Professional Documents
Culture Documents
Emulation Optimizer Users Guide
Emulation Optimizer Users Guide
Emulation Optimizer
User’s Guide
Copyright
© 2006 by Metrologic Instruments, Inc. All rights reserved. No part of this work may be
reproduced,
transmitted, or stored in any form or by any means without prior written consent, except by
reviewer,
who may quote brief passages in a review, or provided for in the Copyright Act of 1976.
Products and brand names mentioned in this document are trademarks of their respective
companies.
i
Contents
Preface 1
Revision History ...........................................................................................................................................1
System Settings 13
2.1 Power On ..............................................................................................................................................14
2.2 Security .................................................................................................................................................15
2.3 Backlight...............................................................................................................................................15
2.4 Change Prompts and Messages.............................................................................................................16
2.5 Download Settings................................................................................................................................16
2.6 Key Click ..............................................................................................................................................17
2.7 Reset .....................................................................................................................................................17
Barcode Settings 19
3.1 Reader Settings .....................................................................................................................................19
3.1.1 Scan Mode ..............................................................................................................................19
3.1.2 Read Redundancy ...................................................................................................................22
3.1.3 Time Out.................................................................................................................................22
3.1.4 AIM Duration .........................................................................................................................23
3.1.5 Advanced Settings ..................................................................................................................23
3.1.6 Reset to Default ......................................................................................................................26
3.2 Barcode Parameters ..............................................................................................................................27
3.2.1 Supported Symbologies..........................................................................................................27
Emulation Settings 45
5.1 Language...............................................................................................................................................46
5.2 Screen Scroll & Control........................................................................................................................47
5.2.1 Navigator ................................................................................................................................47
5.2.2 Navigator Key ........................................................................................................................47
5.2.3 Horizontal Steps .....................................................................................................................48
5.2.4 Vertical Steps..........................................................................................................................49
5.2.5 Cursor Tracking......................................................................................................................49
5.2.6 Trim Spaces ............................................................................................................................50
5.2.7 Remove Empty Line...............................................................................................................50
5.2.8 Cursor Flashing ......................................................................................................................50
5.3 Message ................................................................................................................................................51
5.3.1 Line Number...........................................................................................................................51
5.3.2 Function Key ..........................................................................................................................51
5.3.3 Time Out.................................................................................................................................51
5.3.4 Exclude String ........................................................................................................................52
5.4 Font Size ...............................................................................................................................................53
5.5 Field Length If Exceed .........................................................................................................................53
5.6 Lock Screen ..........................................................................................................................................54
5.7 Function Key Mapping .........................................................................................................................55
5.8 Reset .....................................................................................................................................................55
Screen Settings 57
6.1 Screen Capture......................................................................................................................................58
6.1.1 Logon to Host from Emulation Optimizer..............................................................................58
6.1.2 Capture Host Screens..............................................................................................................58
6.2 Screen Reformat ...................................................................................................................................59
6.2.1 Host Screen.............................................................................................................................59
6.2.2 Terminal Screen......................................................................................................................60
6.2.3 Example..................................................................................................................................62
Contents iii
VT Emulation 65
Emulation Type ..........................................................................................................................................66
Font Size .....................................................................................................................................................66
Case Conversion .........................................................................................................................................67
Screen Scroll & Control..............................................................................................................................67
Navigator .........................................................................................................................................67
Navigator Key .................................................................................................................................68
Horizontal Steps ..............................................................................................................................68
Vertical Steps ..................................................................................................................................68
Cursor Tracking...............................................................................................................................68
Trim Spaces .....................................................................................................................................70
Disable Local Echo..........................................................................................................................70
Cursor Flashing ...............................................................................................................................70
Function Key Mapping ...............................................................................................................................70
Reset ...........................................................................................................................................................72
Special ESC Commands .............................................................................................................................72
Hardware Test 73
Buzzer Test .................................................................................................................................................73
Reader Test .................................................................................................................................................73
1
Preface
Seeing the need to combine wireless connectivity and telnet terminal emulation, we have
developed Emulation Optimizer to provide telnet terminal emulation on our wireless
portable data terminals, which are capable of 802.11b or Bluetooth PAN networking.
