUE] modifier is on; the
Orange table defines key presses that occur when the [ORANGE] modifier is on.
The default mappings of these scancodes can be overwritten for each of these three
tables using the Scancode Remapping tab accessed from the Keyboard Properties
dialog box.
The first column in the Scancode Remapping tab displays the Scancodes in
hexidecimal. If the scancode is remapped to a virtual key, that virtual key is
displayed in the next column labelled ‘V-Key’. A virtual key that is ‘Shifted’ or
‘Unshifted’ is displayed in the third column labelled ‘Function’.
If the scancode is remapped to a function or a macro, the first and second columns
remain blank while the third column contains the function name or macro key
number (e.g., Macro 2).
Adding A Remap
To add a new remapping:
• Tap the stylus on the Add button at the bottom of the dialog box.
Removing A Remap
To delete a remap:
• In the Scancode Remapping tab, highlight the scancode you want to delete,
and tap on the Remove button.
• Tap on OK.
• Slide the volume button upward to increase the beeper volume or down-
Keep in mind that for units using a super capacitor for backup purposes (rather than
an optional internal backup battery), the battery details on the right side of the
Battery tab (see sample screen above) are not displayed; this portion of the tab will
be blank.
5.5.4.2 Suspend
• In the Power Properties dialog box, open the Suspend tab.
Suspend
When the 8525 G2/8530 G2 is idle – not receiving any user input (a key touch, a
scan, and so on) or system activity (serial data, an activity initiated by an
application, and so on), the value chosen in the Suspend Timeout dropdown menu
determines when the unit will go to suspend state (appear to be off).
When the time in the Suspend Timeout field elapses without any activity, the unit
enters Suspend state. In Suspend state, the 8525 G2/8530 G2 CPU enters a sleep
state, and the radio is shut off. The state of the device (RAM contents) is preserved.
Pressing [ENTER] wakes the system from suspend state. When the 8525 G2/8530
G2 is in suspend state, the network connection is broken immediately; you must
re-establish the network connection.
5.5.4.4 Devices
• Tap on the checkbox next to Disable the touch panel. The touchscreen will
not accept screen taps.
Double-Click
When a key is pressed and released, then pressed again within the configured time
(between 0 to 1000 milliseconds), a double-click occurs. See also “Trigger Type” on
page 104.
Show All
By default, the trigger mapping list only shows active mappings. Mappings for
drivers or applications that are not currently active are not normally displayed. By
checking this checkbox, all mappings, both active and inactive, are displayed.
Add
Tapping this button brings up the Add Mapping dialog box, so that you can add new
trigger mappings.
Edit
Tapping this button brings up the Edit mapping dialog box, so that you can edit
existing trigger mappings.
Remove
Tapping this button removes an existing mapping.
OK
The OK button in the top right of the Manage Triggers screen saves all changes
made. If the cancel button X is tapped instead, or the [ESC] key is pressed, all
changes made will be discarded.
Source
This dropdown list allows you to specify the source of the trigger events, such as a
keyboard key [F1], for the Trigger Owner selected.
Add Source
Only existing trigger sources are shown in the Source combo-box. To add a new
source to this list, tap on the Add Source button. A dialog box pops up, allowing
you to select the keyboard key to use as a trigger source.
Trigger Type
You can enable either an Up/Down or Double Click response to a trigger press.
Normally, when a trigger (keyboard key, etc.) is pressed and released, a “trigger
down” event is sent to the “owner”–that is, the application receiving the trigger
press information followed by a “trigger up”. If Double Click is chosen in this menu,
when the trigger is pressed, released, and then pressed again, a “double-click” event
will have occurred. If a mapping with the type Up/down has also been configured
for the same source, it will only receive the first set of trigger events.
Trigger Owner
This identifies the driver or application receiving the trigger presses.
Show All
By default, inactive owners are not shown. By checking this checkbox, all owners,
both active and inactive, are displayed.
For a detailed description about Certificate setup for both the server and client-side
devices (8525 G2/8530 G2s), refer to the following website:
www.microsoft.com/windows2000/techinfo/planning/walkthroughs/default.asp - "Security Services"
Note: When importing certificates, the 8525 G2/8530 G2 only recognizes
.cer files.
The Power information in this screen indicates the power of the radio installed in the
unit – 0.5 or 1.0 W. The Serial Number is the identifier for the radio and is used by
the protocol when the “Auto Radio Address” parameter is enabled. The CIS Data
(Card Information Structure) is manufacturer information describing the PC Card
installed in the 8525 G2/8530 G2. DSP x.x / FPGA 0xNN indicates the firmware
revision of the radio’s DSP (x.x) and FPGA (0xNN) where x.x and NN represent
actual revision numbers.
Statistics Screen
• Tap on Statistics to display the Protocol Statistics screen.
These statistics are updated every second while the dialog box is displayed.
Table 5.2 defines the elements of the Low Level statistics screen.
Statistic Description
RxOk Message buffers discarded due to lack of available receive buffers
RxHd Message headers successfully received
RxBd Message bodies successfully received
RxEr Message buffers received with detected errors
RxOv Number of transmitted messages, complete application messages
TxOk Message buffers successfully transmitted
TxEr Message buffers which failed to transmit
CD Number of carrier detect changes detected
Coll Number of collisions detected
Actual difference in time (in RTC ticks) between when the most recent trans-
Tx D
mit (with timestamp) was scheduled to start and when it actually started.
Channel Number
This parameter determines the operating radio channel of the 8525 G2/8530 G2.
The allowable range for this parameter is 1 to 20. The default value is 1.
Note: The Channel Number dropdown menu displays only the channels that
have been enabled in the Channel Enable List.
