Host Acknowledgment
Some applications require that the host terminal (or server) validate incoming bar code data (database
Note: System performance degrades when using Host ACK at rates lower than 9600 baud.
The following criteria must be met for the Host ACK to work correctly:
•The cordless system must be configured for Host Port RS232 (terminal ID = 000) or USB COM Emulation (terminal ID = 130).
•RTS/CTS is defaulted off. You must enable it if the host system requires it.
•Host ACK must be set to On (page
•A comma must be used as a terminator.
•The host terminal software must be capable of interpreting the bar code data, make decisions based on the data content, and send out appropriate escape commands to the scanner.
Escape commands are addressed to the scanner via “Application Work Groups.” Once a command is sent, all scanners in a group respond to that command. Because of this, it is recommended that each scanner is assigned to its own group in
Host ACK mode.The commands to which the scanner responds are listed on page
Example: Commands may be strung together to create custom response sequences. An example of a command string is listed below.
0[ESC]4,[ESC]5,[ESC]6,
The above example will make a scanner that is in application work group zero beep low, then medium, then high.
Example: A good read beep is required for any item on file, but a razz or error tone is required if the item is not on file. In this case,
[ESC]7, is sent to the host for an
[ESC]8,[ESC]8, is sent to the host for a
When a bar code is scanned, the scanner enters a timeout period until either the host ACK sequence is received, or the timeout expires (in 10 seconds, by default).
Once Host ACK is enabled, the system works as follows when a bar code is scanned:
•The scanner reads the code and sends data to the base or Access Point to transmit to the host system. No audible or visual indication is emitted until the scanner receives an escape command. The scanner read illumination goes out when there’s a successful read.
•Scanner operation is suspended until 1) a valid escape string is received from the host system or 2) the scanner times out.
•Once condition 1 or 2 above has been met, the scanner is ready to scan again, and the process repeats.
A
3 - 26