Emulation Optimizer-5250 allows users to connect to a host computer, i.e. an IBM AS/400
server that supports 5250, and make use of the applications running on it. Thus, a wireless
portable terminal works as an input device to a host computer; that is, the data collected or
input will be sent to the host computer. On the other hand, the terminal works as an output
device to the host, and therefore, the terminal screen displays data coming in from the host.
Based on the nature that the screen size of portable data terminals is smaller than that of an
actual terminal (of the host computer), Emulation Optimizer-5250 offers a number of unique
features for screen reformatting.
Revision History
Version Release Date Notes
2 CipherNet-5250 User Guide
Chapter 1 Preface 3
5
CHAPTER 1
In This Chapter
1.1 Getting Started ............................................................. 5
1.2 Menu Bar ..................................................................... 8
1.3 Toolbar......................................................................... 11
1.4 Settings Overview........................................................ 11
Click the Download Settings command from the Utilities Menu and proceed to
download.
4. After downloading, select 1. Telnet to start a fresh new telnet session. The terminal will
be associated with an AP and then connected to a host. You will be able to make use of
the host applications after login.
On the terminal screen, a number of status icons will be displayed on the bottom line.
Command To Do...
Connect Connect to a host.
Refer to section 6.1.1 Logon to Host from Emulation Optimizer.
Disconnect Disconnect with the host.
Refer to section 6.1.1 Logon to Host from Emulation Optimizer.
Start Capture Start the Capture task with a file (*.SCR) for saving host session screens.
Refer to section 6.1.2 Capture Host Screens.
Capture Capture the current host session screen.
Refer to section 6.1.2 Capture Host Screens.
Stop Capture Stop the Capture task.
Refer to section 6.1.2 Capture Host Screens.
Command To Do...
About Emulation Provide version information and license agreement of the software.
Optimizer
Chapter 1 Introducing Emulation Optimizer-5250 11
1.3 Toolbar
The toolbar allows quick access to commands that are available in the current stage.
Open
Save
Configure
Download Settings
Connect
Disconnect
Start Capture
Capture
Stop Capture
Select Product
CHAPTER 2
System Settings
You may configure system settings of the terminal.
Once the terminal application and configuration file (*.NET) has been downloaded to the
terminal, these will become the default settings. However, the following settings can be
changed directly on the terminal.
In This Chapter
2.1 Power On ..................................................................... 14
2.2 Security........................................................................ 15
2.3 Backlight...................................................................... 15
2.4 Change Prompts and Messages ................................... 16
2.5 Download Settings....................................................... 16
2.6 Key Click..................................................................... 17
2.7 Reset ............................................................................ 17
2.1 Power On
2.2 Security
For security concerns, you may specify a password and select the check box of one or more
tasks that need security checking. It can prevent unauthorized users from changing the
terminal application and settings.
By default, no password is required for the listed tasks: TCP/IP Settings, Emulation
Settings, Set Date & Time, and Utilities Menu.
2.3 Backlight
Baud Rate
Chapter 2 System Settings 17
2.7 Reset
Click this button to load the default settings.
CHAPTER 3
Barcode Settings
Barcode symbologies are application-dependent. You may enable or disable any of them,
and configure their parameters according to the requirements of a specific application.
In This Chapter
3.1 Reader Settings ............................................................ 19
3.2 Barcode Parameters ..................................................... 27
Continuous Mode
The reader is always scanning, but only one decoding is allowed for the same barcode. That is,
to read (i.e. scan and decode) the same barcode multiple times, the barcode has to be taken
away and replaced for new scanning.
Several modes have been developed based on this mode.
Test Mode
The reader is always scanning for testing purpose.
Comparing to the Continuous mode, it will decode repeatedly even with the same barcode
without re-approaching.
Chapter 3 Barcode Settings 21
Repeat Mode
This mode is most useful when the same barcode needs to be read many times. Press the scan
trigger again within one second after a successful reading, the same data will be re-transmitted
without actually reading the barcode. Such re-transmission can be activated as many times as
needed, as long as the time interval between each triggering does not exceed one second.
The reader is always scanning.