Power Up Channel
When this parameter is enabled, the 8525 G2/8530 G2 begins communicating on
the channel specified in the Channel Number parameter when the unit is powered
up. This setting may prevent the migration of 8525 G2/8530 G2s to the same
channel due to uneven coverage in some sites.
If this parameter is disabled (unchecked), the unit will continue communicating on
the same channel that it was on before it was powered off.
This dialog box is completed by default with all channels that have frequencies
configured. A checkmark indicates that a channel is enabled. An unchecked check
box indicates that the channel is disabled. The maximum number of channels
supported by the RA1001 Narrow Band radio is 20.
Enabling a channel allows the channel to be set to an operating channel (Channel
Number) and makes it available for channel searching. For example, if Channel 1 is
the operating channel and all other channels are enabled, the 8525 G2/8530 G2 can
roam through all 20 channels.
timeout periods before searching for a new channel. If Channel Switch Speed is set
to Fast, the current channel is only monitored for up to 2 time-out periods before
channel switching begins.
Important: “Fast” switch speed is most effective where coverage areas are
largely overlapping. If the coverage areas barely overlap, have
dead spots, or if the 8525 G2/8530 G2 frequently operates on the
fringe of coverage, this parameter should be set to “Slow”.
Channel Selection
Enabling Manual Select allows you to set the channel search order the
8525 G2/8530 G2 will use if communication quality drops and channel
switching is required. If this parameter is enabled, the 8525 G2/8530 G2 uses
the channel switching lists specified in the Manual Switch Table. If this parameter is
disabled (unchecked), the vehicle-mount uses a standard algorithm to decide which
channel it should switch to in the event of poor channel quality.
This feature is used rarely. It is used when the order of channel switching needs to be
tightly controlled. The values in the Channel column are completed for you with the
enabled channels when this dialog box is opened. For each corresponding enabled
channel, the “List” column contains “0,0,0,0,0,0,0,0” values by default.
If communication quality falls below 46%, only the channels entered in the Manual
Switch Table are considered for channel switching. The channel search is carried out
in the order in which the channels were entered in the table.
To configure channel switching order for a particular channel:
• Highlight the channel you want to edit, and tap on Edit Channel List.
Only those channels that are enabled are displayed in the dropdown menus in the
Edit Channel List dialog box. The allowable values range from 0 to 20.
• Tap on the arrow next to dropdown menu to scroll through the available
channels. Highlight the value you want to assign.
• Once you’ve assigned the switching order, tap on OK to close the
dialog box.
The channel list is added to the selected channel in the Manual Switch Table dialog box.
Polling
The default values for the Polling parameters are dependent on the value assigned to
the Modulation / Baud Rate parameter in the Radio tab.
Modulation / Baud Rate Sync Delay Window Delay Poll Timeout
4 Level / 19200 17 20 20
4 Level / 9600 17 23 25
2 Level / 9600 17 19 22
2 Level / 4800 25 23 37
Table 5.3 Polling Parameters
Sync Delay
Warning: This parameter should not be changed from its factory setting
without a clear understanding of radio protocol timing.
The Sync Delay parameter specifies the delay between the base station transmission
and the first response window, measured in milliseconds. The value assigned to this
parameter must be compatible with other terminals and base stations in the system.
The allowable range for this parameter is between 1 and 40.
Window Delay
Important: The value assigned to this parameter should not be changed from
the factory setting without a clear understanding of the timing of
the radio protocol.
This parameter specifies the amount of time (in milliseconds) the 8525 G2/8530 G2
should add to each response window in order to accommodate the receive/transmit
switching characteristics of the radio. The value assigned must be compatible with
other units and base stations in the system. The default setting of 19 is based on the
requirements of a 2 level modulation narrow band radio, operating at 9600 baud.
Poll Timeout
This parameter (in units of 16.6 ms) sets the time-out value used for automatic
channel switching. “Poll Timeout” is the time during which the 8525 G2/8530 G2
should detect at least one poll from a base station. As each “Poll Timeout” passes
without a successful poll from the base station, the 8525 G2/8530 G2 channel
quality decreases. If the channel quality falls to below 46%, the terminal begins
searching for a new channel.
A value from 1 to 200 can be assigned to this parameter.
Late TX Limit
The value entered for this parameter (measured in milliseconds) sets the maximum
allowable deviation time from the start of a response window during which an 8525
G2/8530 G2 can make a transmission. After this threshold, the transmission will not
be attempted and the 8525 G2/8530 G2 will try again at the next opportunity. For
example, suppose this parameter is set to 5. From the beginning of the response
window, the 8525 G2/8530 G2 can be up to 5 milliseconds late sending a
transmission. Beyond this threshold, the transmission is not attempted. The
vehicle-mount waits for the next opportunity.
The allowable range for this parameter is from 1 and 10 – the default value is 2.
Modulation/Baud Rate
The options in the Modulation / Baud Rate dropdown menu are: 2 Level/4800,
2 Level/9600, 4 Level/9600 and 4 Level/19200. The value assigned to this
parameter must be identical to the corresponding parameter in the Psion Teklogix
Base Station. This parameter is stored in the radio’s non-volatile memory. The
default value for Modulation/Baud Rate is 2 Level/9600
Data Squelch
Data Squelch controls the radio receiver, cutting it off when the signal is too weak
for reception of anything but noise. Receive Signal Strength Indicator values below
the Data Squelch threshold prevent further processing of the receive signal while
higher values allow further processing. The allowable range is 0 to 100 with a
default value of 0.
In noisy environments, this value can be increased to reject noise. In environments
with less noise, this value can be decreased to allow the received signal and increase
range. This parameter is stored in the radio’s non-volatile memory.
