Library Security Pedestal 2 User's Guide Revision 4.
Library Security Pedestal 2 Publishing Information Disclaimer and Limitation of Liability All information herein is either public information or is the property of and owned solely by TAGSYS who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in connection with such information.
Read This First Read This First Welcome to the TAGSYS L-SP2 Electronic Article Surveillance (EAS) system. This user’s guide is designed to help you get up and running quickly using this high-quality Radio Frequency Identification (RFID) Anti-Theft system. It describes all you need to know about how to install and use the TAGSYS EAS/AFI system and its associated applications.
Library Security Pedestal 2 If you need assistance Please contact your nearest TAGSYS sales representative or the TAGSYS Welcome Desk at: Telephone: +33 (0) 4 91 27 57 00 Fax: +33 (0) 4 91 27 57 01 E-Mail: info@tagsysrfid.com Website http://www.tagsysrfid.com Contact for Comments We welcome your feedback to help us provide high quality documentation. For technical comments, please contact our welcome desk: Telephone: +33 (0) 4 91 27 57 00 Fax: +33 (0) 4 91 27 57 01 E-Mail: info@tagsysrfid.
Read This First Table of Contents PUBLISHING INFORMATION __________________________________________________________ 2 DISCLAIMER AND LIMITATION OF LIABILITY __________________________________________________ 2 READ THIS FIRST ____________________________________________________________________ 3 CONVENTIONS _________________________________________________________________________ 3 IF YOU NEED ASSISTANCE ________________________________________________________________ 4 CONTACT FOR COMMENTS _______________
Library Security Pedestal 2 4.3.2 PLACEMENT OF PEDESTALS _______________________________________________________ 21 4.3.3 INSTALLING THE PEDESTAL________________________________________________________ 22 5 CONFIGURATION ________________________________________________________________ 26 5.1 CHIP CONFIGURATION _____________________________________________________________ 26 5.1.1 SCANNING DURATION ____________________________________________________________ 26 5.1.
Read This First 9.1 SOURCES OF INTERFERENCE _______________________________________________________ 55 10 TECHNICAL SPECIFICATIONS ___________________________________________________ 56 10.1 10.2 10.3 10.
Library Security Pedestal 2 List of Figures Figure 1: FCC power and uplink settings ........................................................................................................ 15 Figure 2: Electric Connections......................................................................................................................... 18 Figure 3: Safety Electrical Installation .............................................................................................................
List of Tables List of Tables Table 1: L-SP2 EAS System Components ...................................................................................................... 20 Table 2: Scanning Duration ............................................................................................................................. 26 Table 3: Contents of Antenna Tuning Kit......................................................................................................... 43 Table 4: Oscilloscope Settings ...
Library Security Pedestal 2 1 For Your Safety 1.1 General Use The L-SP2 is designed to be rugged and reliable and to provide years of trouble-free service. Please observe the following general tips: Take care not to scratch the device. Keep the device clean. When working with the device, use only TAGSYS-approved accessories. This device is not waterproof and should not be exposed to rain or moisture. Under extreme conditions, water may enter the circuitry.
For Your Safety 1.3 Important Safety Information 1.3.1 Operating Environment When connecting the device or any accessory to another device, read its user’s guide for detailed safety instructions. Do not connect incompatible products. As with all RF equipment, users are advised that the equipment should only be used in its normal operating position. July 2008 Revision 4.
Library Security Pedestal 2 2 Certification 2.1 Occupational Health TAGSYS L-SP2 EAS System has been designed and tested to be in conformity with the European Standard EN 50364 “Limitation of human exposure to electromagnetic fields from devices used in Electronic Article Surveillance (EAS), Radio Frequency Identification (RFID) and similar applications” in conjunction with the European Standard EN 50357 describing how to evaluate the exposure level. 2.1.
Certification 2.3.1 In Europe (CE and RTTE Directives) The L-SP2 complies (CE Declaration of Conformity granted) with the European EMC directive. The L-SP2 complies with the requirements of the Telecommunication Terminal Equipment Act (FTEG) and the RTTE Directive 1995/5/EC. It is the responsibility of the TAGSYS Reseller to install the L-SP2 as described in this User’s Guide or TAGSYS Documentation. Any modification of the L-SP2 is prohibited without the written consent of TAGSYS.
