Datalogic JOYATM X2 R2U ”Ready to Use” User Guide
Datalogic ADC, S.r.l. Via S. Vitalino, 13 40012 Lippo di Calderara di Reno Bologna - Italy Telephone: (+39) 051-3147011 Fax: (+39) 051-3147205 ©2014 Datalogic ADC, S.r.l. An Unpublished Work - All rights reserved. No part of the contents of this documentation or the procedures described therein may be reproduced or transmitted in any form or by any means without prior written permission of Datalogic ADC, S.r.l. or its subsidiaries or affiliates ("Datalogic" or “Datalogic ADC”).
Datalogic ADC S.r.l. Via S. Vitalino 13 40012 - Lippo di Calderara di Reno Bologna - Italy Datalogic JOYA™ X2 R2U - User's Manual Ed.: REG REV3 ALL RIGHTS RESERVED The Datalogic name and logo are registered trademarks of Datalogic S.p.A. in many countries. The JOYA name and logo are a trademarks of Datalogic ADC S.r.l. All other brand and product names mentioned herein are for identification purposes only and may be trademarks or registered trademarks of their respective owners.
CONTENTS 1 1.1 1.2 1.3 1.4 INTRODUCTION ............................................................................. 17 Datalogic JOYA™ X2 Description ................................................... 17 Model Description ........................................................................... 17 Package Contents ........................................................................... 19 Accessories .................................................................................... 19 2 2.1 2.
3.15 3.16 3.16.1 3.16.2 3.17 3.18 Backup Directory File Management................................................. 73 Firmware Update............................................................................. 75 Retrieving a Firmware Image Update .............................................. 75 Firmware Update Procedure ........................................................... 76 DAatalogic Configuration Utility ....................................................... 77 Datalogic Desktop Utility ....
DATALOGIC END USER LICENSE AGREEMENT BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR BY USING DATALOGIC EQUIPMENT THAT INCLUDES THIS SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, THEN DO NOT DOWNLOAD, INSTALL, USE THE SOFTWARE NOR DATALOGIC EQUIPMENT.
lawful use, provided Customer affixes to such copies all copyright, confidentiality, and proprietary notices that appear on the original. 5. Protection of Information. Customer agrees that aspects of the Software and associated documentation, including the specific design and structure of individual programs, constitute trade secrets and/or copyrighted material of Datalogic.
INTRODUCTION 1 REFERENCES CONVENTIONS This manual uses the following conventions: "JOYA ™ X2" refers to all possible JOYA ™ X2 hardware configurations, unless otherwise specified. “User” refers to anyone using a Datalogic JOYA™ X2 mobile computer. “Mobile computer” and "Datalogic JOYA™" refer to Datalogic JOYA™ X2. “You” refers to the System Administrator or Technical Support person using this manual to install, configure, operate, maintain or troubleshoot a Datalogic JOYA™ X2.
DATALOGIC JOYA™ X2 1 SAFETY REGULATIONS NOTE Read this manual carefully before performing any type of connection to the Datalogic JOYA™ X2 mobile computer. The user is responsible for any damages caused by incorrect use of the equipment or by inobservance of the indication supplied in this manual. GENERAL SAFETY RULES − Use only the components supplied by the manufacturer for the specific Datalogic JOYA™ X2 being used.
INTRODUCTION 1 FCC COMPLIACE – JOYA X2 FCC Regulations: • This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. • This device has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
1 DATALOGIC JOYA™ X2 RF EXPOSURE INFORMATION (SAR) This device meets the government’s requirements for exposure to radio waves. This device is designed and manufactured not to exceed the emission limits for exposure to radio frequency (RF) energy set by the Federal Communications Commission of the U.S. Government. The exposure standard for wireless devices employs a unit of measurement known as the Specific Absorption Rate, or SAR. The SAR limit set by the FCC is 1.6W/kg.