Test Squelch
• Tap on the Test Squelch button to prompt the radio to use the Data Squelch
value without committing it to the radio’s non-volatile memory – in other
words, to ‘test’ the value assigned to the Data Squelch parameter.
To commit the new Data Squelch value to the radio’s non-volatile memory:
• Tap on the OK button – the dialog box is closed and the new value
is saved.
To discard the new value, and keep the old Data Squelch value:
• Tap on the X button at the top of the dialog box. The old value is sent to the
protocol driver.
Frequency Table
• Tap on the Frequency button to display the Frequency Table dialog box.
When you tap on this button, a warning box is displayed asking “Copy all the Rx
frequencies to the Tx frequencies?”
• Tap on Yes to go ahead or No to stop the copy process.
Statistics
• Tap this button to display communication statistics.
Refer to “Statistics Screen” beginning on page 107 for details about this screen.
Advanced
This button launches the Radio Test Application.
Scan
• Tap on the Scan button to list available devices.
Wait for the 8525 G2/8530 G2 to complete its scan (approximately 20 seconds).
When scanning starts, the Scan button will change to Stop – if necessary, you can
tap on this button to stop the process. Once scanning is complete, all discovered
devices will be displayed in the list box, with Name, Address, Active status, and
PIN information.
Note: During the scanning process, addresses are located first, followed by
names. Only the names of devices that are within the Bluetooth radio cov-
erage range will be retrieved.
The Active column indicates whether any service is activated for that device. When
a service is activated, the device is displayed in the list even when it is not detected
during the scan.
The PIN column indicates whether you have a PIN (password) set for the device.
At this point you can either query for services or set the PIN for each device. Once
you highlight a device in the list box, both the Services and Set PIN buttons become
available.
Services
A discovered device may display several service profiles that it can use to
communicate, and you will want to activate the type you need. Supported profiles
that can be activated include: DUN (Dial-Up Networking service), Printer (serial
service), and LANPPP (LANAccessUsingPPP service). ASync (ActiveSync) is
another available profile.
• To start the service scan, highlight a device in the Devices tab list, and then
click on the Services button or double-click on the device entry.
Note: If the remote device is out of reach or turned off, it can take a consider-
able amount of time for the Services dialog box to appear – it may appear
to be frozen.
Once the device’s service profiles are displayed in the Services list box:
• Highlight the service to be activated.
• Press [SPACE] or right-click to display the Activation menu.
The Activation menu contains four options – Activate, Authenticate, Outgoing and
Encrypt.
Once the service is successfully activated, the assigned port (if applicable) will
appear in the Port column of the Services list box. You can choose to use BSP or
COM as the port name. BSP is the latest Microsoft Bluetooth stack standard, but
older applications assume serial ports are COM. When using COM as the port name,
the Bluetooth manager will try to find and use a free port between COM7 and
COM9. When using BSP as the port name, BSP2 to BSP9 are available for use. The
port is available as soon as it is activated.
Note: The CH column shows the RFCOMM channel of the service if the
service is RFCOMM-based. This information is not generally needed
except for debugging purposes.
To add a service to the Outgoing port, an active service must first be deactivated.
Then you can choose the ‘Outgoing’ option from the Activation menu (highlight a
service, right-click or press the [SPACE] bar to display the Activation menu).
The Authentication and Encryption options can be changed only before activation.
To change these after activation, deactivate the service first, then change the options.
Once a service is activated, all the information regarding the service, including the
RFCOMM channel number, is saved in the registry. (Some remote devices may
change their RFCOMM channel numbers when they reboot, so your saved setting
may not work when the remote device is rebooted. In that case, you must deactivate
the service and reactivate it to detect the current RFCOMM channel.)
Set PIN
PINs can be set for each device by pressing the Set PIN button in the Devices tab, or
you can skip this step and try to connect to the device first.
• Highlight a device, tap on the Set Pin button, and type the PIN.
You will receive a message, either that the PIN has been successfully validated or
that it has been rejected.
If the PIN has been validated, an asterisk (*) appears in the PIN column in the
Devices list box, indicating that this device has a PIN set. Once a PIN is entered, it is
saved in the registry.
To remove the PIN:
• Choose Set PIN, and press [ENTER].
If the 8525 G2/8530 G2 attempts to connect to a remote device that has
Authentication enabled and does not have a required PIN set, an Authentication
Request dialog box is displayed.
• Enter the PIN, and tap on OK to connect the devices.
The Bluetooth connection is initiated from your 8525 G2/8530 G2 to the remote
device – therefore the 8525 G2/8530 G2 is called the ‘client’ and the remote is
called the ‘server’. The Servers tab displays the server profiles that can be activated
in your 8525 G2/8530 G2. There is currently one server profile available: Serial.
• Tap on the checkbox to activate the server, and it will display the
associated port name beside the server name.
Once you activate a server profile, it is recommended that the 8525 G2/8530 G2 be
rebooted before you try to bond from a server.
Note: You do not need to reboot if you are deactivating a server.
Outgoing Port acts as a serial port that can be used to connect to a list of Bluetooth
devices (one at a time), but you have the freedom to switch on-the-fly.
The Outgoing Port checkbox allows you to create the Outgoing port. When the port is
created, the Outgoing tab lists the port name.
The Outgoing list dialog box displays a list of services marked as ‘Outgoing’. The *
column indicates the currently selected service. You can tap on Unselect to reset the
current selection, or you can tap on Select to make a selection. The Remove button
deletes the service from the outgoing list.
The Prompt menu determines the behaviour of the pop-up Selection menu.
