Download as pdf or txt
Download as pdf or txt
You are on page 1of 79

METROLOGIC INSTRUMENTS, INC.

Emulation Optimizer
User’s Guide
Copyright
© 2006 by Metrologic Instruments, Inc. All rights reserved. No part of this work may be
reproduced,
transmitted, or stored in any form or by any means without prior written consent, except by
reviewer,
who may quote brief passages in a review, or provided for in the Copyright Act of 1976.
Products and brand names mentioned in this document are trademarks of their respective
companies.
i

Contents

Preface 1
Revision History ...........................................................................................................................................1

Introducing Emulation Optimizer-5250 5


1.1 Getting Started ........................................................................................................................................5
1.1.1 Download Emulation Optimizer Runtime ................................................................................6
1.1.2 Configure Terminal Settings.....................................................................................................6
1.1.3 Download Terminal Settings (*.NET)......................................................................................7
1.2 Menu Bar ................................................................................................................................................8
1.2.1 File Menu..................................................................................................................................9
1.2.2 Utilities Menu...........................................................................................................................9
1.2.3 Telnet Menu............................................................................................................................10
1.2.4 Help Menu ..............................................................................................................................10
1.3 Toolbar..................................................................................................................................................11
1.4 Settings Overview.................................................................................................................................11

System Settings 13
2.1 Power On ..............................................................................................................................................14
2.2 Security .................................................................................................................................................15
2.3 Backlight...............................................................................................................................................15
2.4 Change Prompts and Messages.............................................................................................................16
2.5 Download Settings................................................................................................................................16
2.6 Key Click ..............................................................................................................................................17
2.7 Reset .....................................................................................................................................................17

Barcode Settings 19
3.1 Reader Settings .....................................................................................................................................19
3.1.1 Scan Mode ..............................................................................................................................19
3.1.2 Read Redundancy ...................................................................................................................22
3.1.3 Time Out.................................................................................................................................22
3.1.4 AIM Duration .........................................................................................................................23
3.1.5 Advanced Settings ..................................................................................................................23
3.1.6 Reset to Default ......................................................................................................................26
3.2 Barcode Parameters ..............................................................................................................................27
3.2.1 Supported Symbologies..........................................................................................................27

Wireless LAN Settings 39


4.1 IP...........................................................................................................................................................40
4.1.1 Enable DHCP Server ..............................................................................................................40
4.1.2 Local Name ............................................................................................................................40
4.1.3 SSID .......................................................................................................................................40
ii Contents

4.2 Security .................................................................................................................................................41


4.2.1 EAP ........................................................................................................................................41
4.2.2 WEP Key ................................................................................................................................41
4.2.3 Open System/Shared Key .......................................................................................................42
4.3 Login.....................................................................................................................................................42
4.3.1 Host IP/Name .........................................................................................................................42
4.3.2 Telnet Port ..............................................................................................................................43
4.3.3 Keep Alive..............................................................................................................................43
4.3.4 Username/Password................................................................................................................43
4.3.5 Auto SignOn...........................................................................................................................44
4.3.6 Resume Protection..................................................................................................................44
4.4 Reset .....................................................................................................................................................44

Emulation Settings 45
5.1 Language...............................................................................................................................................46
5.2 Screen Scroll & Control........................................................................................................................47
5.2.1 Navigator ................................................................................................................................47
5.2.2 Navigator Key ........................................................................................................................47
5.2.3 Horizontal Steps .....................................................................................................................48
5.2.4 Vertical Steps..........................................................................................................................49
5.2.5 Cursor Tracking......................................................................................................................49
5.2.6 Trim Spaces ............................................................................................................................50
5.2.7 Remove Empty Line...............................................................................................................50
5.2.8 Cursor Flashing ......................................................................................................................50
5.3 Message ................................................................................................................................................51
5.3.1 Line Number...........................................................................................................................51
5.3.2 Function Key ..........................................................................................................................51
5.3.3 Time Out.................................................................................................................................51
5.3.4 Exclude String ........................................................................................................................52
5.4 Font Size ...............................................................................................................................................53
5.5 Field Length If Exceed .........................................................................................................................53
5.6 Lock Screen ..........................................................................................................................................54
5.7 Function Key Mapping .........................................................................................................................55
5.8 Reset .....................................................................................................................................................55

Screen Settings 57
6.1 Screen Capture......................................................................................................................................58
6.1.1 Logon to Host from Emulation Optimizer..............................................................................58
6.1.2 Capture Host Screens..............................................................................................................58
6.2 Screen Reformat ...................................................................................................................................59
6.2.1 Host Screen.............................................................................................................................59
6.2.2 Terminal Screen......................................................................................................................60
6.2.3 Example..................................................................................................................................62
Contents iii

6.3 Activation Key......................................................................................................................................63


6.4 Reset .....................................................................................................................................................64

VT Emulation 65
Emulation Type ..........................................................................................................................................66
Font Size .....................................................................................................................................................66
Case Conversion .........................................................................................................................................67
Screen Scroll & Control..............................................................................................................................67
Navigator .........................................................................................................................................67
Navigator Key .................................................................................................................................68
Horizontal Steps ..............................................................................................................................68
Vertical Steps ..................................................................................................................................68
Cursor Tracking...............................................................................................................................68
Trim Spaces .....................................................................................................................................70
Disable Local Echo..........................................................................................................................70
Cursor Flashing ...............................................................................................................................70
Function Key Mapping ...............................................................................................................................70
Reset ...........................................................................................................................................................72
Special ESC Commands .............................................................................................................................72

Hardware Test 73
Buzzer Test .................................................................................................................................................73
Reader Test .................................................................................................................................................73
1

Preface
Seeing the need to combine wireless connectivity and telnet terminal emulation, we have
developed Emulation Optimizer to provide telnet terminal emulation on our wireless
portable data terminals, which are capable of 802.11b or Bluetooth PAN networking.

Emulation Optimizer-5250 allows users to connect to a host computer, i.e. an IBM AS/400
server that supports 5250, and make use of the applications running on it. Thus, a wireless
portable terminal works as an input device to a host computer; that is, the data collected or
input will be sent to the host computer. On the other hand, the terminal works as an output
device to the host, and therefore, the terminal screen displays data coming in from the host.
Based on the nature that the screen size of portable data terminals is smaller than that of an
actual terminal (of the host computer), Emulation Optimizer-5250 offers a number of unique
features for screen reformatting.

This manual serves to provide comprehensive understanding of the Emulation


Optmizer-5250 software, and helps start a telnet session running host applications. We
recommend that you read the manual thoroughly before use and keep it at hand for quick
reference.

Note: Metrologic also supports ANSI/VT emulation via the


Emulation Optimizer-VT program and the OPx-VT.SHX runtime
files. Many of the settings are the same. See Appendix 2 for the
differences.
Thank you for choosing the Metrologic products!

Revision History
Version Release Date Notes
2 CipherNet-5250 User Guide
Chapter 1 Preface 3
5

CHAPTER 1

Introducing Emulation Optimizer-5250


Without spending time writing any program code, the Emulation Optimizer-5250 application
software is designed for users to develop custom telnet sessions based on the preloaded
Emulation Optimizer Runtime program. Emulation Optimizer-5250 will generate an
application and configuration file (*.NET), which needs to be downloaded to the terminal
before you start a telnet session. During a session, you may use the host application
programs and send the data collected by or input from the terminal.

The Emulation Optimizer Runtime program is model-specific.