INTRODUCTION 1 model device is on file with the FCC and can be found under the Display Grant section of http://www.fcc.gov/oet/fccid after searching on the below FCC IDs: FCC ID: U4GJX2WB (for models with WLAN and BT) FCC ID: U4GJX2W (for model with WLAN only) This device is compliant with SAR for general population /uncontrolled exposure limits in ANSI/IEEE C95.1-1999 and had been tested in accordance with the measurement methods and procedures specified in OET Bulletin 65 Supplement C.
1 DATALOGIC JOYA™ X2 Ce dispositif et ses antennes ne doivent pas être co-implantés ou utilisés avec une autre antenne ou an autre émetteur La fonction de sélection de code de pays est désactivée pour les produits commercialisés en Etats-Unis / Canada IC RADIATION EXPOSURE STATEMENT This EUT is compliant with SAR for general population/uncontrolled exposure limits in IC RSS-102 and had been tested in accordance with the measurement methods and procedures specified in IEEE 1528.
INTRODUCTION 1 WEEE COMPLIANCE Informazione degli utenti ai sensi della Direttiva Europea 2012/19/EC L’apparecchiatura che riporta il simbolo del bidone barrato deve essere smaltita, alla fine della sua vita utile, separatamente dai rifiuti urbani.
1 DATALOGIC JOYA™ X2 At the end of its useful life, the product marked with the crossed out wheeled wastebin must be disposed of separately from urban waste. Disposing of the product according to this Directive: avoids potentially negative consequences to the environment and human health which otherwise could be caused by incorrect disposal enables the recovery of materials to obtain a significant savings of energy and resources.
INTRODUCTION 1 Información para el usuario de accuerdo con la Directiva Europea 2012/19/CE Al final de su vida útil, el producto marcado con un simbolo de contenedor de bassura móvil tachado no debe eliminarse junto a los desechos urbanos.
1 DATALOGIC JOYA™ X2 Weitere Informationen zu dieser Richtlinie erhalten sie von ihrem Lieferanten über den sie das Produkt erworben haben, oder besuchen sie unsere Hompage unter www.datalogic.com.
INTRODUCTION 1 WIRELESS AND RADIO FREQUENCIES WARNINGS Most modern electronic equipment is shielded from RF signals. However, certain electronic equipment may not be shielded against the RF signals generated by Datalogic Joya™. WARNING WARNING WARNING Datalogic recommends persons with pacemakers or other medical devices to follow the same recommendations provided by Health Industry Manufacturers Associations for mobile phones.
DATALOGIC JOYA™ X2 1 WARNING areas, chemical plants or where some operation involves use of explosive materials. Do not store or carry flammable liquids, explosive gases or materials with the device or its parts or accessories. Areas with a potentially explosive atmosphere are often, but not always, clearly marked or showed. Sparks in such areas could cause an explosion or fire, resulting in injury or even death. PATENTS This product is covered by one or more of the following patents. Design Pat.
INTRODUCTION 1 At the end of its useful life, the product marked with the crossed out wheeled wastebin must be disposed of separately from urban waste. Disposing of the product according to this Directive: avoids potentially negative consequences to the environment and human health which otherwise could be caused by incorrect disposal enables the recovery of materials to obtain a significant savings of energy and resources.
DATALOGIC JOYA™ X2 1 Information 2012/19/EC aux utilisateurs concernant la Directive Européenne Au terme de sa vie utile, le produit qui porte le symbole d'un caisson à ordures barré ne doit pas être éliminé avec les déchets urbains.
INTRODUCTION 1 GENERAL VIEW A) Display * B) 6 keys keyboard C) TTL Serial connector D) Bumper E) Cold reset Hole F) Neck Strip Anchor G) Loudspeaker H) Micro USB I) Reader window *Remove protective film cover before use 15
1 16 DATALOGIC JOYA™ X2
INTRODUCTION 1 1.1 1 INTRODUCTION DATALOGIC JOYA™ X2 DESCRIPTION The Datalogic JOYA™ X2 is a pocket-sized Windows powered mobile computer. This extremely compact, lightweight, and versatile device, combines fully integrated automatic data capture (2D bar code) and wireless communication capabilities, supporting nearly any application.