It will decode once for the same barcode and allow for re-transmission when you press the
trigger again within one second.
Momentary Mode
Hold down the scan trigger to start scanning.
The scanning continues until you release the trigger.
Alternate Mode
Press the scan trigger to start scanning.
The scanning continues until you press the trigger again.
Aiming Mode
This mode best applies when two barcodes are printed too close to each other. It is necessary to take
aim first to make sure the correct barcode will be scanned.
Press the scan trigger to aim at a barcode. Within one second, press the trigger again to decode
the barcode.
The scanning continues until one of the events happens:
(1) A barcode is read.
(2) The preset timeout expires.
Note: The system global variable AIMING_TIMEOUT can be used to change the default
one-second timeout interval for aiming. The unit for this variable is 5 ms.
Laser Mode
This mode is most often used on laser scanners.
Hold down the scan trigger to start scanning.
The scanning continues until one of the events happens:
(1) A barcode is read.
(2) The preset timeout expires.
(3) The trigger is released.
22 Emulation Optimizer-5250 User Guide
For example, if None is selected, it only requires one successful decoding to make the
reading valid. If Three times redundancy is selected, it needs to successfully decode three
more times to make the reading valid.
Note: The above-mentioned scan engines are capable of reading barcodes over a relatively
long distance, and therefore, aiming is helpful in picking out the target barcode
before decoding.
Input
Data
Note: You may use prefix and suffix code(s) to wrap the input data.
Chapter 3 Barcode Settings 25
When data is successfully read, the terminal will generate a beep sequence or even
vibrate.
Beep Sequence
A beep sequence refers to pairs of Beep Frequency(x) and Beep Duration(y).
You may specify pairs of “x y” other than the default “0E 05”.
Vibrator
It is disabled by default. Instead of 0, you may specify its duration in units of 100
milliseconds.
Note: You can run the buzzer test to play a beep sequence. Refer to Appendix I.
Scanner
Alarm
When error occurs, the terminal will generate a beep sequence or even vibrate.
Beep Sequence
A beep sequence refers to pairs of Beep Frequency(x) and Beep Duration(y).
You may specify pairs of “x y” other than the default “1E 07 00 05 1E 07”.
Vibrator
It is disabled by default. Instead of 0, you may specify its duration in units of 100
milliseconds.
Note: You can run the buzzer test to play a beep sequence. Refer to Appendix I.
26 Emulation Optimizer-5250 User Guide
Barcode Remarks
Code 39 Enabled by default
Italian Pharmacode
French Pharmacode
Industrial 25 Enabled by default
Interleaved 25 Enabled by default
Matrix 25
Codabar Enabled by default
MSI
Plessey
UPC-E Enabled by default
UPC-E Addon 2
UPC-E Addon 5
EAN-8 Enabled by default
EAN-8 Addon 2
EAN-8 Addon 5
EAN-13 & UPC-A Enabled by default
EAN-13 Addon 2
EAN-13 Addon 5
Telepen
RSS-14
RSS Limited
RSS Expanded
Code 93 Enabled by default
Code 128 Enabled by default
EAN-128 Enabled by default
Negative Barcode
28 Emulation Optimizer-5250 User Guide
Code 39
The scan engine is set to read Code 39 barcodes by default.
Advanced settings are provided as shown below.
Transmit Start/Stop
Select the check box so that the start/stop characters will be included in the data being transmitted.
Verify Checksum
Select the check box so that the terminal will perform checksum verification when decoding Code
39 barcodes. If the checksum is incorrect, the barcode will not be accepted.
Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.
Italian/French Pharmacode
Select the check box so that the scan engine can read Italian or French Pharmacode
barcodes.
Advanced settings are provided as shown below.
Checksum verification will be performed when decoding these barcodes because a
checksum character is always included. However, it is optional to transmit the
checksum character.
Chapter 3 Barcode Settings 29
Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.
Note: These barcodes share the Transmit Start/Stop setting with Code 39.
Industrial 25
The scan engine is set to read Industrial 25 barcodes by default.
Advanced settings are provided as shown below.