Wireless Capability Models Emulation Optimizer Runtime


Bluetooth (PAN) OptimusSBT OPS-5250.SHX

IEEE 802.11b OptimusRW OPR-5250.SHX

In This Chapter
1.1 Getting Started ............................................................. 5
1.2 Menu Bar ..................................................................... 8
1.3 Toolbar......................................................................... 11
1.4 Settings Overview........................................................ 11

1.1 Getting Started


1. Run the terminal emulation program, Emulation Optimizer-5250, on your computer.
Click [OK] after reading the license agreement
2. Click the drop-down menu of [Select Product] on the toolbar, and select the terminal
you work on.
3. The default settings of the target terminal are displayed in the window. You may open
an existing configuration file and/or configure the current settings.
4. If you are using the terminal emulation for the first time, you need to download the
Emulation Optimizer Runtime program to the target terminal.
Then, download the current settings to the target terminal.
6 CipherNet-5250 User Guide

1.1.1 Download Emulation Optimizer Runtime


5. Press [7]+[9]+[Power] to turn on the terminal and enter the System Menu.
6. On the terminal, select 6. Load Program.
Configure the download settings and then start downloading.
7. On your computer, run the Emulation Optimizer-5250 program.
Click the Download Program command from the Utilities Menu to download Emulation
Optimizer Runtime: OPx-5250.SHX
Instead of using Emulation Optimizer-5250, you may use a download utility to download the
Emulation Optimizer Runtime program to your terminal. Refer to the Load Program
operation in separate Reference Manual.

1.1.2 Configure Terminal Settings


1. On your computer, run the Emulation Optimizer-5250 program.
2. Click the Configure command from the Utilities Menu to change the current settings for
the terminal.
3. Save these new settings as an application and configuration file (*.NET).
Once the *.NET file has been downloaded to the terminal, these new settings will take
effect immediately and become the defaults. However, it is possible to change the value
for most of the defaults directly on the terminal. Below lists a number of them available
in the main menu.
ƒ 2. Utilities > 1. TCP / IP Settings
Chapter 1 Introducing Emulation Optimizer-5250 7

ƒ 2. Utilities > 2. Emulation Settings

ƒ 2. Utilities > 4. Backlight


ƒ 2. Utilities > 7. Baud Rate
ƒ 2. Utilities > 8. Download

1.1.3 Download Terminal Settings (*.NET)


1. Turn on the terminal. The main menu created by the preloaded Emulation Optimizer
Runtime appears.
2. On the terminal, select 2. Utilities > 8.Download.
Configure the download settings and then start downloading the application and
configuration file (*.NET).
3. On your computer, run the Emulation Optimizer-5250 program.
8 CipherNet-5250 User Guide

Click the Download Settings command from the Utilities Menu and proceed to
download.

4. After downloading, select 1. Telnet to start a fresh new telnet session. The terminal will
be associated with an AP and then connected to a host. You will be able to make use of
the host applications after login.
On the terminal screen, a number of status icons will be displayed on the bottom line.

Status Icon Remarks


Navigator A graphic icon to indicate the relationship between the terminal screen and the
host screen. Refer to section 5.2.1 Navigator.
Lock Š A lock icon indicates that you have pressed a function key that is not
allowed. The message “Function key not allowed.” is displayed on the
terminal screen as well.
Š Press [ESC] to unlock it. The icon will become an empty box.
Antenna An antenna icon indicates the RF signal strength.
Battery A battery icon indicates the battery strength.

1.2 Menu Bar


The menu bar contains a number of menus that specify which task you want the system to
perform. Each menu contains a list of commands. Some of the options carry out commands
immediately, and others display a window so that you can enter additional information. If
an option is followed by [...], it will display a window. Otherwise, the command is carried
out immediately.
Chapter 1 Introducing Emulation Optimizer-5250 9

1.2.1 File Menu


Command To Do...
New Create a new terminal application and configuration file (*.NET).
Open To open an existing .NET file. File path needs to be specified.
Save To save the current settings.
Save As To save the current settings to a new .NET file.
Exit To close the Emulation Optimizer-5250 program.

1.2.2 Utilities Menu


Command To Do...
Configure Configure the current settings for terminal application and configuration.
Refer to the following sections:
2. System Settings
3. Barcode Settings
4. Wireless LAN Settings
5. Emulation Settings
6. Screen Settings
Download Settings Download the current terminal application and configuration file (*.NET) to
the target terminal.
Š A dialog box will pop up for configuring the download properties on
your computer.
Š RF refers to Bluetooth PAN or 802.11b that uses TCP/IP. If RF is
selected, it is not necessary to configure COM port and Baud Rate
settings.
Download Program Download the Emulation Optimizer Runtime program (*.SHX) to the target
terminal.
10 CipherNet-5250 User Guide

1.2.3 Telnet Menu

Command To Do...
Connect Connect to a host.
Refer to section 6.1.1 Logon to Host from Emulation Optimizer.
Disconnect Disconnect with the host.
Refer to section 6.1.1 Logon to Host from Emulation Optimizer.
Start Capture Start the Capture task with a file (*.SCR) for saving host session screens.
Refer to section 6.1.2 Capture Host Screens.
Capture Capture the current host session screen.
Refer to section 6.1.2 Capture Host Screens.
Stop Capture Stop the Capture task.
Refer to section 6.1.2 Capture Host Screens.

1.2.4 Help Menu

Command To Do...
About Emulation Provide version information and license agreement of the software.
Optimizer
Chapter 1 Introducing Emulation Optimizer-5250 11

1.3 Toolbar
The toolbar allows quick access to commands that are available in the current stage.

From left to right, they stand for the following commands:


Š New

Š Open

Š Save

Š Configure

Š Download Settings

Š Connect

Š Disconnect

Š Start Capture

Š Capture

Š Stop Capture

Š Select Product

1.4 Settings Overview


After selecting the target terminal on the toolbar, its associated information and default
settings for terminal application and configuration will be displayed. If you open an existing
.NET file or change the current settings, these will be updated accordingly.
13

CHAPTER 2

System Settings
You may configure system settings of the terminal.

Once the terminal application and configuration file (*.NET) has been downloaded to the
terminal, these will become the default settings. However, the following settings can be
changed directly on the terminal.

Change "Power On" settings on the terminal


Press [7] + [9] + [Power] System Menu > 2. Settings > 3. Auto Off
System Menu > 2. Settings > 4. Power On Options

Change "Backlight" settings on the terminal


Press [Power] 2. Utilities > 4. Backlight
Press [7] + [9] + [Power] System Menu > 2. Settings > 2. Backlight Period
14 CipherNet-5250 User Guide

Change "Download via" settings on the terminal


Press [Power] 2. Utilities > 8. Download

Change "Baud Rate" settings on the terminal


Press [Power] 2. Utilities > 7. Baud Rate

Change "Key Click" settings on the terminal


Press [7] + [9] + [Power] System Menu > 2. Settings > 5. Key Click

In This Chapter
2.1 Power On ..................................................................... 14
2.2 Security........................................................................ 15
2.3 Backlight...................................................................... 15
2.4 Change Prompts and Messages ................................... 16
2.5 Download Settings....................................................... 16
2.6 Key Click..................................................................... 17
2.7 Reset ............................................................................ 17

2.1 Power On

Power On Options Remarks


Resume Program By default, the terminal will start from the latest telnet session at the
time it is turned off.
Refer to section 4.3.6 Resume Protection.
Restart Program If selected, the terminal will start from the main menu of Emulation
Optimizer.
Auto Power off Š By default, the terminal will be automatically turned off when no
operation is taking place within 180 seconds.
Š Specify a value between 0 and 999.
Chapter 2 System Settings 15

2.2 Security
For security concerns, you may specify a password and select the check box of one or more
tasks that need security checking. It can prevent unauthorized users from changing the
terminal application and settings.

By default, no password is required for the listed tasks: TCP/IP Settings, Emulation
Settings, Set Date & Time, and Utilities Menu.

Security Options Remarks


TCP / IP Settings If selected and provided with a password, you will not be allowed to
enter 2.Utilities > 1.TCP/IP Settings without the password.
Emulation Settings If selected and provided with a password, you will not be allowed to
enter 2.Utilities > 2.Emulation Settings without the password.
Set Date & Time If selected and provided with a password, you will not be allowed to
enter 2.Utilities > 6.Set Date & Time without the password.
Utilities Menu If selected and provided with a password, you will not be allowed to
enter 2.Utilities without the password.

Note: A password can be up to 8 alphanumeric characters, case-sensitive.