Choosing Everytime causes the Selection menu to be displayed each time an
outgoing port is created. If you choose Once, the menu is displayed only when a
partner service is not selected.
To display the Selection menu at any time:
• Press [CTRL] [ALT] [F1], and switch the partner Bluetooth device.
If a connection to a partner device already exists, the connection is dropped and
another connection to the newly selected device is created instantly without
disrupting the application that has opened the outgoing port.
Note: To add a service to the Outgoing port, an active service must first be
deactivated. Then you can choose the ‘Outgoing’ option from the Activa-
tion menu (highlight a service, right-click or press the [SPACE] bar to
display the Activation menu).
The Active Conn. tab lists the Name, Address, and Type of the currently active
connections. The table is periodically updated while on display, but it can take a few
seconds before it reflects the actual list of connections. The Type column of the table
shows ‘ACL’ or ‘SCO’. The Connection list table shows the connections for
scanning as well as the service connections.
Note: You can change the device-name and description of your radio by clicking
on the System icon in Control Panel, which will open the System Proper-
ties dialog box. Click on the Device Name tab to access the menu and
change your settings. Then click on OK.
Although the name will have changed in the Properties menu in Blue-
tooth Controls, the radio only reads it on boot-up. For the changes to take
effect, you must reset the 8525 G2/8530 G2.
The Properties tab displays information about your 8525 G2/8530 G2, and provides
some port options.
The Device Name field shows the device name of your 8525 G2/8530 G2. This
name can be changed (see the Note in this section for details).
Device Class shows the Class of Device (e.g. desktop), which is always set to
vehicle-mount.
Local Bluetooth Address shows the address of your 8525 G2/8530 G2 radio.
Port Prefix is used to set the port name to either BSP or COM. When the name is set
to BSP, BSP2 to BSP9 are available for activated services (including the server).
When COM is chosen, COM7 to COM9 are available.
Name Query Retry governs the number of times the vehicle-mount will attempt to
query the names of other Bluetooth devices if the first attempt fails. (When the
unit scans for other devices, it sometimes fails to scan names.)
The 8525 G2/8530 G2 communicates with your phone and retrieves the
parameters for the Device Properties dialog box. The 8525 G2/8530 G2
then disconnects.
7. Under the Call Options tab, turn off Cancel the call if not connected
within, and press [ENTER] to save your changes.
8. In the Modem dialog box, choose Next to display the Phone Number
dialog box.
The phone number you enter is network carrier dependent. Once you’ve
specified all the necessary information, tap on Finish.
Once you’ve edited this dialog box to reflect your network carrier require-
ments, press [ENTER] to save your changes.
11. At this point, you’ll need to return to the Control Panel and choose the
Network and Dial-up Connections icon.
In the dropdown menu, you can choose from four options: Create Backup Profile,
View Selected Profile, Restore Selected Profile and Delete Selected Profile. Keep
in mind however that until a profile is created, the only available option is Create
Backup Profile.
Profile Information
This dialog box lists the possible storage destinations for the profile file.
• To begin, type a name for the profile in the field labelled Profile Name.
The image type – OS Version and Registry Type – for the 8525 G2/8530 G2 is
displayed at the top of the dialog box.
• Tap on the icon to expand the settings for Profile Type and
Profile Location.
Add Files
By default, All Files: is selected so that all installed or copied files, database entries,
and the Registry will be saved. You can, however, limit the backup to database,
and/or the registry only.
The Select Files option allows choose to limit the backup By Individual File, or you
can choose to define which files will be backed up By File Type.
View Selections
Depending on what you have selected for inclusion in your profile, you can view a
list of the selected files, databases and/or registry.
Input Panel
Button Icon
Important: If the Input Panel Button icon is not visible in the taskbar,
from the ‘Start’ menu, tap on Settings>Taskbar and Start Menu.
Tap the checkbox next to ‘Show Input Panel Button’. To remove
this icon from the taskbar, tap in the checkbox to erase the
check mark.
• Tap on the Input Panel Button icon in the taskbar to display the soft input
panel on the 8530 G2 screen. Keep in mind that the soft keyboard is not dis-
played when a physical keyboard is attached to the vehicle-mount.
Soft Keyboard
The soft keyboard operates just like a standard keyboard except that rather than
pressing a key, you tap on letters, numbers, modifier keys, etc. on the 8530 G2 screen.
Note: Two LEDs – API and Rx/Tx – are available in the taskbar below the soft
keyboard. For information about these LEDs, refer to page 48.
To customize the appearance and behaviour of the soft keyboard:
• Tap on the Input Panel icon in the Control Panel.
• Tap on the Options button to change the appearance of your soft keyboard.
Note: You can also display this dialog box by double-tapping on the Input icon
in the far-right corner of the taskbar.
• Tap on the checkbox next to Enable IPv6 Network Support to enable this
internet protocol.
Important: To improve the decode speed and performance, enable only those
codes that are required by the application.
The symbologies listed in the Barcodes tab change to reflect the scanner you choose and
the bar codes it supports. Keep in mind that the items listed in the Barcodes tab are used
to configure external, non-decoded scanners only. Decoded scanners cannot be
configured using the symbologies listed under this tab. See “Decoded Scanners” below
for information about these scanners.
All the available bar code symbologies for this type of scanner can be selected in
this tab.
A ‘plus’ sign (+) to the left of the menu item indicates that a sub-menu of parameters
is attached.
• Tap the stylus on the + sign to display the sub-menu.
• To change a parameter value, double-tap on the parameter. If you need to
type a value, a dialog box is displayed in which you can type a new value.
If you need to change a yes or no value, double-tapping on the parameter
toggles between yes and no.