Start/Stop Selection
Specify a desired start/stop pattern. For example, flight tickets actually use an Industrial 25 barcode
but with Interleaved 25 start/stop pattern. In order to read this barcode, the start/stop pattern
selection of Industrial 25 should set to Interleaved 25.
Verify Checksum
Select the check box so that the terminal will perform checksum verification when decoding
Industrial 25 barcodes. If the checksum is incorrect, the barcode will not be accepted.
30 Emulation Optimizer-5250 User Guide
Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.
Length Qualification
Because of the weak structure of the 2 of 5 barcodes, it is possible to make a “short scan” error. To
prevent the “short scan” error, configure the “Length Qualification” settings to ensure that the
correct barcode is read by qualifying the allowable code length. The barcode can be qualified by
“Fixed Length” or “Max/Min Length”.
For “Fixed Length”, up to 2 fixed lengths can be specified.
For “Max/Min Length”, the maximum length and the minimum length must be specified. The
terminal will only accept those barcodes with lengths that fall between max/min lengths
specified.
Interleaved 25
The scan engine is set to read Interleaved 25 barcodes by default.
Advanced settings are provided as shown below. Refer to Industrial 25.
Chapter 3 Barcode Settings 31
Matrix 25
Select the check box so that the scan engine can read Matrix 25 barcodes.
Advanced settings are provided as shown below. Refer to Industrial 25.
Codabar
The scan engine is set to read Codabar barcodes by default.
Advanced settings are provided as shown below.
Start/Stop Character
Specify whether the start/stop characters will be included in the data being transmitted.
32 Emulation Optimizer-5250 User Guide
MSI
Select the check box so that the scan engine can read MSI barcodes.
Advanced settings are provided as shown below.
Checksum Verification
Specify the checksum calculation used to verify MSI barcodes. If the checksum is incorrect, the
barcode will not be accepted.
Checksum Transmission
Specify the way the check digits will be included in the data being transmitted.
Length Qualification
Because of the weak structure of MSI barcodes, it is possible to make a “short scan” error. To
prevent the “short scan” error, configure the “Length Qualification” settings to ensure that the
correct barcode is read by qualifying the allowable code length. The barcode can be qualified by
“Fixed Length” or “Max/Min Length”.
For “Fixed Length”, up to 2 fixed lengths can be specified.
For “Max/Min Length”, the maximum length and the minimum length must be specified. The
terminal will only accept MSI barcodes with lengths that fall between max/min lengths
specified.
Chapter 3 Barcode Settings 33
Plessey
Select the check box so that the scan engine can read Plessey barcodes.
Advanced settings are provided as shown below.
Convert to UK Plessey
Select the check box so that the terminal will change each occurrence of the character “A” to
character “X” in the barcodes.
Transmit Checksum
The checksum characters (two digits) will be included in the data being transmitted.
Cancel the check box if the checksum characters are not desired.
UPC-E
The scan engine is set to read UPC-E barcodes by default. (= No Addon) Options of
2-digit and 5-digit extensions are available. Select the check box so that it can read
Addon 2 and/or Addon 5.
Advanced settings are provided as shown below.
Convert to UPC-A
Select the check box so that the UPC-E reading will be expanded into UPC-A. It will then be treated
as a UPC-A barcode and processed according to the settings of UPC-A.
34 Emulation Optimizer-5250 User Guide
Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.
EAN-8
The scan engine is set to read EAN-8 barcodes by default. (= No Addon) Options of
2-digit and 5-digit extensions are available. Select the check box so that it can read
Addon 2 and/or Addon 5.
Advanced settings are provided as shown below.
Convert to EAN-13
Select the check box so that the EAN-8 reading will be expanded into EAN-13. It will then be
treated as an EAN-13 barcode and processed according to the settings of EAN-13.
Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.
Chapter 3 Barcode Settings 35
Telepen
Select the check box so that the scan engine can read Telepen barcodes.
Advanced settings are provided as shown below.
RSS-14/Limited/Expanded
Select the check box so that the scan engine can read RSS-14 barcodes.
Advanced settings are provided as shown below.
Transmit Code ID
The default Code ID (“]e0”) will be included in the data being transmitted.
Cancel the check box if the Code ID is not desired.
Transmit Application ID
The Application ID will be included in the data being transmitted.