Library Security Pedestal 2 2.3.2 In USA (FCC Directive) L-SP2 WARNING TO USERS IN THE UNITED STATES FEDERAL COMMUNICATIONS COMMISSION (FCC) RADIO INTERFERENCE STATEMENT 47 CFR Section 15.105(b) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Figure 1: FCC power and uplink settings CAUTION: In any case, for operational configuration this value should not exceed 4W to be in compliant with FCC. Please see Figure 1: FCC power and uplink settings. CAUTION: ISO15693 uplink data rate you should not exceed 1.65kbits/s in order to comply with FCC standard certification. Please see Figure 1: FCC power and uplink settings. July 2008 Revision 4.
Library Security Pedestal 2 3 System Overview 3.1 Features Being a standalone solution, TAGSYS security pedestal do not need to be linked to the library database, and can still operate when the Integrated Library System (ILS) is down or under maintenance. The security pedestal does not require additional equipment to operate.
System Overview 3.2 Brief L-SP2 Description The components of the L-SP2 EAS system are contained within the L-SP2 pedestal. At least two pedestals are required for each EAS gate. A set of pedestals is known as a gate and may consist of several pedestals. Please see section 4 “Installation” for more information. The L-SP2 is built in a one frame: A L-SP2 Electronics unit is used to control each pedestal.
Library Security Pedestal 2 4 Installation 4.1 Recommendations before Installation 4.1.1 Wire Feed Sheaths Within the framework installation you need a power supply cable sheath and an Ethernet cable sheath for the Ethernet network with Ethernet version. These sheathed cables will be located at the bottom center of the pedestal as shown in Figure 9. The L-SP2 is delivered with a power supply cable of 1-meter length located underneath of the pedestal at the bottom center.
Installation 4.1.2 Electrical Safety Rules The mains powers the L-SP2 so it is necessary to provide a differential protection and a shutting-off device. Figure 3 below shows how to connect the L-SP2 pedestals to the mains. Figure 3: Safety Electrical Installation L-SP2 L-SP2 L-SP2 Micro circuit breaker Differential circuit-breaker AC main AC main line + Neutral The electrical installation must be carried on by qualified personnel only.
Library Security Pedestal 2 Figure 4: Ferrite clamp mounted on Ethernet cable 4.2 L-SP2 EAS System Components The components included in the L-SP2 EAS System package are listed in Table 1 Table 1: L-SP2 EAS System Components Quantity Description 1 L-SP2 Pedestal 8 40 mm Philips-head, countersunk screws with a diameter of 6 mm 8 8 mm plastic cement plugs 1 L-SP2 EAS System CD-ROM 1 RS 232 cable (system configuration) 4.
Installation 4.3.2 Placement of Pedestals Pedestals must be mounted between 800 and 915 mm apart (edge to edge) for maximum reliable performance. There should be at least one pair of pedestals at each entrance/exit point of the library. There should be a pedestal at each edge of the entrance, and a clear space of at least 500 mm around the edge of the pedestals to ensure that the antennas will not be detuned.
Library Security Pedestal 2 4.3.3 Installing the Pedestal Once the L-SP2 will be powered, the photoelectric sensor will emit a red light beam. To precisely align the sensor and the reflector, an orange LED is present on the back of the photoelectric sensor. When the orange LED is continuously on, the sensor and the reflector are perfectly aligned.
Installation Reflector Ground Figure 8: Side view of correct L-SP2 installation The L-SP2 pedestal is mechanically compatible with the Smarto L122 Pedestal. After having defined the location of the pedestals, refer to the mechanical drawing of the pedestalmounting diagram (Figure 9). The pedestal is fastened to the floor using screws that are strong enough to support the weight of an average adult falling against the pedestal. Figure 9: Pedestal Mountings 1.
Library Security Pedestal 2 b. Cement floor: Drill eight holes with a diameter of 8 mm for the cement floor plugs and one hole with a diameter of 19 mm for the cable access. It may be necessary to provide a groove for the power supply cable connected to the L-SP2 Electronics Unit. Insert the concrete floor plugs into the mounting holes. CAUTION: Always use a protective sleeve for main power cable, which match to the noninflammability standard.
Installation AC mains 110/220V. Be sure that there is no power supply current before carrying on the connection operation. To do so, the micro circuit-breaker must be opened. (Figure 3) 8. Once all the L-SP2 pedestal have been installed, close the micro circuit-breaker (Figure 3) to power up the system before starting configuration operations. Please see section 5 “Configuration”. 9. After the configuration has been carried on, replace the two plastic covers and tighten the 4 fixing screws.