Short Code
When enabled (set to on), this parameter allows scanning of short I 2 of 5 bar codes
(2 characters). When disabled, these short bar codes are rejected.
Enabling Short Code may reduce the robustness of the decoding since the
8525 G2/8530 G2 must decode more potential bar codes; it is therefore not
recommended for general-purpose bar codes with 4 or more characters.
Verify
The value entered for this parameter determines the number of correct additional
decodes required after the initial decode before a bar code is accepted. Higher values
significantly increase the time it takes to decode a bar code but also improve the
reliability of the decoded bar code.
Security
This parameter controls the tolerance for decoding edge-to-edge bar codes
(Code 93, Code 128, UPC/EAN). Lower values have a lower tolerance for
misreads, but they also increase the time it takes to decode the bar code. The default
value of 30 is generally a good compromise setting.
Full Ascii
If this parameter is enabled (set to on), the characters +, %, and / are used as escape
characters. The combination of an escape character and the next character
is converted to an equivalent ASCII character.
Include Check
If this parameter is enabled (set to on), the check digit is included with the decoded
bar code data.
AIAG Strip
If this parameter is enabled (set to on), the AIAG data identifier is removed from
each decoded Code 39 label. The data identifier occurs in the first position next to
the Code 39 start character. It can be a single alphabetic character or a series of
numeric digits followed by an alphabetic character. This identifier defines the
general category or specific use of the data contained in the rest of the bar code.
Note: If your unit is operating with the Psion Teklogix TESS application, this
parameter should not be used in conjunction with the TESS AIAG feature.
This is because the 8525 G2/8530 G2 vehicle-mount performs the strip
function before it processes the data through the AIAG feature; if the pre-
fix is stripped, the data is not identified as AIAG.
Error Accept
If the Err Accept and AIAG Strip parameters are enabled (set to on), all label data
without an AIAG identifier character is accepted. If the Err Accept parameter is
disabled and the “AIAG Strip” parameter is enabled (set to on), the label data
is not accepted.
Mod Checks
Tapping on this option displays a list of options.
None
If you choose None, a check is not executed.
Mod 43 Check
If this parameter is enabled (set to on), the Mod 43 check digit is calculated.
Mod 10 Check
If this parameter is enabled (set to on), the Mod 10 check digit is calculated.
Field Size/Chars
Field Size
The field size is the length of the field after the first character is stripped and
the prefix and suffix characters are added. If the field size is non-zero, only
bar codes of that length are passed through.
Prefix Char
This character, if non-zero, is added before a successfully decoded bar code. Press
the key you want to insert in the dialog box attached to this parameter. The
ASCII/Unicode key value of the keypress is displayed.
Pressing the [ESC] key in this dialog box resets the data to zero.
Suffix Char
Note: The appended character is treated as any other keyboard character.
For example, if [BKSP] is pressed, the usual action for that key is
performed. If your unit is operating with the Psion Teklogix ANSI
emulation application, the 8525 G2/8530 G2 transmits the escape
sequence associated with the function immediately after the bar
code data.
This character, if non-zero, is added after a successfully decoded bar code. Press the
key you want to insert in the dialog box attached to this parameter. The
ASCII/Unicode key value of the keypress is displayed.
Pressing the [ESC] key in this dialog box resets the data to zero.
Strip Leading
This parameter determines the number of characters that will be removed from the
beginning of the bar code before the prefix character is added.
Note: For Code 39 bar codes, the “AIAG Strip” is performed before the
“Strip Leading”.
Strip Trailing
The value entered in this parameter determines the number of characters that will be
removed from the end of the bar code before the suffix character is added.
Include Sym
Setting Include Sym to on causes the group separator(s) and start code contained in
this type of bar code to be displayed on the screen.
Note: This option is available only when ‘EAN/UCC 128’ is selected.
Variations
When using Code 128, you can choose the variation or type of bar code variation the
scanner will recognize. The options available are: Standard, UCC and EAN/UCC.
These options are described below. Choosing Variations displays a window from
which you can choose one of these options.
Standard
Choose Standard if Code 128 is desired.
UCC 128
UCC 128 is a variation of Code 128.
EAN/UCC 128
To successfully scan this type of bar code, EAN/UCC must be enabled.
EAN/UCC 128 bar codes include group separators and start codes.
Field Size/Chars
Refer to the description beginning on page 141 for details.
Include Check
If this parameter is enabled (set to on), the check digit is included with the decoded
bar code data.
Addendum
Important: Before “Addendum” can take effect, the “Short Code” parameter
in the Options menu (see page 139) must be enabled (set to ‘on).
An addendum is a separate bar code, supplementary to the main bar code. Choosing
this option displays a window from which you can select one of three options.
When Addendum is set to Disabled, the scanner does not recognize an addendum. If
this parameter is set to Optional, the scanner searches for an addendum and if one
exists, appends it to the main bar code. When the parameter is set to Required, the
scanner does not accept the main bar code without an addendum.
Prefix/Suffix Chars
Prefix Char
This character, if non-zero, is added before a successfully decoded bar code.
Choosing this option displays a window in which you can assign a character.
When this window is displayed, press the key you want to insert. The
ASCII/Unicode key value of the keypress is displayed.
Pressing the [ESC] key in this dialog box resets the data to zero.
Suffix Char
This character, if non-zero, is added after a successfully decoded bar code. Choosing
this option displays a window in which you can assign a character. When this
window is displayed, press the key you want to insert. The ASCII/Unicode key
value of the keypress is displayed.
Pressing the [ESC] key in this dialog box resets the data to zero.