2.3 Backlight

Backlight Options Remarks


Turn Off By default, the backlight for LCD and keypad of the terminal is turned
off.
Turn On upon power on If selected, the backlight will be automatically turned on as soon as the
terminal is turned on. You may specify a period of idle time so that it
can be automatically turned off to save power.
The default time-out is 20 seconds. Specify a value between 1 and 9, in
units of 10 seconds.
16 CipherNet-5250 User Guide

2.4 Change Prompts and Messages


For user-friendly operation, the terminal can be configured to display the system prompts
and messages in your local language.
1. Click the drop-down menu to select among the twelve groups of prompts and messages.
2. Re-define them within a maximum length of 15 or 20 characters; otherwise, they will be
automatically truncated by Emulation Optimizer.
3. Download the appropriate font file to the terminal so that it can display the prompts and
messages correctly.
Refer to the Load Program operation in separate Reference Manual.
Note: The current versions of Emulation Optimizer programs do not support font size
12x12.

2.5 Download Settings


Click the drop-down menu to select a desired communications setting for the terminal to
download terminal application and configuration file (*.NET). Refer to section 1.1.3
Download Terminal Settings.

Security Options Remarks


Download via RF refers to Bluetooth PAN or 802.11b that uses TCP/IP. If RF is
selected, it is not necessary to configure the Baud Rate settings.

Baud Rate
Chapter 2 System Settings 17

2.6 Key Click


By default, the terminal will produce an audible signal when you press any key on the
keypad, except for the [Scan] key. Cancel the check box if such feedback is not desired.

2.7 Reset
Click this button to load the default settings.

Note: Current system settings will be cleared.


19

CHAPTER 3

Barcode Settings
Barcode symbologies are application-dependent. You may enable or disable any of them,
and configure their parameters according to the requirements of a specific application.

In This Chapter
3.1 Reader Settings ............................................................ 19
3.2 Barcode Parameters ..................................................... 27

3.1 Reader Settings


These settings depend on the types of barcode reader.

3.1.1 Scan Mode


For any of the following 1D scan engine, you can select a desired scan mode.
ƒ Laser scan engine
Scan Mode ON OFF
Always Press Hold Press Release Press Barcode Time
trigger trigger trigger trigger trigger being out
once twice once read
Continuous mode 9
Test mode 9
Repeat mode 9
Momentary mode 9 9
Alternate mode 9 9
Aiming mode 9 9 9
Laser mode 9 9 9 9
Auto Off mode 9 9 9
Auto Power Off mode 9 9
20 Emulation Optimizer-5250 User Guide

Continuous Mode
Š The reader is always scanning, but only one decoding is allowed for the same barcode. That is,
to read (i.e. scan and decode) the same barcode multiple times, the barcode has to be taken
away and replaced for new scanning.
Š Several modes have been developed based on this mode.

Test Mode
Š The reader is always scanning for testing purpose.
Š Comparing to the Continuous mode, it will decode repeatedly even with the same barcode
without re-approaching.
Chapter 3 Barcode Settings 21

Repeat Mode
This mode is most useful when the same barcode needs to be read many times. Press the scan
trigger again within one second after a successful reading, the same data will be re-transmitted
without actually reading the barcode. Such re-transmission can be activated as many times as
needed, as long as the time interval between each triggering does not exceed one second.
Š The reader is always scanning.
Š It will decode once for the same barcode and allow for re-transmission when you press the
trigger again within one second.

Momentary Mode
Š Hold down the scan trigger to start scanning.
Š The scanning continues until you release the trigger.

Alternate Mode
Š Press the scan trigger to start scanning.
Š The scanning continues until you press the trigger again.

Aiming Mode
This mode best applies when two barcodes are printed too close to each other. It is necessary to take
aim first to make sure the correct barcode will be scanned.
Š Press the scan trigger to aim at a barcode. Within one second, press the trigger again to decode
the barcode.
Š The scanning continues until one of the events happens:
(1) A barcode is read.
(2) The preset timeout expires.

Note: The system global variable AIMING_TIMEOUT can be used to change the default
one-second timeout interval for aiming. The unit for this variable is 5 ms.

Laser Mode
This mode is most often used on laser scanners.
Š Hold down the scan trigger to start scanning.
Š The scanning continues until one of the events happens:
(1) A barcode is read.
(2) The preset timeout expires.
(3) The trigger is released.
22 Emulation Optimizer-5250 User Guide

Auto Off Mode


This is the default mode.
Š The reader will start to scan once you press the scan trigger.
Š The scanning continues until one of the events happens:
(1) A barcode is read.
(2) The preset timeout expires.

Auto Power Off Mode


Š The reader will start to scan once you press the scan trigger.
Š The scanning continues until one of the events happens:
(1) The preset timeout expires.
Š Comparing to the Auto Off mode, the reader continues to scan whenever there is a successful
reading of barcode because its timeout period re-counts.

3.1.2 Read Redundancy


For any of the following 1D scan engines, you can select a desired level of reading
(decoding) security.
ƒ CCD scan engine
ƒ Laser scan engine
The higher the reading security is, the slower the reading speed becomes. Comprise some
speed for getting more security when it is necessary.

For example, if None is selected, it only requires one successful decoding to make the
reading valid. If Three times redundancy is selected, it needs to successfully decode three
more times to make the reading valid.

3.1.3 Time Out


For any of the following 1D scan engines, you can specify a value for time-out when the
scan mode is Laser, Aiming, Auto Off, or Auto Power Off.
ƒ CCD scan engine
ƒ Laser scan engine
A time-out is specified in the range of 1~255, in units of second. The default time-out is
three seconds.
Chapter 3 Barcode Settings 23

3.1.4 AIM Duration


For any of the following 1D scan engines, you can specify a value for AIM duration. In that
case, you can take aim at a barcode when you press the scan trigger. The laser dot will stay
on as long as you hold the trigger. You may release the trigger when ready. Before the AIM
duration expires, press the trigger again to decode the target barcode.
ƒ Long Range Laser scan engine
ƒ Extra Long Range Laser scan engine
The AIM duration is specified in the range of 0~255, in units of second. It is set 0 by default,
that is, no aiming at all.

Note: The above-mentioned scan engines are capable of reading barcodes over a relatively
long distance, and therefore, aiming is helpful in picking out the target barcode
before decoding.

3.1.5 Advanced Settings


These settings are provided to enhance the barcode reading operation.
24 Emulation Optimizer-5250 User Guide

Input

Check Leading Code


The leading code refers to the digit in the start position of a barcode.
Select the check box to verify the barcode input. When the leading code is not matching,
the barcode will be rejected.
Š Examples:

Leading code Barcode scanned Transaction record


9 9876543210 9876543210
2 9876543210 (Error: code not matching)

Read Partial Code


By default, the system will return the whole barcode that has been decoded. Select the
check box so that the system will return partial barcode according to the settings of the
start position and maximum length.
Š Examples:

Start position Max. length Barcode scanned Transaction record


2 10 9876543210 876543210
2 3 9876543210 876
Š Read partial code + Check leading code:
Start Max. Leading Barcode scanned Transaction record
position length code
2 7 8 9876543210 8765432
2 7 9 987654321 (Error)

Data

Add Prefix Code


Select the check box to prefix a code to the input data. Specify one or more characters in
the editing box next to it.
For example, a dollar sign (“$”) can be added to the front of the input data for price.

Add Suffix Code


Select the check box to suffix a code to the input data. Specify one or more characters in
the editing box next to it.

Note: You may use prefix and suffix code(s) to wrap the input data.
Chapter 3 Barcode Settings 25

When data is successfully read, the terminal will generate a beep sequence or even
vibrate.

Beep Sequence
A beep sequence refers to pairs of Beep Frequency(x) and Beep Duration(y).
You may specify pairs of “x y” other than the default “0E 05”.

Vibrator
It is disabled by default. Instead of 0, you may specify its duration in units of 100
milliseconds.

Note: You can run the buzzer test to play a beep sequence. Refer to Appendix I.

Scanner

Always Enable After Login


By default, the barcode reader is enabled after login.

Controlled By 5250 Command


If selected, the barcode reader is disabled after login. You must send the 5250 command to
enable it.

Alarm
When error occurs, the terminal will generate a beep sequence or even vibrate.

Beep Sequence
A beep sequence refers to pairs of Beep Frequency(x) and Beep Duration(y).
You may specify pairs of “x y” other than the default “1E 07 00 05 1E 07”.