Library Security Pedestal 2 5 Configuration All configuration operations of L-SP2 systems are carried on with the L-SP2 Configuration Utility Software. 5.1 Chip Configuration 5.1.1 Scanning Duration For optimal performance the scanning duration (Tscan) should not exceed 250ms. Tscan is the period to scan all the pedestal of a group. Depending on your chip configuration and the number of pedestal installed you can determine the scanning duration of your installation.
Configuration Only one gate is defined to be the master who emits a synchronization burst to the slaves in close proximity. The other gates, configured as slave, synchronize themselves on the master’s burst, and if they have a matching ID, scan the configured chip. Default configuration of the L-SP2 is set to Master.
Library Security Pedestal 2 3- Slave2 scan the configured chip, and then send the synchronization burst back to the master. This process is repeated in an infinite loop mode. In case of the master does not receive back the synchronization burst from the last slave after a defined period, it will automatically restart the synchronization process. In this particular mode we recommend to install a maximum of 3 pedestals in order to avoid deteriorating the Tscan duration described in section 5.
Configuration 5.2.4 Synchronization by Wire In this case the L-SP2 configuration settings are not to be changed. There will always be one L-SP2 Master and others pedestals set as Slaves. Each pedestal is connected to the other using a twisted pair cable. Wire connection: 1. Unscrew the 4 screws to open the plastic panel 2. Unscrew the 9 screws to open the metallic cover Figure 13: I/O port support I/O port support 3.
Library Security Pedestal 2 For the Ethernet version, the first step is to allocate a unique IP address to each L-SP2. This operation will allow identifying each L-SP2 on site before configuring them on the Ethernet network. By default the IP address is 169.254.0.100 (port 4001) (IPv4 Automatic Private IP Addressing). Ask your network administrator to obtain a static IP address for each of the pedestals connected to your local network.
Configuration The L-SP2 configuration will be carried on using a host computer connected to the local Ethernet network. You can localize the each gate thanks to their IP address. Their on site location must be known to configure and set them as Slaves or Master. 5.4 Configuration of the L-SP2 “L-SP2 Configuration” is the software tool used to communicate and configure the L-SP2 pedestal. This software handles communication either using the serial port or Ethernet port.
Library Security Pedestal 2 Follow the installer steps: 32/62 Revision 4.
Configuration After the L-SP2 Configuration Software is installed, a shortcut to the application will be added to the desktop and to the Start Menu. July 2008 Revision 4.
Library Security Pedestal 2 5.4.2 Basic Configuration Double-click on the application shortcut to start the application. By default, the application searches for a serial L-SP2 connected to the COM Port 1.
Configuration Click “Reset Com” to establish communication to the L-SP2. If settings are correct the following window is displayed: Figure 17: Main Configuration Window, connected to the L-SP2 Once the communication is set and the system identified, the software displays the current configuration recorded in the L-SP2. Reset Com Reset the communication to the pedestal regarding Com Mode, Com Port and IP/Port settings. Release Com Release the communication to the pedestal.
Library Security Pedestal 2 Lowest Block First (ISO15693 only) Activate this option if you want the lowest memory block to be presented first in the database Synchro Select whether the pedestal is to be configured as the Master or as the Slave (1, to …8) Pedestal Number: set the total number of pedestals (master + slaves) in close proximity and sharing the same ID. Select ID (same ID for Master and slaves for one system installation) Only one Master can be selected with several slaves.
Configuration Once you have set the basic configuration check that all the slaves are well synchronized. To do so, L-SP2 electronics unit green LEDs should flicker cyclically. If not, proceed to the advanced configuration stage. Database Each time an item (with EAS/AFI activated) passes through the gates an entry is added to a local database in L-SP2 memory. This entry holds the following information: The date and time to which the theft was committed.
Library Security Pedestal 2 Date & Time The top of this section continuously displays date and time of the pedestal. Click “Synchronize Time” to synchronize the pedestal to the PC clock. Be advised that this time will be used as a date stamp when a theft is committed. Antenna Noise Level These bar graphs provide a feedback regarding the ambient noise level measured by each antenna. It is only provided as debug purpose and should no be seen as a measure of performance.