Cancel the check box if the Application ID is not desired.
Code 93
The scan engine is set to read Code 93 barcodes by default.
No advanced settings are available.
Code 128
The scan engine is set to read Code 128 barcodes by default.
No advanced settings are available.
EAN-128
The scan engine is set to read EAN-128 barcodes by default.
Advanced settings are provided as shown below.
Transmit Code ID
Select the check box so that the default Code ID (“]c1”) will be included in the data being
transmitted.
CHAPTER 4
Once the terminal application and configuration file (*.NET) has been downloaded to the
terminal, these will become the default settings. However, the following settings can be
changed directly on the terminal.
In This Chapter
4.1 IP.................................................................................. 40
4.2 Security........................................................................ 41
4.3 Login............................................................................ 42
4.4 Reset ............................................................................ 44
4.1 IP
4.1.3 SSID
This refers to Service Set ID or Identifier, which serves to uniquely identify a group of
wireless network devices used in a given “Service Set”. For example, you need to specify
the same SSID here as is used for access points so that the terminal can associate to the
access points.
Chapter 4 Wireless LAN Settings 41
4.2 Security
Authentication and encryption help provide data protection on the network.
4.2.1 EAP
Select the check box to enable 802.1x authentication (using Extensible Authentication
Protocol). It requires user name and password so that the terminal can identify itself when
associating to an access point.
Settings Remarks
Identity Specify a user name.
Password Specify a password.
Options Remarks
Key Length Encryption type can be 64 bits (5 bytes) or 128 bits (13 bytes). You can also
choose to password protect it to ensure privacy. The password phrase is used to
generate a WEP key automatically. You have the option of either using a password
phrase or entering a WEP key manually.
Using 64-bit encryption, the password phrase can be 5 characters long.
You can enter up to 5 alphanumeric characters (0-9, a-z or A-Z) or up to 10
hexadecimal numbers (alphanumeric 0-9, A-F) for the WEP key.
For 128-bit encryption, the password phrase is 13 characters long.
You can enter up to 13 alphanumeric characters (0-9, a-z or A-Z) or up to 26
hexadecimal numbers (alphanumeric 0-9, A-F) for the WEP key.
42 CipherNet-5250 User Guide
Note: You must use the same settings as are configured for other devices on your wireless
network, e.g. access points.
Options Remarks
Open Using Open authentication, any wireless station can request authentication. The station
System that needs to authenticate with another wireless station sends an authentication
management frame that contains the identity of the sending station. The receiving
station or AP will grant any request for authentication.
Open authentication allows any device network access. If no encryption is enabled
on the network, any device that knows the SSID of the access point can gain access
to the network.
Shared Using Shared Key authentication, each wireless station is assumed to have received a
Key secret shared key over a secure channel that is independent from the 802.11 wireless
network communications channel.
Shared key authentication requires that the client configure a static WEP key. The
client access will be granted only if it passed a challenge based authentication.
Note: If Shared Key is selected, you need to specify an active WEP key.
4.3 Login
To successfully log on to a host, the following parameters must be specified correctly.
Note: After logging out properly, press [ESC] and [FN] (the function key) simultaneously
to disconnect with the host and return to the main menu.
4.3.4 Username/Password
Normally, the cursor will stay on the “Username” field waiting for input during a fresh new
telnet session. You may press the function keys (mapped to “NEXT”) or the arrow keys to
move the cursor to the “Password” input field. Refer to section 5.7 Function Key Mapping.
Settings Remarks
Username / Specify username/password for logging on to the host you wish to access.
Password
Key By default, the shortcut keys are disabled. That is, you need to enter
username/password manually.
Select the shortcut keys (FN+0 ~ FN+9) so that you can enter the text string for
Username/Password by two strokes. The selected key combinations will become
unavailable on the Function Key Mapping list. For example, if you select FN+0
for “Username” and FN+1 for “Password”, you will find them mapped to “Name
Key” and “Password Key” individually in the Function Key Mapping of the
Emulation tab.
Note: Use the shortcut keys to enter the text string for Username/Password by two strokes.
For this feature to work properly, Username/Password must be specified correctly.