Vibrator
It is disabled by default. Instead of 0, you may specify its duration in units of 100
milliseconds.

Note: You can run the buzzer test to play a beep sequence. Refer to Appendix I.
26 Emulation Optimizer-5250 User Guide

3.1.6 Reset to Default


Click this button to load the default settings. This applies to the following:
ƒ section 3.1.2 RFID Settings
ƒ section 3.2 Reader Settings
ƒ section 3.3 Barcode Parameters
Note: Current settings will be cleared.
Chapter 3 Barcode Settings 27

3.2 Barcode Parameters

3.2.1 Supported Symbologies


Barcodes listed in the table below are supported:

Barcode Remarks
Code 39 Enabled by default
Italian Pharmacode
French Pharmacode
Industrial 25 Enabled by default
Interleaved 25 Enabled by default
Matrix 25
Codabar Enabled by default
MSI
Plessey
UPC-E Enabled by default
UPC-E Addon 2
UPC-E Addon 5
EAN-8 Enabled by default
EAN-8 Addon 2
EAN-8 Addon 5
EAN-13 & UPC-A Enabled by default
EAN-13 Addon 2
EAN-13 Addon 5
Telepen
RSS-14
RSS Limited
RSS Expanded
Code 93 Enabled by default
Code 128 Enabled by default
EAN-128 Enabled by default
Negative Barcode
28 Emulation Optimizer-5250 User Guide

Code 39
ƒ The scan engine is set to read Code 39 barcodes by default.
ƒ Advanced settings are provided as shown below.

Transmit Start/Stop
Select the check box so that the start/stop characters will be included in the data being transmitted.

Verify Checksum
Select the check box so that the terminal will perform checksum verification when decoding Code
39 barcodes. If the checksum is incorrect, the barcode will not be accepted.

Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.

Code 39 Full ASCII


Select the check box so that the terminal will support Code 39 Full ASCII that includes all the
alphanumeric and special characters.

Italian/French Pharmacode
ƒ Select the check box so that the scan engine can read Italian or French Pharmacode
barcodes.
ƒ Advanced settings are provided as shown below.
Checksum verification will be performed when decoding these barcodes because a
checksum character is always included. However, it is optional to transmit the
checksum character.
Chapter 3 Barcode Settings 29

Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.

Note: These barcodes share the Transmit Start/Stop setting with Code 39.

Industrial 25
ƒ The scan engine is set to read Industrial 25 barcodes by default.
ƒ Advanced settings are provided as shown below.

Start/Stop Selection
Specify a desired start/stop pattern. For example, flight tickets actually use an Industrial 25 barcode
but with Interleaved 25 start/stop pattern. In order to read this barcode, the start/stop pattern
selection of Industrial 25 should set to Interleaved 25.

Verify Checksum
Select the check box so that the terminal will perform checksum verification when decoding
Industrial 25 barcodes. If the checksum is incorrect, the barcode will not be accepted.
30 Emulation Optimizer-5250 User Guide

Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.

Length Qualification
Because of the weak structure of the 2 of 5 barcodes, it is possible to make a “short scan” error. To
prevent the “short scan” error, configure the “Length Qualification” settings to ensure that the
correct barcode is read by qualifying the allowable code length. The barcode can be qualified by
“Fixed Length” or “Max/Min Length”.
Š For “Fixed Length”, up to 2 fixed lengths can be specified.
Š For “Max/Min Length”, the maximum length and the minimum length must be specified. The
terminal will only accept those barcodes with lengths that fall between max/min lengths
specified.

Interleaved 25
ƒ The scan engine is set to read Interleaved 25 barcodes by default.
ƒ Advanced settings are provided as shown below. Refer to Industrial 25.
Chapter 3 Barcode Settings 31

Matrix 25
ƒ Select the check box so that the scan engine can read Matrix 25 barcodes.
ƒ Advanced settings are provided as shown below. Refer to Industrial 25.

Codabar
ƒ The scan engine is set to read Codabar barcodes by default.
ƒ Advanced settings are provided as shown below.

Start/Stop Character
Specify whether the start/stop characters will be included in the data being transmitted.
32 Emulation Optimizer-5250 User Guide

MSI
ƒ Select the check box so that the scan engine can read MSI barcodes.
ƒ Advanced settings are provided as shown below.

Checksum Verification
Specify the checksum calculation used to verify MSI barcodes. If the checksum is incorrect, the
barcode will not be accepted.

Checksum Transmission
Specify the way the check digits will be included in the data being transmitted.

Length Qualification
Because of the weak structure of MSI barcodes, it is possible to make a “short scan” error. To
prevent the “short scan” error, configure the “Length Qualification” settings to ensure that the
correct barcode is read by qualifying the allowable code length. The barcode can be qualified by
“Fixed Length” or “Max/Min Length”.
Š For “Fixed Length”, up to 2 fixed lengths can be specified.
Š For “Max/Min Length”, the maximum length and the minimum length must be specified. The
terminal will only accept MSI barcodes with lengths that fall between max/min lengths
specified.
Chapter 3 Barcode Settings 33

Plessey
ƒ Select the check box so that the scan engine can read Plessey barcodes.
ƒ Advanced settings are provided as shown below.

Convert to UK Plessey
Select the check box so that the terminal will change each occurrence of the character “A” to
character “X” in the barcodes.

Transmit Checksum
The checksum characters (two digits) will be included in the data being transmitted.
Cancel the check box if the checksum characters are not desired.

UPC-E
ƒ The scan engine is set to read UPC-E barcodes by default. (= No Addon) Options of
2-digit and 5-digit extensions are available. Select the check box so that it can read
Addon 2 and/or Addon 5.
ƒ Advanced settings are provided as shown below.

Convert to UPC-A
Select the check box so that the UPC-E reading will be expanded into UPC-A. It will then be treated
as a UPC-A barcode and processed according to the settings of UPC-A.
34 Emulation Optimizer-5250 User Guide

Transmit System Number


Select the check box so that the system number will be included in the data being transmitted.

Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.

EAN-8
ƒ The scan engine is set to read EAN-8 barcodes by default. (= No Addon) Options of
2-digit and 5-digit extensions are available. Select the check box so that it can read
Addon 2 and/or Addon 5.
ƒ Advanced settings are provided as shown below.

Convert to EAN-13
Select the check box so that the EAN-8 reading will be expanded into EAN-13. It will then be
treated as an EAN-13 barcode and processed according to the settings of EAN-13.

Transmit Checksum
The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.
Chapter 3 Barcode Settings 35

EAN-13 & UPC-A


ƒ The scan engine is set to read EAN-13 and UPC-A barcodes by default. (= No Addon)
Options of 2-digit and 5-digit extensions for both barcodes are available. Select the
check box so that it can read Addon 2 and/or Addon 5.
ƒ Advanced settings are provided as shown below.

ISBN Conversion (Convert EAN-13 to ISBN)


Select the check box so that the reading of EAN-13 barcodes that starts with 978 and 979 will be
converted ISBN.

ISSN Conversion (Convert EAN-13 to ISSN)


Select the check box so that the reading of EAN-13 barcodes that starts with 977 will be converted
ISSN.

Transmit Checksum (EAN-13)


The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.

Transmit UPC-A System Number


The system number will be included in the data being transmitted.
Cancel the check box if the system number is not desired.

Transmit UPC-A Checksum


The UPC-A checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.
36 Emulation Optimizer-5250 User Guide

Convert UPC-A to EAN-13


The UPC-A reading will be expanded into EAN-13. It will then be treated as an EAN-13 barcode
and processed according to the settings of EAN-13.
Cancel the check box if the conversion is not desired.

Telepen
ƒ Select the check box so that the scan engine can read Telepen barcodes.
ƒ Advanced settings are provided as shown below.

Telepen Full ASCII or Numeric


Specify whether Telepen Full ASCII or Telepen Numeric is supported.
Chapter 3 Barcode Settings 37

RSS-14/Limited/Expanded
ƒ Select the check box so that the scan engine can read RSS-14 barcodes.
ƒ Advanced settings are provided as shown below.