Configuration When using Hardwire synchronization, as described in 5.2.4, there is no parameter to be defined. When using Wireless synchronization, as described in 5.2.3, you have to carefully setup each pedestal to ensure a proper synchronization.
Library Security Pedestal 2 The power can be lowered to avoid disturbing nearby RFID system (in such case check system performance) CAUTION: The L-SP2 pedestal has been tested to be compliant with FCC and CE rules (with P = 4 W) Antenna Sequence It allows choosing antenna used by the EAS detector Select (Top>Center>Bottom> Center) for standard operation or specifically an antenna for diagnosis operations (Top, Center or Bottom) Report Interval If the same item passes through the gate several times, it wil
Configuration Alarm Buzzer Volume Adjustment The alarm buzzer is located at the top of the pedestal. To access to the buzzer potentiometer, unscrew the two screws on each side and remove the top cover as shown in the following figures. Figure 22: Front View Top Cover Screw Screw Figure 23: Alarm Potentiometer Turn it clock wise to decrease volume July 2008 Revision 4.
Library Security Pedestal 2 5.5 People Counter Management The people counter information reported using the Ethernet connection is battery backed-up. It is not the case for the LCD display. If powered off, the information displayed on the LCD display will be reset to zero. 5.5.1 Resetting the Local People Counter To reset the LCD display use a pointed element (for example: a paper clip). Insert it in the hole under the display window and press (not too strong) until you get zero displayed.
Antenna Tuning 6 Antenna Tuning The successful operation of the L-SP2 depends largely on: The antenna being tuned to the correct resonance frequency (impedance), Antenna isolation being adjusted to its optimal value. During on-site tuning, antennas are decoupled to ensure that the minimum amount of energy is delivered from one antenna to another. Note that antennas are tuned before shipping and should not require any further adjustments on site.
Library Security Pedestal 2 100 MHz analog bandwidth (-3 dB) 5mV/division vertical resolution 10ns/div horizontal time base resolution The measurements are taken on the sine wave and repetitive carrier signal, so when using a digital scope, the sampling rate should be at least twice the maximum analog bandwidth. 6.1.3 Probes At least one standard probe (not supplied with the TAGSYS Antenna Tuning Kit) will be required for measuring a trigger signal for the normal tests.
Antenna Tuning Figure 25: Antenna Tuning (Impedance) L-SP2 Figure 26: Antenna Connection Antenna 1 Antenna 2 Antenna 3 Table 4: Oscilloscope Settings Parameter Value “Measure” Channel Sensitivity 1 V/Div. “Reference” Channel Sensitivity 2 V/Div. Time Base 20 ns/Div. The antennas should be tuned in the following order: top, center and then bottom. July 2008 Revision 4.
Library Security Pedestal 2 For the best impedance, adjust the trimmer capacitors (Figure 27) until the two curves on the oscilloscope are exactly superimposed. For optimal performances, the two trimmer capacitors should be set to approximately the same angle. Please see Figure 28 . Figure 27: Trimmer Capacitor Trimmer capacitor Figure 28: Adjusting Trimmer Capacitors The individual impedance for each antenna should be tuned to be as close as possible to: Z0 = 50±5 + 0j±5 Ω at 13.
Antenna Tuning 6.3.2 Using an Impedance Analyzer If an impedance analyzer is available, connect each antenna in turn directly to the impedance analyzer and tune the antennas in the following order: top, center and then bottom.
Library Security Pedestal 2 6.4 Adjusting the Antenna Isolation Once each antenna is tuned for optimal impedance (see section 6.3 “Adjusting the Antenna Impedance”), it is necessary to verify the isolation of each antenna. Correct antenna isolation is not greater than –19-20 dB or 600-mVpp residual peak-to-peak voltages collected on either the top or bottom antenna when the center antenna is powered by the tuning kit sine wave carrier generator.
Antenna Tuning Figure 33: Antenna Adjustment Screw Adjustment screw The center antenna always remains fixed in position and connected to the antenna-tuning device. The other two antennas should be slightly loosened so they can be moved with relative ease but do not move on their own (Figure 33) The isolation should be checked as follows: 1. Adjust the position of the bottom antenna with respect to the center antenna. 2.
Library Security Pedestal 2 6.4.2 Using an Impedance Analyzer If an Impedance Analyzer is available, perform the same procedure as described for the Antenna Tuning Kit.