44 CipherNet-5250 User Guide
If this feature is supported by the host, select the check box so that the terminal can be
allowed to automatically log on to the host.
For example, the terminal is set to automatically turn off after a specified period of idle
time. Refer to section 2.1 Power On. If the terminal is set to resume program, you may need
to prevent unauthorized users from accessing the host applications. Select the check box so
that Username/Password are required for resuming connection; otherwise, the system is
locked.
Note: You need to enter Username/Password manually; the associated shortcut keys are
not applicable.
4.4 Reset
Click this button to load the default settings.
CHAPTER 5
Emulation Settings
To successfully emulate an IBM 5250 terminal, emulation settings must be configured
correctly.
Once the terminal application and configuration file (*.NET) has been downloaded to the
terminal, these will become the default settings. However, the following settings can be
changed directly on the terminal.
In This Chapter
5.1 Language ..................................................................... 46
5.2 Screen Scroll & Control............................................... 47
5.3 Message ....................................................................... 51
5.4 Font Size ...................................................................... 53
5.5 Field Length If Exceed ................................................ 53
5.6 Lock Screen ................................................................. 54
5.7 Function Key Mapping ................................................ 55
5.8 Reset ............................................................................ 55
5.1 Language
By default, single-byte characters are used for the current language setting, i.e. English. If
you select any language other than English from the drop-down menu, you need to
download the associated font file in advance. Otherwise, the language settings will not take
effect.
1. Press [7]+[9]+[Power] to turn on the terminal and enter the System Menu.
2. On the terminal, select 6. Load Program.
Configure the download settings and then start downloading.
3. On your computer, run a download utility to download the font file required.
Refer to the Load Program operation in separate Reference Manual.
Note: The current versions of Emulation Optimizer programs do not support font size
12x12.
5.2.1 Navigator
A navigator can be a graphic icon or miniature window on the terminal screen, indicating
the relationship between the terminal screen and the host screen. A miniature cursor is
blinking to indicate the input position.
By default, a graphic icon is used for navigation.
Instead of the small icon, you may select “20*15” or “32*24” for a larger icon.
To disable this feature, select “None”.
Note: For the CPT-8061/8071 terminals, you will need to map two function keys to the
[Left] and [Right] keys first. (pending confirmation)
Chapter 5 Emulation Settings 49
Move Cursor
To move the cursor to a desired input field, press the function key that is
mapped to “Tab”.
To move the cursor to a desired input point, press the arrow keys [Up], [Down],
[Left], and [Right].
Note: For the OptimusSBT terminals, you will need to map two function keys to the [Left]
and [Right] keys first.
Select the check box to enable this feature. Take the following for example.
Note: This feature can only be enabled when there is no contradiction with 5250's field
definition.
5.3 Message
On an IBM 5250 terminal, a message line is reserved to display messages from the host.
Now we provide a more flexible way to do this: take down the message from the specified
line and display it in a dialog box on your terminal. Manipulating the dialog box by its
display duration or recalling it by pressing the associated function key, you will be able to
follow the messages more closely.
Note: The message dialog box appears on the terminal automatically whenever a message
from the host is detected.
52 CipherNet-5250 User Guide
Options To Do…
Reject Simply reject the input data.
Truncate Discard the part that exceeds the field length. The rest of data is accepted.
Split to Next Field The whole data is accepted. The part that exceeds the field length will be
displayed in next field.
54 CipherNet-5250 User Guide
Note: This feature is suitable for host applications when the desired information is always
displayed closely and fit to the terminal screen.
Chapter 5 Emulation Settings 55
Note: The function key mapping list varies by terminal model and its physical keypad.
5.8 Reset
Click this button to load the default settings.
CHAPTER 6
Screen Settings
The screen reformatting feature requires you to enable it by entering the activation key on
the terminal. Otherwise, the screen settings cannot take effect. If you have received an
activation key, proceed with the screen capture task.
Note: Metrologic will issue a unique activation key under the pay-by-use policy. Please
contact your local sales representative for licensing.