Transmit Code ID
The default Code ID (“]e0”) will be included in the data being transmitted.
Cancel the check box if the Code ID is not desired.

Transmit Application ID
The Application ID will be included in the data being transmitted.
Cancel the check box if the Application ID is not desired.

Transmit Check Digit


The checksum character will be included in the data being transmitted.
Cancel the check box if the checksum character is not desired.
38 Emulation Optimizer-5250 User Guide

Code 93
ƒ The scan engine is set to read Code 93 barcodes by default.
ƒ No advanced settings are available.

Code 128
ƒ The scan engine is set to read Code 128 barcodes by default.
ƒ No advanced settings are available.

EAN-128
ƒ The scan engine is set to read EAN-128 barcodes by default.
ƒ Advanced settings are provided as shown below.

Transmit Code ID
Select the check box so that the default Code ID (“]c1”) will be included in the data being
transmitted.

Note: Code 128 must be enabled first!


39

CHAPTER 4

Wireless LAN Settings


To establish a telnet connection to a host, WLAN networking settings must be configured
correctly.

Once the terminal application and configuration file (*.NET) has been downloaded to the
terminal, these will become the default settings. However, the following settings can be
changed directly on the terminal.

Change "IP" settings on the terminal


Press [Power] 2.Utilities > 1. TCP/IP Settings
Press [7] + [9] + [Power] System Menu > 8. Next Page > 2. 802.11b Menu > 2. Network Setting
System Menu > 8. Next Page > 2. 802.11b Menu > 3. WLAN Setting

Change "Security" settings on the terminal


Press [7] + [9] + [Power] System Menu > 8. Next Page > 2. 802.11b Menu > 4. Security
40 CipherNet-5250 User Guide

Change "Login" settings on the terminal


Press [Power] 2.Utilities > 1. TCP/IP Settings
2.Utilities > 2. Emulation Settings

In This Chapter
4.1 IP.................................................................................. 40
4.2 Security........................................................................ 41
4.3 Login............................................................................ 42
4.4 Reset ............................................................................ 44

4.1 IP

4.1.1 Enable DHCP Server


By default, DHCP server is enabled and all the settings can be obtained from it.

If DHCP server is disabled, you will need to specify the following:


ƒ Subnet Mask
ƒ Gateway
ƒ DNS Server
ƒ Terminal IP

4.1.2 Local Name


You may enter a name for identifying the terminal.

4.1.3 SSID
This refers to Service Set ID or Identifier, which serves to uniquely identify a group of
wireless network devices used in a given “Service Set”. For example, you need to specify
the same SSID here as is used for access points so that the terminal can associate to the
access points.
Chapter 4 Wireless LAN Settings 41

Note: SSID can be made up of 32 characters maximum.

4.2 Security
Authentication and encryption help provide data protection on the network.

4.2.1 EAP
Select the check box to enable 802.1x authentication (using Extensible Authentication
Protocol). It requires user name and password so that the terminal can identify itself when
associating to an access point.

Settings Remarks
Identity Specify a user name.
Password Specify a password.

Note: Identity or password can be made up of 32 characters maximum.???

4.2.2 WEP Key


Select the check box to implement Wired Equivalent Privacy or Wireless Encryption
Protocol (WEP) for data encryption.

Options Remarks
Key Length Encryption type can be 64 bits (5 bytes) or 128 bits (13 bytes). You can also
choose to password protect it to ensure privacy. The password phrase is used to
generate a WEP key automatically. You have the option of either using a password
phrase or entering a WEP key manually.
Š Using 64-bit encryption, the password phrase can be 5 characters long.
You can enter up to 5 alphanumeric characters (0-9, a-z or A-Z) or up to 10
hexadecimal numbers (alphanumeric 0-9, A-F) for the WEP key.
Š For 128-bit encryption, the password phrase is 13 characters long.
You can enter up to 13 alphanumeric characters (0-9, a-z or A-Z) or up to 26
hexadecimal numbers (alphanumeric 0-9, A-F) for the WEP key.
42 CipherNet-5250 User Guide

Key 1 ~ 4 Key index number. Up to four keys can be configured.


Active Only one key (the active one) can be used at a time.

Note: You must use the same settings as are configured for other devices on your wireless
network, e.g. access points.

4.2.3 Open System/Shared Key


Two types of network authentication methods are supported: Open System and Shared Key.

Options Remarks
Open Using Open authentication, any wireless station can request authentication. The station
System that needs to authenticate with another wireless station sends an authentication
management frame that contains the identity of the sending station. The receiving
station or AP will grant any request for authentication.
Š Open authentication allows any device network access. If no encryption is enabled
on the network, any device that knows the SSID of the access point can gain access
to the network.
Shared Using Shared Key authentication, each wireless station is assumed to have received a
Key secret shared key over a secure channel that is independent from the 802.11 wireless
network communications channel.
Š Shared key authentication requires that the client configure a static WEP key. The
client access will be granted only if it passed a challenge based authentication.

Note: If Shared Key is selected, you need to specify an active WEP key.

4.3 Login
To successfully log on to a host, the following parameters must be specified correctly.

Note: After logging out properly, press [ESC] and [FN] (the function key) simultaneously
to disconnect with the host and return to the main menu.

4.3.1 Host IP/Name


Specify the IP address or name of the host that you wish to access via telnet.
Chapter 4 Wireless LAN Settings 43

4.3.2 Telnet Port


Specify the telnet port number. Port 23 is assigned by default.

4.3.3 Keep Alive


During a normal telnet session, a host will send a checking packet to the terminal on a
regular basis to maintain the connection. However, the host you access might not be
configured to keep the session alive. In that case, you can have the terminal set to
automatically send a checking packet to the host at intervals.
ƒ By default, the value is set 0; that is, this feature is disabled.
ƒ Specify the interval in the range of 0~255, in units of minute.

4.3.4 Username/Password
Normally, the cursor will stay on the “Username” field waiting for input during a fresh new
telnet session. You may press the function keys (mapped to “NEXT”) or the arrow keys to
move the cursor to the “Password” input field. Refer to section 5.7 Function Key Mapping.

Settings Remarks
Username / Specify username/password for logging on to the host you wish to access.
Password
Key Š By default, the shortcut keys are disabled. That is, you need to enter
username/password manually.
Š Select the shortcut keys (FN+0 ~ FN+9) so that you can enter the text string for
Username/Password by two strokes. The selected key combinations will become
unavailable on the Function Key Mapping list. For example, if you select FN+0
for “Username” and FN+1 for “Password”, you will find them mapped to “Name
Key” and “Password Key” individually in the Function Key Mapping of the
Emulation tab.

Note: Use the shortcut keys to enter the text string for Username/Password by two strokes.
For this feature to work properly, Username/Password must be specified correctly.
44 CipherNet-5250 User Guide

4.3.5 Auto SignOn


By default, this feature is disabled. The host will request Username/Password every time
the terminal attempts to log on.

If this feature is supported by the host, select the check box so that the terminal can be
allowed to automatically log on to the host.

4.3.6 Resume Protection


A telnet session may be interrupted unexpectedly or intentionally.

For example, the terminal is set to automatically turn off after a specified period of idle
time. Refer to section 2.1 Power On. If the terminal is set to resume program, you may need
to prevent unauthorized users from accessing the host applications. Select the check box so
that Username/Password are required for resuming connection; otherwise, the system is
locked.

Note: You need to enter Username/Password manually; the associated shortcut keys are
not applicable.

4.4 Reset
Click this button to load the default settings.

Note: Current settings will be cleared.


45

CHAPTER 5

Emulation Settings
To successfully emulate an IBM 5250 terminal, emulation settings must be configured
correctly.

Once the terminal application and configuration file (*.NET) has been downloaded to the
terminal, these will become the default settings. However, the following settings can be
changed directly on the terminal.