Antenna Tuning Note that the isolation adjustment process often requires repeating the procedure several times between the top and center antennas and between the center and bottom antennas. This means that it is normally more difficult to achieve good results of isolation between the center and bottom antennas. Therefore, it is important to check and minimize the isolation between the center and bottom antennas before moving to the top and center antennas.
Library Security Pedestal 2 7 Operation 7.1 Theory of Operation The RF motherboard in the electronics unit produces radio frequency (RF) electromagnetic signals that are transmitted via the antennas in each pedestal. Each antenna transmits for a short period, receives for a short period, and is inactive for the remainder of the time.
Maintenance 8 Maintenance 8.1 Servicing the Pedestals No regular servicing or maintenance is required, except for keeping the covers clean, and occasionally checking the integrity of the cover seals. It is recommended that the pedestal unit be inspected at least once per year by an approved TAGSYS technical representative. Refer to section 1.2 “Care and Maintenance” for general maintenance information. 8.
Library Security Pedestal 2 8.3 Upgrading the DSP Firmware DSP Firmware upgrade is carried on via the L200 Explorer software using either the RS232 cable or the Ethernet interface. Please see L200 Explorer user's guide for more details about upgrade process. CAUTION: While upgrading the DSP Firmware, the serial cable or the Ethernet interface MUST NOT be disconnected or the L-SP2 pedestal will not be functional anymore.
Troubleshooting 9 Troubleshooting The following table lists the most common problems and describes their solutions. Table 6: Troubleshooting Table Fault Possible Causes Differential or breakers System fuse No power micro Cabling fault. Power cable fault Solution circuit Check the differential and micro circuit breaker status Replace fuse. Check cabling and connections. Replace any suspected faulty cables. Alarms missed (TAGSYS RFID tags with theft bit ON not triggering Tuning fault. alarms).
Library Security Pedestal 2 10 Technical Specifications 10.1 Mechanical Data Parameter Weight Pedestal dimensions (H x W x D) Connection for pedestal Value Pedestal: 34 kg (75 lb) Approx. 1777 mm x 640 mm x 80 mm (70 x 25.2 x 3.15 in) assembled Supply power cable and Ethernet cable if available 10.2 Electrical Data Parameter Power supply Power consumption Conformity Microchip compatibility Operating temperature Storage temperature Fuse on AC mains Fuse on DC supply Value 100/240 Volts AC, 0.
Technical Specifications Figure 36: Mechanical Dimensions of Pedestal Base Figure 37: Mechanical Dimensions of Pedestal Base July 2008 Revision 4.
Library Security Pedestal 2 11 Performance Test 11.1 Test Conditions Distance between each pedestal not greater than the maximum recommended distance of 915 mm (3 ft.). All tags used must have the theft bit set. Use of reference tag (Antenna Tuning Kit Test Card) is strongly recommended for repeatable results. Testing to be carried out at walking pace (maximum of 1 meter/second). Metal, conductive materials, human hands or body must not shield tags.
Performance Test L-SP2 EAS Performance Test Library / Facility installed: _______________________________ Location of Pedestals: _______________________________ Specific installation notes: _______________________________ Figure 40: Test Chart Pedestal A Pedestal B S/N: S/N: Software Version: Software Version: 183mm. 366 mm. 549 mm. 732 mm. Zone 1 Zone 5 Zone 6 Zone 10 Zone 11 Zone 15 1320 mm. 920 mm. 520 mm.
Library Security Pedestal 2 12 Warranty Conditions TAGSYS warrants that its L-SP2 shall comply with the functional specifications set forth herein for a period of one year from the date of delivery to the Buyer. This warranty is valid for the original Buyer of the Product and is not assignable or transferable to any other party.
Warranty Conditions 12.2 General Provisions This warranty sets forth the full extent of TAGSYS responsibility regarding the Product. In any event, TAGSYS warranty is strictly limited to (at TAGSYS’ sole option) the replacement or refund of the Products purchase price to TAGSYS, of Products considered as defective by TAGSYS.
Library Security Pedestal 2 Product Return Form Customer Profile: Company: ………………………………….. Address: …………………………………………………………… …………………………………………………………… City & State: ………………………………….. Zip Code: ………………………………….. Country: …………………………………... Order identification: Product Name: ………………………………….. Order Number (OEF): Contact Name: …………………………………. Contact e-mail: …………………………………. Contact Phone: …………………………………. Contact Fax: …………………………………. Invoice Number: …………………………………. Return Quantity: ………………………………….