Strip Leading
This parameter determines the number of characters that will be removed from the
beginning of the bar code before the prefix character is added. Choosing this option
displays a window in which you can assign a value.
Note: The appended character is treated as any other keyboard character. For
example, if [BKSP] is pressed, the usual action for that key is performed.
If your 8525 G2/8530 G2 is operating with the Psion Teklogix ANSI emu-
lation application, the vehicle-mount transmits the escape sequence asso-
ciated with the function immediately after the bar code data.
Strip Trailing
The value entered in this parameter determines the number of characters that will be
removed from the end of the bar code before the suffix character is added.
5.5.13.8 EAN 8
Enabled
Set this parameter to on to enable EAN 8 or off to disable it.
Include Check
If this parameter is enabled (set to on), the check digit is included with the decoded
bar code data.
Addendum
Important: Before “Addendum” can take effect, the “Short Code” parameter
in the Options menu (see page 139) must be enabled (set to ‘ON’).
Prefix/Suffix Chars
See “Prefix/Suffix Chars” on page 144.
Include Check
If this parameter is enabled (set to on), the check digit will be included with the
decoded bar code data.
Addendum
Important: Before “Addendum” can take effect, the “Short Code” parameter
in the Options menu (see page 139) must be enabled (set to ‘ON’).
Prefix/Suffix Chars
See “Prefix/Suffix Chars” on page 144.
Convert to UPC-A
Setting this parameter to on results in a non-standard decoding that returns 12 digits
from the 6 digit UPC E bar code.
Include Check
When enabled (set to on), the check digit is included with the decoded bar code data.
Addendum
Important: Before “Addendum” can take effect, the “Short Code” parameter
in the Options menu (see page 139) must be enabled (set to ‘ON’).
Prefix/Suffix Chars
See “Prefix/Suffix Chars” on page 144.
5.5.13.11 Codabar
Enabled
Set this parameter to on to enable Codabar or off to disable it.
Field Size/Chars
Refer to the description beginning on page 141 for details.
5.5.13.12 Code 93
Enabled
Set this parameter to on to enable Code 93 or off to disable it.
Field Size/Chars
Refer to the description beginning on page 141 for details.
5.5.13.13 Code 11
Enabled
Set this parameter to on to enable Code 11 or off to disable it.
Include Check
If Include Check is enabled (set to on), the check digit is included with the decoded
bar code data.
Check Digits
Choosing this option displays a window in which you can select one of three
options: None, One Check Digit or Two Check Digits.
If this parameter set to One Check Digit, it is assumed that the last digit is a
check digit.
If this parameter is set to Two Check Digits, it is assumed that the last two digits are
check digits.
Field Size/Chars
Refer to the description beginning on page 141 for details.
5.5.13.14 Interleaved 2 of 5
Enabled
Set this parameter to on to enable Interleaved 2 of 5 or off to disable it.
Mod 10 Check
If this parameter is enabled (set to on), the Mod 10 check digit is calculated. This
calculation is the same as the Code 39 Mod 10 check digit.
ITF Check
If this parameter is enabled (set to on), the ITF-14/16 Mod10 check digit
is calculated.
Include Check
If this parameter is enabled (set to on), the check digit is included with the decoded
bar code data.
Field Size/Chars
Refer to the description beginning on page 141 for details.
Include Check
If this parameter is enabled (set to on), the check digit is included with the decoded
bar code data.
Field Size/Chars
Refer to the description beginning on page 141 for details.
5.5.13.16 Discrete 2 of 5
Enabled
Set this parameter to on to enable Discrete 2 of 5 or off to disable it.
Mod 10 Check
If this parameter is enabled (set to on), the Mod 10 check digit is calculated. This
calculation is the same as the Code 39 Mod 10 check digit.
ITF Check
If this parameter is enabled (set to on), the ITF-14/16 Mod10 check digit
is calculated.
Include Check
If this parameter is enabled (set to on), the check digit is included with the decoded
bar code data.
Field Size/Chars
Refer to the description beginning on page 141 for details.
5.5.13.17 IATA 2 of 5
Enabled
Set this parameter to on to enable IATA 2 of 5 or off to disable it.
Mod 10 Check
If this parameter is enabled (set to on), the Mod 10 check digit is calculated.
ITF Check
If this parameter is enabled (set to on), the ITF-14/16 Mod10 check digit
is calculated.
Include Check
If this parameter is enabled (set to on), the check digit is included with the decoded
bar code data.
Field Size/Chars
Refer to the description beginning on page 141 for details.
Double Click
Click Time (msec)
This parameter controls the maximum gap time (in milliseconds) for a
double-click.
If the time between the first and second clicks of the scanner trigger is within this
time, it is considered a double-click. The allowable range is 0 to 1000. A value of
zero disables this feature.
A double-click produces different results depending on whether or not a value is
assigned in the ‘Click Data’ parameter. When a value is not assigned for the ‘Click
Data’, double-clicking the scanner trigger overrides the target dot delay set in the
‘Dot Time’ parameter and initiates a normal scan sweep. If a value is assigned for
the ‘Click Data’ parameter, double-clicking the scanner trigger inserts the ‘Click
Data’ value rather than initiating a scan.
Click Data
This parameter determines which character is sent to the application installed in
your 8525 G2/8530 G2 following a double-click. A dialog box appears, asking that
you press the key you want to insert. The ASCII/Unicode key value of the keypress
is displayed.
Pressing the [ESC] key in this dialog box resets the data to zero.
Display
Scan Result
When this parameter is enabled, the type of bar code and the result of the scan
appear on the screen. Note that this information is only displayed after a successful
decode and is visible only while the scanner trigger is pressed. When the trigger is
released, this information is cleared from the screen.