Change "Emulation Type" on the terminal


Press [Power] 2.Utilities > 2. Emulation Settings

Change "Screen Scroll & Control" settings on the terminal


Press [Power] 2.Utilities > 2. Emulation Settings
46 CipherNet-5250 User Guide

In This Chapter
5.1 Language ..................................................................... 46
5.2 Screen Scroll & Control............................................... 47
5.3 Message ....................................................................... 51
5.4 Font Size ...................................................................... 53
5.5 Field Length If Exceed ................................................ 53
5.6 Lock Screen ................................................................. 54
5.7 Function Key Mapping ................................................ 55
5.8 Reset ............................................................................ 55

5.1 Language
By default, single-byte characters are used for the current language setting, i.e. English. If
you select any language other than English from the drop-down menu, you need to
download the associated font file in advance. Otherwise, the language settings will not take
effect.
1. Press [7]+[9]+[Power] to turn on the terminal and enter the System Menu.
2. On the terminal, select 6. Load Program.
Configure the download settings and then start downloading.
3. On your computer, run a download utility to download the font file required.
Refer to the Load Program operation in separate Reference Manual.

Language Settings Font File Required Font Size


Single Byte Character Single-Byte N/A (default system font) Depends on Font Size setting:
(English) Small or Large
Traditional Chinese Double-Byte TC font file font size 16x16
Simplified Chinese Double-Byte SC font file font size 16x16
Korean Double-Byte KR font file font size 16x16
Japanese Double-Byte JP font file font size 16x16
Greek Single-Byte Multi-language font file Depends on Font Size setting:
Small or Large
French Single-Byte Multi-language font file Depends on Font Size setting:
Small or Large
Chapter 5 Emulation Settings 47

Note: The current versions of Emulation Optimizer programs do not support font size
12x12.

5.2 Screen Scroll & Control


Limited to the actual screen size, the terminal can only display a portion of the host screen.
The following features help ease working from the terminal screen.

5.2.1 Navigator
A navigator can be a graphic icon or miniature window on the terminal screen, indicating
the relationship between the terminal screen and the host screen. A miniature cursor is
blinking to indicate the input position.
ƒ By default, a graphic icon is used for navigation.
ƒ Instead of the small icon, you may select “20*15” or “32*24” for a larger icon.
ƒ To disable this feature, select “None”.

5.2.2 Navigator Key


The navigator key works as the toggle of navigator. When you press the navigator key on
the terminal, it will disable/enable the navigator by turns.
ƒ By default, the navigator key is disabled.
ƒ Select the navigator key (FN+0 ~ FN+9).
The selected combination will become unavailable on the Function Key Mapping list.
For example, if you select FN+6, you will find it mapped to “Navigator Key”.
48 CipherNet-5250 User Guide

5.2.3 Horizontal Steps


Specify how many horizontal steps the cursor will move at a time on the host screen when
you press the [Left] or [Right] key. This feature is associated with the font size.

Note: For the CPT-8061/8071 terminals, you will need to map two function keys to the
[Left] and [Right] keys first. (pending confirmation)
Chapter 5 Emulation Settings 49

5.2.4 Vertical Steps


Specify how many vertical steps the cursor will move at a time on the host screen when you
press the [Up] or [Down] key. This feature is associated with the font size.

5.2.5 Cursor Tracking


ƒ This feature is enabled by default. The terminal screen will automatically adjust itself so
that the cursor will always be visible on the screen. Thus, every screen received from
the host will be displayed with the cursor visible to indicate the first input field.
Note: This feature only works when a screen refresh incident occurs on the host.
ƒ Cancel the check box if this feature is not desired. Refer to section 5.6 Lock Screen.
Note: When the Lock Screen feature is enabled, the Cursor Tracking feature will be
disabled automatically; and vice versa.

Adjust Terminal Screen


To view the hidden information or locate the cursor, you need to adjust the terminal
screen manually. Press one set of the following keys simultaneously:
ƒ [FN] + [Left]
ƒ [FN] + [Right]
ƒ [FN] + [Up]
ƒ [FN] + [Down]
When the Cursor Tracking feature is enabled, there will be a warning beep to
indicate that the terminal screen has reached the boundaries of the host screen.
When the Lock Screen feature is enabled, there will be a warning beep to indicate
that for the first time the terminal screen has reached the boundaries of the host
screen. If you persist, the terminal screen will be re-positioned to (X,Y).
50 CipherNet-5250 User Guide

Move Cursor
ƒ To move the cursor to a desired input field, press the function key that is
mapped to “Tab”.
ƒ To move the cursor to a desired input point, press the arrow keys [Up], [Down],
[Left], and [Right].
Note: For the OptimusSBT terminals, you will need to map two function keys to the [Left]
and [Right] keys first.

5.2.6 Trim Spaces


To make the most use of the terminal screen, unnecessary spaces may be discarded.

Select the check box to enable this feature. Take the following for example.

Original line: -> 1. Set up<-

Trimmed ->1. Set up<-

Note: Spaces between characters will not be discarded.

5.2.7 Remove Empty Line


Select the check box to automatically ignore empty lines on the host screen.

Note: This feature can only be enabled when there is no contradiction with 5250's field
definition.

5.2.8 Cursor Flashing


Select the check box to have a flashing cursor.
Chapter 5 Emulation Settings 51

5.3 Message
On an IBM 5250 terminal, a message line is reserved to display messages from the host.
Now we provide a more flexible way to do this: take down the message from the specified
line and display it in a dialog box on your terminal. Manipulating the dialog box by its
display duration or recalling it by pressing the associated function key, you will be able to
follow the messages more closely.

5.3.1 Line Number


Specify which line on the host screen is the message line so that the terminal can grab a
message to a dialog box. The default is line 24.

5.3.2 Function Key


This function key is used to recall the most recent dialog box after it has been closed due to
a specified time-out.
ƒ By default, the message key is disabled.
ƒ Select the message key (FN+0 ~ FN+9).
The selected combination will become unavailable on the Function Key Mapping list.
For example, if you select FN+7, you will find it mapped to “Message Key”.

5.3.3 Time Out


Specify a period of time before the dialog box is closed, in units of second.

Note: The message dialog box appears on the terminal automatically whenever a message
from the host is detected.
52 CipherNet-5250 User Guide

5.3.4 Exclude String


To skip unnecessary messages, you may specify a text string so that any message containing
this string will be ignored. That is, no dialog box will appear to display such message.
Chapter 5 Emulation Settings 53

5.4 Font Size


The terminal screen size varies by terminal model. Display capability, as shown below,
depends on the screen size as well as the font you use. The font size setting affects the
default horizontal/vertical steps the cursor move at one time on the host screen.

Model Number Small (Font 6x8) Large (Font 8x16)


OptimusSBT 16 characters by 8 lines 12 characters by 4 lines
OptimusRW 20 characters by 8 lines 15 characters by 4 lines
ƒ By default, small font (6x8) is applied. Data coming in from the host will be displayed
accordingly.
ƒ You may select to use large font (8x16).
This setting affects single-byte languages as well as the alphanumeric characters for
double-byte languages. Currently, the actual font size for double-byte languages is 16x16.
Refer to section 5.1 Language.

5.5 Field Length If Exceed


In 5250's field definition, the length of data field is pre-defined. If the input data is longer
than the specified field length, you may decide how to deal with it by selecting one of the
options below.

Options To Do…
Reject Simply reject the input data.
Truncate Discard the part that exceeds the field length. The rest of data is accepted.
Split to Next Field The whole data is accepted. The part that exceeds the field length will be
displayed in next field.
54 CipherNet-5250 User Guide

5.6 Lock Screen


ƒ By default, the upper-left point of the terminal screen is not locked when the Cursor
Tracking feature is enabled. That is, the terminal screen will automatically adjust itself
so that the cursor will always be visible on the screen.
ƒ Select the check box if the Lock Screen feature is desired. Then proceed to specify the
relative coordinates for the upper-left point of the terminal screen when being mapped
on the host screen.
Note: When the Lock Screen feature is enabled, the Cursor Tracking feature will be
disabled automatically; and vice versa.
The relationship between the terminal screen (small) and the host screen (large) is based
on the upper-left point of the screens (see below). The coordinates (0,0) on the terminal
screen are related to (X,Y) on the host screen. Thus, every screen received from the host
will be first displayed starting from (X,Y) regardless of the cursor.
For example, the cursor is outside of the terminal screen. To locate the cursor or view
the hidden information, you need to adjust the terminal screen or move the cursor
manually. Refer to Adjust Terminal Screen and Move Cursor.