In This Chapter
6.1 Screen Capture............................................................. 58
6.2 Screen Reformat .......................................................... 59
6.3 Activation Key............................................................. 63
58 Emulation Optimizer-5250 User Guide
2. Click the Connect command from the Telnet Menu, or simply click on the toolbar.
3. Enter the IP address of the host that you wish to access via telnet.
Select the check box of Save Log in case you need to analyze the activities during a
telnet session. The information will be saved to a log file in the “Logs” folder
automatically created in the same directory where the Emulation Optimizer-5250
program is.
4. Click [OK] to start connecting to the host. The host system will prompt you to enter
username/password to login.
5. After login, you may start using the host application you need.
Note: Wireless LAN networking settings must be configured properly.
1. Click to start the capture task and save the host screens to a .SCR file.
(Status message: Ready to capture)
3. Click to stop the capture task when you have captured the screens necessary for the
terminal operation during a normal session.
Chapter 6 Screen Settings 59
4. Click the Configure command from the Utilities menu, and click the Screen tab.
Proceed to section 6.2 Screen Reformat.
Note: Try to capture all the necessary screens. If you cannot decide which screen to skip
now, capture it. You can always delete it later when the .SCR file is loaded for
screen reformatting.
Options Remarks
Load Host Session Click this button to import the screens from a .SCR file.
Screens The total of pages, or screens, is displayed next to the button.
Delete Current Page Click this button if the screen currently displayed is not desired for
reformatting.
The current number of page, or screen, is displayed next to the button.
(Row, Column)= Click on any part of the window. The current position will be displayed
accordingly. Drag the scroll box to view the hidden text.
Control buttons There are four control buttons for changing the page currently displayed.
First page
Previous page
Next page
Last page
Note: If you neither delete nor reformat a captured screen, there will be an empty screen
displayed during a telnet session.
Options Remarks
Reformat page to Specify the page format on the terminal screen.
This setting or its options in the drop-down menu depend on the font
size you use in section 5 Emulation Settings.
You can have different page format for different host screen.
Field (x,y) If the original message of a line does not prompt you to input selection,
i.e. no input fields, simple leave it as “nil”.
If the original message of a line prompts you to input selection, select
the matching field number and rephrase its message if necessary.
The total of fields on the host screen is reflected in the drop-down menu
of Field.
Terminal Screen Copy the necessary messages from the Host Screen window and rephrase
(Messages) them to fit to the terminal screen.
Line No. This indicates the line number when the message is displayed on the terminal
screen.
Control buttons If the total lines of page format setting exceed 8, the two buttons will become
available for moving forward or backward to display the rest lines.
Move forward
Move backward
Reset Click this button to load the default settings. Current host screens and
settings for reformatting will be cleared.
Note: If you neither delete nor reformat a captured screen, there will be an empty screen
displayed during a telnet session instead.
62 Emulation Optimizer-5250 User Guide
6.2.3 Example
You have loaded a total of 3 host screens, and currently work on the first page.
From the Host Screen window (left), you can see there are four message lines and one
empty line on this page. You may ignore the empty lines and simply skip them when
reformatting.
Copy the necessary messages for reformatting (right). You may need to rephrase them
so that they can best fit in to a terminal screen, which is decided by the page format of
the terminal screen.
Note: The coordinates of a Field can be ignored if the message is not requesting you to
input information.
Below shows the messages displayed on the host screen before reformatting, and those
rephrased to be displayed on the terminal screen after reformatting.
4 Display... 4 Program:
5 User... 5 Menu:
6 Password... 6 Library:
7 Program/procedure... 7 (empty)
8 Menu... 8 Welcome to CipherLab
9 Current library... 9
(before reformatting) (after reformatting)
Proceed to next host screen by clicking the [Next page] button on the bottom of Host
Screen window. If a host screen is not desired for reformatting, you must delete it by
clicking the [Delete Current Page] button; otherwise, it will become an empty screen
during a telnet session.
6.4 Reset
Click this button to load the default settings.
APPENDIX I
VT Emulation
For VT emulation, you must use the program Emulation Optimizer-VT. The 5250 emulation
program will not work. To successfully emulate a VT100/VT220 terminal, emulation
settings must be configured correctly.
Once the terminal application and configuration file (*.NET) has been downloaded to the
terminal, these will become the default settings. However, the following settings can be
changed directly on the terminal.