1 DATALOGIC JOYA™ X2 xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D Halogen Imager with Green Spot, Windows CE Core 6.0 + Avalanche, Bluetooth®. • xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D Halogen Imager with Green Spot, Windows CE Professional 6.0 + Avalanche, Bluetooth®. • xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/1 GB Flash, uSD (4GB), touchscreen, 2D SE4500 Imager with Green Spot, Windows CE Core 6.0 + Avalanche.
1.3 PACKAGE CONTENTS The Datalogic JOYA™ X2 package contains: 1 Datalogic JOYA™ X2 mobile computer − Remove all the components from their packaging; check their integrity and congruity with the packing documents. Keep the original packaging for use when sending products to the technical assistance center. Damage caused by improper packaging is not covered under the warranty. CAUTION Rechargeable battery packs are not initially charged. Therefore the initial operation to perform is to charge them.
DATALOGIC JOYA™ X2 2 2 2.1 CONNECTIONS USB CONNECTION You can use any standard micro USB cable to directly connect the Datalogic JOYA™ X2 to a host computer to transfer data through the USB interface.
CONNECTIONS 2 To comply with the FCC rules the EMI ferrite filter (Fair-Rite™ p.n.
DATALOGIC JOYA™ X2 2 2.2 WLAN CONNECTION Datalogic JOYA™ X2 Wi-Fi 802.11 b/g/n radio models can communicate with the host using the on-board radio frequency component and an Access Point connected to the host computer. To launch this utility you can tap the specific icon if it's visible on the taskbar or you can open Connections folder or Control Panel from desktop and select the 'Summit Client Utility' icon.
CONNECTIONS NOTE NOTE NOTE 2.3 2 Wi-Fi module is on by default, in order to avoid wasting energy, you can switch it off using the Wireless Communications applet. Suspending the terminal powers off the 802.11b/g/n radio and drops the radio connection. When the terminal resumes, depending on the radio power mode and security protocol selected, it may take up to 30 seconds for the 802.11b/g/n radio driver to re-associate the radio to the network.
DATALOGIC JOYA™ X2 2 NOTE NOTE In order to avoid wasting energy, the Bluetooth® module is off by default. If you need to have Bluetooth® working, the module must be powered on using the Wireless Communications applet and perform the Discovery procedure. Suspending the terminal powers off the Bluetooth radio and drops the piconet (Bluetooth connection). When the terminal resumes, it takes approximately 10 seconds for the Bluetooth radio driver to re-initialize the radio.
USE AND FUNCTIONING 3 By pressing the “+” key, the reader beam is lit. By reading different predefined barcodes, different actions are performed. In particular it is possible to: Start the Wavelink Avalanche Enabler-application interface (embedded); Start the "JOYA Cradle Tool" application if present in \BACKUP\CTOOLS; Start “JOYA Diagnostic Tool" application if present in \BACKUP\CTOOLS; Perform a hardware reset; 25
DATALOGIC JOYA™ X2 3 1 Perform a software reset; Enable the reader trigger when the "+" key is pressed. Default is “enabled”; A reset (either HW or SW) is required to confirm the choice. Disable the reader trigger when the "+" key is pressed. A reset (either HW or SW) is required to confirm the choice. When the ScanToConfig timeout expires, Windows CE desktop will appear on the screen. Wait a few seconds before starting any activity so that the mobile computer completes its startup procedure.
USE AND FUNCTIONING 3 which is defined in the POWER applet of the Control Panel. In this mode it can be awakened (resuming operation) pressing the “Up” Key. The mobile computer can also be awakened or turned off by the application program. NOTE 3.2 AVALANCHE ENABLER By scanning the AVALANCHE-S2C barcode, user can start the avalanche enabler interface.