Note: This feature is suitable for host applications when the desired information is always
displayed closely and fit to the terminal screen.
Chapter 5 Emulation Settings 55

5.7 Function Key Mapping


The function keys are special keys on the terminal keypad that transmit control codes.
Control codes do not produce displayable characters but are codes for functions. If these
codes are received by the terminal, it will perform the associated function as defined on the
list.
ƒ By default, FN+1 ~ FN+9 are mapped to PF1 ~ PF9 (Program Function keys).
ƒ Click an available function key. You may change its key combination or re-define key
code to meet a specific need.
The following function keys may be required during a telnet session.

Function Key Mapped to Remarks


Tab or any key NEXT See section 4.3.4 Username/Password
Any key Cancel / Exit key Cancel a task or log out of the host
system
Any key Name Key See section 4.3.4 Username/Password
Any key Password Key See section 4.3.4 Username/Password
Any key Navigator Key See section 5.2.2 Navigator Key
Any key Message Key See section 5.3.2 Message Key

Note: The function key mapping list varies by terminal model and its physical keypad.

5.8 Reset
Click this button to load the default settings.

Note: Current settings will be cleared.


57

CHAPTER 6

Screen Settings
The screen reformatting feature requires you to enable it by entering the activation key on
the terminal. Otherwise, the screen settings cannot take effect. If you have received an
activation key, proceed with the screen capture task.

Note: Metrologic will issue a unique activation key under the pay-by-use policy. Please
contact your local sales representative for licensing.

In This Chapter
6.1 Screen Capture............................................................. 58
6.2 Screen Reformat .......................................................... 59
6.3 Activation Key............................................................. 63
58 Emulation Optimizer-5250 User Guide

6.1 Screen Capture

6.1.1 Logon to Host from Emulation Optimizer


1. On your computer, run the Emulation Optimizer-5250 program.

2. Click the Connect command from the Telnet Menu, or simply click on the toolbar.
3. Enter the IP address of the host that you wish to access via telnet.
Select the check box of Save Log in case you need to analyze the activities during a
telnet session. The information will be saved to a log file in the “Logs” folder
automatically created in the same directory where the Emulation Optimizer-5250
program is.

4. Click [OK] to start connecting to the host. The host system will prompt you to enter
username/password to login.
5. After login, you may start using the host application you need.
Note: Wireless LAN networking settings must be configured properly.

6.1.2 Capture Host Screens


You may capture screens from the host application by clicking the associated command
from the Telnet Menu or its icon on the toolbar. A status message will appear on the left
bottom of the Emulation Optimizer window, indicating the current status.

1. Click to start the capture task and save the host screens to a .SCR file.
(Status message: Ready to capture)

2. Click to capture the current host screen. Skip unnecessary screens.


(Status message: A total of screens that have been captured.)

3. Click to stop the capture task when you have captured the screens necessary for the
terminal operation during a normal session.
Chapter 6 Screen Settings 59

4. Click the Configure command from the Utilities menu, and click the Screen tab.
Proceed to section 6.2 Screen Reformat.
Note: Try to capture all the necessary screens. If you cannot decide which screen to skip
now, capture it. You can always delete it later when the .SCR file is loaded for
screen reformatting.

6.2 Screen Reformat


The target is to reformat the captured host screens, or pages, so that they can be best
displayed on the terminal screen. The Screen settings page is divided into two parts: one is a
window (left) displaying the captured host screens for viewing and editing, and the other is
the associated forms (right) for reformatting these pages to fit in the terminal screen.

6.2.1 Host Screen


60 Emulation Optimizer-5250 User Guide

Options Remarks
Load Host Session Š Click this button to import the screens from a .SCR file.
Screens Š The total of pages, or screens, is displayed next to the button.
Delete Current Page Š Click this button if the screen currently displayed is not desired for
reformatting.
Š The current number of page, or screen, is displayed next to the button.
(Row, Column)= Click on any part of the window. The current position will be displayed
accordingly. Drag the scroll box to view the hidden text.
Control buttons There are four control buttons for changing the page currently displayed.
Š First page
Š Previous page
Š Next page
Š Last page

Note: If you neither delete nor reformat a captured screen, there will be an empty screen
displayed during a telnet session.

6.2.2 Terminal Screen


Chapter 6 Screen Settings 61

Options Remarks
Reformat page to Specify the page format on the terminal screen.
Š This setting or its options in the drop-down menu depend on the font
size you use in section 5 Emulation Settings.
Š You can have different page format for different host screen.
Field (x,y) Š If the original message of a line does not prompt you to input selection,
i.e. no input fields, simple leave it as “nil”.
Š If the original message of a line prompts you to input selection, select
the matching field number and rephrase its message if necessary.
The total of fields on the host screen is reflected in the drop-down menu
of Field.
Terminal Screen Copy the necessary messages from the Host Screen window and rephrase
(Messages) them to fit to the terminal screen.
Line No. This indicates the line number when the message is displayed on the terminal
screen.
Control buttons If the total lines of page format setting exceed 8, the two buttons will become
available for moving forward or backward to display the rest lines.
Š Move forward
Š Move backward
Reset Click this button to load the default settings. Current host screens and
settings for reformatting will be cleared.

Note: If you neither delete nor reformat a captured screen, there will be an empty screen
displayed during a telnet session instead.
62 Emulation Optimizer-5250 User Guide

6.2.3 Example

ƒ You have loaded a total of 3 host screens, and currently work on the first page.
ƒ From the Host Screen window (left), you can see there are four message lines and one
empty line on this page. You may ignore the empty lines and simply skip them when
reformatting.
ƒ Copy the necessary messages for reformatting (right). You may need to rephrase them
so that they can best fit in to a terminal screen, which is decided by the page format of
the terminal screen.
Note: The coordinates of a Field can be ignored if the message is not requesting you to
input information.

ƒ Below shows the messages displayed on the host screen before reformatting, and those
rephrased to be displayed on the terminal screen after reformatting.

Rows Host Screen Lines Terminal Screen


1 Sign On 1 Main Menu
2 System... 2 Username:
3 Subsystem... 3 Password:
Chapter 6 Screen Settings 63

4 Display... 4 Program:
5 User... 5 Menu:
6 Password... 6 Library:
7 Program/procedure... 7 (empty)
8 Menu... 8 Welcome to CipherLab
9 Current library... 9
(before reformatting) (after reformatting)
ƒ Proceed to next host screen by clicking the [Next page] button on the bottom of Host
Screen window. If a host screen is not desired for reformatting, you must delete it by
clicking the [Delete Current Page] button; otherwise, it will become an empty screen
during a telnet session.

6.3 Activation Key


1. Turn on the terminal. The main menu created by the preloaded Emulation Optimizer
Runtime appears.
2. On the terminal, select 2. Utilities > 2. Emulation Settings > 8. Activation Key.
3. Enter the activation key you received after payment.
4. Return to the main menu and select 1. Telnet.
A new session will start with reformatted screens.
64 Emulation Optimizer-5250 User Guide

6.4 Reset
Click this button to load the default settings.

Note: Current settings will be cleared.


65

APPENDIX I

VT Emulation
For VT emulation, you must use the program Emulation Optimizer-VT. The 5250 emulation
program will not work. To successfully emulate a VT100/VT220 terminal, emulation
settings must be configured correctly.

Once the terminal application and configuration file (*.NET) has been downloaded to the
terminal, these will become the default settings. However, the following settings can be
changed directly on the terminal.

Change "Emulation Type" on the terminal


Press [Power] 2.Utilities > 2. Emulation Settings

Change "Screen Scroll & Control" settings on the terminal


Press [Power] 2.Utilities > 2. Emulation Settings
66 CipherNet-5250

In This Chapter
5.1 Emulation Type ........................................................... 46
5.2 Font Size ...................................................................... 53
5.3 Case Conversion .......................................................... 51
5.4 Screen Scroll & Control............................................... 47
5.5 Function Key Mapping ................................................ 55
5.6 Reset ............................................................................ 55

Emulation Type
By default, the emulation type is ANSI / VT. No other option is allowed currently.