Scan Indicator
When this parameter is enabled, the laser warning logo appears on the display
whenever the scanner is activated.
Input
This value is compared with the decoded bar code reading. If there is a match, the
Output string is translated into the decoded bar code.
Output
If there is a match between the decoded bar code and the corresponding Input string,
the decoded bar code will be translated into the Output string. This string entry
parameter can be null, or it may contain any combination of standard and special
characters (e.g., function keys, [ENTER], etc.).
Type
The value chosen from this dropdown menu determines what is compared with
the decoded bar code reading – the beginning of decoded bar code, the end of
decoded bar code, the entire decoded bar code or anywhere within the decoded
bar code (default).
Baud
Double-tapping on this parameter displays a pop-up window in which you can
choose an appropriate baud rate.
Data Bits
This parameter determines the number of bits for the data going through this port.
Double-tapping on this option displays a pop-up window in which you can choose
either 7 or 8 data bits.
Parity
This parameter determines the type of parity checking used on the data going
through the tether port. Double-tapping on this option displays a pop-up window in
which you can choose the appropriate Parity.
Stop Bits
This parameter specifies the number of stop bits – 1, 1.5 or 2 – used for
asynchronous communication.
Enabled
This parameter must be set to on in order for the 8525 G2/8530 G2 to recognize the
device connected to the serial port.
Power
Double-tapping on this parameter displays and dialog box in which you can choose
from a number options – you can disable (turn off) this port, or you can assign 5V or
12V power to the port.
Baud
Double-tapping on this parameter displays a pop-up window in which you can
choose an appropriate baud rate.
Data Bits
This parameter determines the number of bits for the data going through this port.
Double-tapping on this option displays a pop-up window in which you can choose
either 7 or 8 data bits.
Parity
This parameter determines the type of parity checking used on the data going
through the tether port. Double-tapping on this option displays a pop-up window in
which you can choose the appropriate Parity.
Stop Bits
This parameter specifies the number of stop bits – 1, 1.5 or 2 – used for
asynchronous communication.
Contact
This field identifies the contact person for this managed node along with
information about how to get in touch with this person. The content of this
parameter is accessible through MIB-II’s sysContact object.
Location
This parameter is used to identify the physical location of this node (e.g., Warehouse
A: Pillar 32B). The content of this parameter is accessible through MIB-II’s
sysLocation object.
Enable SNMP
Enabling Enable SNMP allows the device to respond to SNMP queries and to send
Traps. After enabling this option and rebooting the device, the SNMP Agent will
automatically start up. To disable this feature, remove the check mark from the
check box.
Adding A Community
• Tap on Add to add a new ‘community’.
Name
The value assigned here is the name assigned by the network administrator to the set
of devices to which this managed node belongs.
Rights
This menu allows you to specify access – that is, ‘Read-Only’ or Read-Write’
Adding A Destination
To add a new destination:
• Tap on the Add button.
Changing A Destination
To change an existing trap destination:
• Highlight the destination you want to alter in the Trap Destination tab, and
then tap on the Change button.
A dialog box like the one displayed when you add a destination is displayed.
• Make the changes to the destination, and tap on OK to save the changes.
Adding A Host
To add a new host:
• Tap on the Add button.
• Type a new host IP address in the text box provided, and press [ENTER].
Changing A Host
To change an existing host IP address:
• Highlight the IP address you want to alter in the Permitted Hosts tab, and
then tap on the Change button.
A dialog box like the one displayed when you add a host is displayed.
• Make the necessary changes, and press [ENTER].
Important Safeguards
• To avoid possible injury, this device must be properly secured when in a
moving vehicle.
• Keep this device away from magnetic fields.
• Do not place the computer near a television or radio receiver.
• Do not disassemble your 8525 G2/8530 G2 computer—there are no user-
serviceable parts inside.
Bac 5.25 cm
k 2 in.
Quick Release
Fasteners
10 .25 i
.75 n.
4
cm
Note: The bolts used for all installations are SAE 1/4-20.
Post
Fro
nt
25.4 cm10.0 in. Tab
Guides
Ba
ck
13 in.
5
cm
Warning: Never operate the vehicle if the quick release fasteners are
not locked.
6.3.3.1 Preparation
This articulating mount can be installed in a wide variety of orientations (see
Figure 6.9 on page 176).
1. Select the best orientation for your specific application. Preferred orien-
tations maintain the centre of mass of the vehicle-mount assembly,
directly over the centre of the base (see Figure 6.4).
Figure 6.4
The tilt and rotation of the cradle can be adjusted by the operator. Keep in
mind that if the handscrew is loosened, the cradle can slip causing harm to
the operator or damage to equipment. Also note that under extreme vibra-
tion, the mount may slowly ‘settle’. Occasional readjustment and tightening
of the handscrew may be required. Psion Teklogix offers a tightening tool
(PN 9000594) which can be used to minimize settling (see Figure 6.5).
Figure 6.5
The platform on which you secure the vehicle-mount must be strong
enough to support 25 kg. Never attach the mount to a plastic dash or a
wooden platform without the appropriate backing plate and bracing. In
addition, you must provide operator access at the top, bottom and sides
of the unit.
6.3.3.2 Installation
Figure 6.6 on page 173provides a diagram and a legend to help you attach the
mounting bracket to the vehicle-mount and attach the RAM Vesa base.
1. Attaching the mounting bracket to the vehicle-mount: The kit pro-
vides four screws and washers that are used to secure the mounting
bracket to the vehicle-mount. Place screw (D) through washer (C) and
mounting bracket (B) and affix to the vehicle-mount (A). Torque to
23 in-lbs.