In This Chapter
5.1 Emulation Type ........................................................... 46
5.2 Font Size ...................................................................... 53
5.3 Case Conversion .......................................................... 51
5.4 Screen Scroll & Control............................................... 47
5.5 Function Key Mapping ................................................ 55
5.6 Reset ............................................................................ 55
Emulation Type
By default, the emulation type is ANSI / VT. No other option is allowed currently.
Font Size
The terminal screen size varies by terminal model. Display capability, as shown below,
depends on the screen size as well as the font you use. The font size setting affects the
default horizontal/vertical steps the cursor move at one time on the host screen.
Case Conversion
By default, there is no case conversion. Data coming in from the host will be displayed
in letter case matching to the original.
Options include “convert to lower/upper case”. For example, if you select “to lower
case”, data coming in from the host will be converted to lower case; and vice versa.
Navigator
A navigator can be a graphic icon or miniature window on the terminal screen, indicating
the relationship between the terminal screen and the host screen. A miniature cursor is
blinking to indicate the input position.
By default, a graphic icon is used for navigation.
Take the CPT-8500 series for example. The icon will appear on the bottom line of the
screen.
Instead of the small icon, you may select “20*15” or “32*24” for a larger icon.
Take the CPT-8500 series for example. The icon will take the top few lines of the
screen.
To disable this feature, select “None”.
68 CipherNet-5250
Navigator Key
The navigator key works as the toggle of navigator. When you press the navigator key on
the terminal, it will disable/enable the navigator by turns.
By default, the navigator key is disabled.
Select the navigator key (FN+0 ~ FN+9).
The selected combination will become unavailable on the Function Key Mapping list.
For example, if you select FN+6, you will find it mapped to “Navigator Key”.
Horizontal Steps
Specify how many horizontal steps the cursor will move at a time on the host screen when
you press the [Left] or [Right] key. This feature is associated with the font size.
Note: For the OptimusSBT terminals, you will need to map two function keys to the [Left]
and [Right] keys first. (pending confirmation)
Vertical Steps
Specify how many vertical steps the cursor will move at a time on the host screen when you
press the [Up] or [Down] key. This feature is associated with the font size.
Cursor Tracking
Note: This feature only works when a screen refresh incident occurs on the host.
Move Cursor
To move the cursor to a desired input field, press the function key that is
mapped to “Tab”.
To move the cursor to a desired input point, press the arrow keys [Up], [Down],
[Left], and [Right].
Note: For the CPT-8061/8071 terminals, you will need to map two function keys to the
[Left] and [Right] keys first. (pending confirmation)
70 CipherNet-5250
Trim Spaces
To make the most use of the terminal screen, unnecessary spaces may be discarded.
Select the check box to enable this feature. Take the following for example.
Cursor Flashing
Select the check box to have a flashing cursor.
FN+5 F5 ESC[M
FN+6 F6 ESC[17~
FN+7 F7 ESC[18~
FN+8 F8 ESC[19~
FN+9 F9 ESC[20~
Click an available function key. You may change its key combination or re-define key
code to meet a specific need.
The following function keys may be required during a telnet session.
Note: The function key mapping list varies by terminal model and its physical keys.
72 CipherNet-5250
Reset
Click this button to load the default settings.
APPENDIX II
Hardware Test
Buzzer Test
You can test the buzzer by playing a beep sequence.
1. Turn on the terminal. The main menu created by the preloaded CipherNet Runtime
appears.
2. On the terminal, select 2. Utilities > 1. TCP / IP Settings.
3. In the submenu, press [F10] to enter the buzzer test.
Take the CPT-8500 series for example: Press [FN] to enable the function key, and then
press [F10].
4. Enter a desired beep sequence, and then press [Enter] to play it.
Reader Test
You can test the barcode reader by scanning barcode labels.
1. Turn on the terminal. The main menu created by the preloaded CipherNet Runtime
appears.
2. On the terminal, select 2. Utilities > 3. Reader Test.
3. Start to scan barcode labels.
Along with the read data or error message on the terminal screen, there will be a beep to
indicate Good Read or Error.