Font Size
The terminal screen size varies by terminal model. Display capability, as shown below,
depends on the screen size as well as the font you use. The font size setting affects the
default horizontal/vertical steps the cursor move at one time on the host screen.

Model Number Small (Font 6x8) Large (Font 8x16)


OptimusSBT 16 characters by 8 lines 12 characters by 4 lines
OptimusRW 20 characters by 8 lines 15 characters by 4 lines
ƒ By default, small font (6x8) is applied. Data coming in from the host will be displayed
accordingly.
ƒ You may select to use large font (8x16).
Note: Emulation Optimizer-VT currently supports English host applications only.
Appendix I VT Emulation 67

Case Conversion
ƒ By default, there is no case conversion. Data coming in from the host will be displayed
in letter case matching to the original.
ƒ Options include “convert to lower/upper case”. For example, if you select “to lower
case”, data coming in from the host will be converted to lower case; and vice versa.

Screen Scroll & Control


Limited to the actual screen size, the terminal can only display a portion of the host screen.
The following features help ease working from the terminal screen.

Navigator
A navigator can be a graphic icon or miniature window on the terminal screen, indicating
the relationship between the terminal screen and the host screen. A miniature cursor is
blinking to indicate the input position.
ƒ By default, a graphic icon is used for navigation.
Take the CPT-8500 series for example. The icon will appear on the bottom line of the
screen.
ƒ Instead of the small icon, you may select “20*15” or “32*24” for a larger icon.
Take the CPT-8500 series for example. The icon will take the top few lines of the
screen.
ƒ To disable this feature, select “None”.
68 CipherNet-5250

Navigator Key
The navigator key works as the toggle of navigator. When you press the navigator key on
the terminal, it will disable/enable the navigator by turns.
ƒ By default, the navigator key is disabled.
ƒ Select the navigator key (FN+0 ~ FN+9).
The selected combination will become unavailable on the Function Key Mapping list.
For example, if you select FN+6, you will find it mapped to “Navigator Key”.

Horizontal Steps
Specify how many horizontal steps the cursor will move at a time on the host screen when
you press the [Left] or [Right] key. This feature is associated with the font size.

Note: For the OptimusSBT terminals, you will need to map two function keys to the [Left]
and [Right] keys first. (pending confirmation)

Vertical Steps
Specify how many vertical steps the cursor will move at a time on the host screen when you
press the [Up] or [Down] key. This feature is associated with the font size.

Cursor Tracking

Cursor Tracking Enabled (default)


This feature is enabled by default. The terminal screen will automatically adjust itself so that the
cursor will always be visible on the screen. Thus, every screen received from the host will be
displayed with the cursor visible to indicate the first input field.
Appendix I VT Emulation 69

Note: This feature only works when a screen refresh incident occurs on the host.

Cursor Tracking Disabled


Cancel the check box if this feature is not desired.
The relationship between the terminal screen (small) and the host screen (large) is based on the
upper-left point of the screens (see below).
When you disable the Cursor Tracking feature, the coordinates (0,0) on the terminal screen are
related to (0,0) on the host screen. Thus, every screen received from the host will be first displayed
starting from (0,0) regardless of the cursor.

Adjust Terminal Screen


To view the hidden information or locate the cursor, you need to adjust the terminal
screen manually. Press one set of the following keys simultaneously:
ƒ [FN] + [Left]
ƒ [FN] + [Right]
ƒ [FN] + [Up]
ƒ [FN] + [Down]
There will be a warning beep when the terminal screen has reached the boundaries
of the host screen.
Note: For the CPT-8500 series, the above function keys are originally used to adjust LCD
contrast ([FN] + [Up]/[Down]) and backlight intensity ([FN] + [Left]/[Right]).
After logging on to a host, these keys will be used to adjust the terminal screen
instead. That is, you cannot use them to adjust LCD contrast and backlight intensity
until you log out.

Move Cursor
ƒ To move the cursor to a desired input field, press the function key that is
mapped to “Tab”.
ƒ To move the cursor to a desired input point, press the arrow keys [Up], [Down],
[Left], and [Right].
Note: For the CPT-8061/8071 terminals, you will need to map two function keys to the
[Left] and [Right] keys first. (pending confirmation)
70 CipherNet-5250

Trim Spaces
To make the most use of the terminal screen, unnecessary spaces may be discarded.

Select the check box to enable this feature. Take the following for example.

Original line: -> 1. Set up<-

Trimmed ->1. Set up<-

Note: Spaces between characters will not be discarded.

Disable Local Echo


ƒ By default, it will echo typed text locally on the terminal.
ƒ Select the check box if local echo is not desired.

Cursor Flashing
Select the check box to have a flashing cursor.

Function Key Mapping


The function key is one of the keys on the terminal keypad that transmit control codes.
Control codes do not produce displayable characters but are codes for functions. If these
codes are received by the terminal, it will perform the associated function as defined on the
list.
ƒ By default, FN+1 ~ FN+9 are mapped to F1 ~ F9, which are pre-defined as shown
below.

Function Key Mapped to Key Code


FN+1 F1 ESC OP
FN+2 F2 ESC OQ
FN+3 F3 ESC OR
FN+4 F4 ESC OS
Appendix I VT Emulation 71

FN+5 F5 ESC[M
FN+6 F6 ESC[17~
FN+7 F7 ESC[18~
FN+8 F8 ESC[19~
FN+9 F9 ESC[20~
ƒ Click an available function key. You may change its key combination or re-define key
code to meet a specific need.
The following function keys may be required during a telnet session.

Function Key Mapped to Remarks


Tab or any key Tab See section 4.3.4 Username/Password.
Any key Cancel / Exit key Cancel a task or log out of the host
system
Any key Switch Key See section 3.1.2 RFID Settings.
Any key Name Key See section 4.3.4 Username/Password.
Any key Password Key See section 4.3.4 Username/Password.
Any key Exit Key See section 4.3.5 Quick Logout.
Any key Navigator Key See section 5.4.2 Navigator Key.

Note: The function key mapping list varies by terminal model and its physical keys.
72 CipherNet-5250

Reset
Click this button to load the default settings.

Note: Current settings will be cleared.

Special ESC Commands


A number of special ESC commands are available for hardware control. You may send an
escape sequence from a host to control the hardware features of the terminal.

Features Special ESC Command


LED ESC[0;color;mode;duration]
color 0: Red LED
1: Green LED
mode & 0: LED is turned off for (duration *0.01) seconds and then turned on
duration
1: LED is turned on for (duration *0.01) seconds and then turned off
2: LED flashes for (duration *0.01) seconds and then repeat
Buzzer ESC[1;beep sequence]
Š A beep sequence refers to pairs of Beep Frequency(x) and Beep Duration(y).
Š Beep Frequency = 76000 Hz / Actual Frequency Desired: if a frequency of 4
KHz is desired, the value of x is 19.
Š Beep Duration is in units of 10 milliseconds.
Š For example, you may send “ESC[1;x;y;x;y...]”.
Reader Enable: ESC[2;1]
Disable: ESC[2;0]
RFID Enable: ESC[3;1]
Reader
Disable: ESC[3;0]
Vibrator ESC[4;duration]
Š The vibrator will work for (duration *0.1) seconds.
73

APPENDIX II

Hardware Test

Buzzer Test
You can test the buzzer by playing a beep sequence.
1. Turn on the terminal. The main menu created by the preloaded CipherNet Runtime
appears.
2. On the terminal, select 2. Utilities > 1. TCP / IP Settings.
3. In the submenu, press [F10] to enter the buzzer test.
Take the CPT-8500 series for example: Press [FN] to enable the function key, and then
press [F10].
4. Enter a desired beep sequence, and then press [Enter] to play it.

Reader Test
You can test the barcode reader by scanning barcode labels.
1. Turn on the terminal. The main menu created by the preloaded CipherNet Runtime
appears.
2. On the terminal, select 2. Utilities > 3. Reader Test.
3. Start to scan barcode labels.
Along with the read data or error message on the terminal screen, there will be a beep to
indicate Good Read or Error.

You might also like