2. Attaching the RAM base to the mounting bracket: Apply Loctite
243 to screw (G) threads. (Note that Loctite is not supplied by Psion
Teklogix). Place screw (G) through washer (F), RAM Vesa base (E)
and affix to mounting bracket (B), securing screws and washers in all
four drilled holes. Torque to 26 in-lbs.
Figure 6.6
3. Securing the RAM Base to the local platform and attach RAM
Standard Arm: Use the supplied bolt hole pattern to drill the required
holes in the local platform. Hole diameters must not exceed 10mm
[13/32 inches]. Hardware (F, L, M and N) for securing RAM Bases (E
or J) to the local platform are recommended sizes. If replacement hard-
ware is required, it should be consistent with these diameters. All fas-
teners must use a suitable locking mechanism to ensure that they do not
loosen under shock and vibration.
• If you are assembling with RAM Vesa Base, see Figure 6.7 on
page 174.
• If you are assembling with RAM Circular Base, see Figure 6.8 on
page 175.
4. For the RAM Vesa Base, in four places, insert screw (M) through the
RAM Vesa Base (E), the local platform and the washer (F). Affix with
nut (N). Torque to 26 in-lbs. Secure RAM Standard Arm (H) by insert-
ing RAM Balls in to both ends of arm sockets.
5. For the RAM Circular Base, in four places, insert screw (L) through
the RAM Circular Base (J), the local platform and the washer (F). Affix
with nut (N). Torque to 26 in-lbs. Secure RAM Standard Arm (H) by
inserting RAM Balls in to both ends of sockets.
You can install two vesa plates or one each of a vesa plate and a RAM ball end to the
RAM mount.
With the keyboard RAM ball end or vesa plate(s) installed on the RAM mount:
• Attach the RAM mount to a standard cradle (PN 1008442) using the hard-
ware included with your kit.
• Attach the other end of the mount to almost any surface. The ball
design allows both ends of the RAM mount to be angled to suit the
operator's needs.
• Keep the cables away from control pedals and other moving parts that
may pull on the cables or interfere with the operation of the vehicle.
• Leave enough slack on the cables so that the computer can be removed
easily for maintenance.
Note: Make sure the cables run inside the roll cage of the vehicle.
Weight
Approximately 4.3 kg (9.5 lbs)
8530 G2 keyboard: approximately 0.91 kg (2 lbs)
Environmental
Standard Temperature Unit
Operating Temperature -20° C to 60° C (-4° F to 140° F)
Storage Temperature -35° C to 70° C (-31° F to 158° F)
Rain And Dust Resistance IEC 529, classification IP66.
Humidity 5% - 95% RH non-condensing
3 axis Vibration 1.5g RMS PSD (4 - 500 Hz)
3 axis Shock 30g 11ms saw tooth.
Freezer Unit
Temperature Range -30° C to 60° C (-22° F to 140° F)
Storage Temperature -35° C to 70° C (-31° F to 158° F)
Rain And Dust Resistance IEC 529, classification IP66.
Humidity 5% - 95% RH condensing
3 axis Vibration 1.5g RMS PSD (4 - 500 Hz)
3 axis Shock 30g 11ms saw tooth.
Approvals
Safety UL 60950-1, CAN/CSA-C22.2 NO. 60950-1 LVD
EN 60950-1
EMC FCC Part 15 Class B
- Complies with European R & TTE Directive.
* Note this product will carry the CE Mark.
Bluetooth Radio
Embedded (USB interface)
Bluetooth Version 1.2 compliant (features Adaptive Frequency
Hopping for better co-existence with 802.11 radio)
Chip Antenna 2dBi peak
Transmit Power -3dBm (0.5mW) minimum, +4dBm (2.5mW) max
Frequency Range 2.400 - 2.4835GHz
RX Sensitivity -80dBm max
(BER<=0.1%)
Data Rate 732.2kbps and 57.6kbps asymmetric,
433.9kbps symmetric
Tel: +33 4 42 90 88 09
Fax: +33 4 42 90 88 88
E-mail: [email protected]
* CAUTION: If enabled (software configurable), 5V or 12V power will appear on this line,
which may be the Ring Indicator line on some devices such as modems.
1/2 Amp Max.
System Requirements
• Windows 2000 or XP
• ActiveSync 3.5 or later
The install program:
• updates copies of the device installation scripts usbstor.inf and
wceusbsh.inf with Psion Teklogix-specific information, and
• sets up a USB connection between the PC and the 8525 G2/8530 G2.
Usually, this dialog is shown when more than one version of ActiveSync is
installed. You can either select the correct inf file for the USB Setup
program to work with, or you can cancel the installation, and uninstall the
extra copies of ActiveSync.
V
Variations (Code 128) 143
vehicle installation
cables 178
Verify 139
W
warm reset 36
Warm Reset (Shutdown menu) 73
warranty iv
WEP (Wired-Equivalent Privacy)
encryption 19
Wi-Fi Protected Access Pre-Shared Key
(network authentication) 19
Wi-Fi Protected Access-WPA (network
authentication) 19
Window Delay (Polling) 114
Windows® Start Menu See Start Menu 65
Windows CE
dialogue box 73
files, folders, & programs, working
with 62
Windows CE, navigating in 61
Windows Explorer 68
Windows Zero Config (WZC) 32
wireless connection setup 15
Wireless Information Tab 17
Wireless Properties tab 18
worldwide offices iv
WPA (network authentication) 19
WPA-PSK (network authentication) 19
WZC (Windows Zero Config) 32
1D internal scanner 54
802.1X authentication, enabling 20
802.11b radio, configuring 15
8525 G2
approvals 183
specifications 183
8530 G2