DATALOGIC JOYA™ X2 3 1 3.3 WAVELINK AVALANCHE SYSTEM Is a client management system that automatically deploys software and configuration updates to JOYA™ X2. Avalanche uses "push/pull" technology to install, update, and manage the software and configurations of JOYA™ X2 and other mobile devices. For detailed information please refer directly to the Wavelink website: http://www.wavelink.
USE AND FUNCTIONING 3.4 3 AVALANCHE MANAGEMENT CONSOLE The Avalanche Management Console provides an administrative interface to one or more Manager Agents. After installing, click on the Avalanche shortcut on desktop or select Avalanche SE Console from All Programs -> Wavelink Avalanche SE menu. 3.4.1 Network profile Define the way each JOYA™ X2 terminal will connect the network. To create a Network Profile select the tab Quick Star, click on Create a Network Profile.
3 1 DATALOGIC JOYA™ X2 Insert a suitable profile name, leave status disabled then click Next. Skip the Profile Selection Criteria screen then select Finish in the Review Profile Settings screen. A new line named Network Profile will appear on the right part of the main screen Keep the Network profile line previously created highlighted. Click on the Edit button on the top lower part of the main screen. Check the Manage WLAN IP, the Manage WLAN and the Override Settings on Mobile Devices boxes.
USE AND FUNCTIONING 3 Check the box Subnet Mask and enter the subnet mask in decimal dotted notation. On the lower part of the main screen select the WLAN Settings tab. Check the box SSID and enter the wifi SSID key. In the Encryption Settings area enter the suitable values for the wifi communication (encryption type and key value). Click on the Save button to confirm modifications. 3.4.
3 1 DATALOGIC JOYA™ X2 such as the IP address, subnet mask, and gateway as well as wireless parameters such as SSID, encryption rules and keys etc... The length of the barcode is configurable. To create a Network Profile select the tab Quick Star, click on Create a Scan to Config Profile. Enter a suitable Network Profile name then click Next Verify and confirm by clicking on Finish.
USE AND FUNCTIONING 3 Be sure that the Scan To Config Profile line is highlighted then press the Edit key. Check the box Use settings from network profile and verify the network profile name selected in the right windows. Confirm by clicking the Save key. Select the Scan To Config Profile line then press the Print Barcodes key. Select Save as PDF then click on the folder icon and enter a suitable name and path for the output file. Then a PDF file will be created.
DATALOGIC JOYA™ X2 3 1 Make a paper copy and use it for JOYA™ X2 configuration. When the device is properly configured and connected to the Avalanche server it will be reported in the Mobile Device Inventory tab. 3.4.3 Software profile Software profiles allow user to organize and configure software for deployment to JOYA™ X2 terminal, as well as change device parameters. Add software packages to the profile, configure them, and schedule how and when they will be installed.
USE AND FUNCTIONING 3 Insert a suitable software profile name, leave status disabled then click Next. You can add packages, copy packages that have already been added to a different profile, or create custom software packages from the Avalanche Console. Before you create a custom package, ensure you know the location of all the files you want to include and ensure that the files are valid. In the example select a previously created Software Package (AVA extension) then Next.
DATALOGIC JOYA™ X2 3 1 Wait for installation then click Next. Close this wizard with Finish. Once you create a software profile, you must enable/disable and add/remove the software packages to that profile. Through the software profile you can configure the software package settings and then deploy the packages to specific mobile devices. When working in software profiles, you do not need to be in Edit Mode to add or configure software packages.
USE AND FUNCTIONING 3 In order to install the DLdcu Avalanche Package you first must install the DCU program in the PC. From the Profiles tab select Software profile/Default Software Profile. On the lower part of the screen click on Install Package Check Install an Avalanche package. Browse and select the DLdcuxx.