Page 4
ALL RIGHTS RESERVED Datalogic reserves the right to make modifications and improvements without prior notification. Datalogic shall not be liable for technical or editorial errors or omissions contained herein, nor for incidental or consequential damages resulting from the use of this material.
COMPLIANCE Datalogic S.p.A Via Candini 2 40012 Lippo di Calderara di Reno -Bologna Italy Model:LYNX D432 See Package for C04C06945 patent listing 10 - 30V C04C06945 0.75 A CAUTION-CLASS 2 LASER LIGHT WHEN OPEN DO NO T STARE INTO BEAM...
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
Aiming System The Lynx™ D aiming system meets the requirements for laser safety. CAUTION-CLASS 2 LASER LIGHT WHEN OPEN DO NOT STARE INTO BEAM LASER LIGHT - DO NOT STARE INTO BEAM CLASS 2 LASER PRODUCT MAX. OUTPUT RADIATION 0.25 mW - EMITTED WAVELENGTH 640~660 nm TO EN 60825-1:2001 LASERSTRAHLUNG –...
Page 15
The product utilizes a low-power laser diode. Although staring directly at the laser beam momentarily causes no known biological damage, avoid staring at the beam as one would with any very strong light source, such as the sun. Avoid that the laser beam hits the eye of an observer, even through reflective surfaces such as mirrors, etc.
Page 16
Laserstrahl zu schauen, genauso wenig wie in starke Lichtquellen (z.B. die Sonne). Vermeiden Sie es, den Laserstrahl weder gegen die Augen eines Beobachters, noch egen reflektierende Oberflächen zu richten. FRANÇAIS Les informations suivantes sont fournies selon les règles fixées par les autorités ternationales et se réfèrent à...
The Lynx™ D Hand-Held Reader is not user-serviceable. Opening the case of the unit can cause internal damage and will void the warranty. CAUTION EEE COMPLIANCE POWER SUPPLY This device is intended to be supplied by a UL Listed or CSA Certified Power Unit arked "Class 2"...
SERVICES AND SUPPORT Datalogic provides several services as well as technical support through its website. Log on to www.datalogic.com and click on the links indicated for further information including: • PRODUCTS Search through the links to arrive at your product page where you can download specific Manuals and Software &...
INTRODUCTION INTRODUCTION LYNX™ D DESCRIPTION The Lynx™ D Hand-Held Reader packs a lot of performance into an attractive, rugged, hand-held device. It operates in commercial and industrial environments as well as the front office. Omni-directional To read a symbol or capture an image, you simply aim the Operating reader and pull the trigger.
Appendix D. 1.3.2 Using VisualSetup The Datalogic VisualSetup program, available on the CD-ROM provided, allows programming the reader by selecting configuration commands or printing them through a user-friendly graphical interface running on the PC. These commands are sent to the reader over the current communication interface; or they can be printed to be read.
USING LYNX™ D USING LYNX™ D AIMING SYSTEM The Lynx™ D reader uses an intelligent aiming system similar to those on cameras. By partially pulling the trigger, the aiming system indicates a field of view to be positioned over the code: Figure 1 - Aiming System When you pull the trigger completely a red beam illuminates the code.
LYNX™ D The field of view indicated by the aiming system will be smaller when the Lynx™ D is closer to the code and larger when it is farther from the code. Symbologies with smaller bars or elements (mil size) should be read closer to the unit. Symbologies with larger bars or elements (mil size) should be read farther from the unit.
USING LYNX™ D You can use the aiming system to position the reader from the object (ensure the reader is about centered over the target). Adjust the distance at which you are holding the reader (see Figure 2). If the RS232 interface has been selected, the image will be transferred to the host PC via XMODEM_1K protocol.
LYNX™ D 2.3.2 Advanced Configuration Parameters An image portion (Window), instead of an entire image, can be captured. This parameter is generally used for particular fixed reading position applications. height width An Image Window may either be as large as the image itself or smaller (10 x 10 pixels minimum), and is defined by its origin (the coordinate X ), its width (number of pixels along the X Axis) and its height (number of pixels along the Y Axis).
USING LYNX™ D The same range of values (–100% up to 100%, in steps of 1%) is available for Contrast Adjustment. Positive values will increase the contrast, so that dark and bright objects inside the image will be better distinguishable. Default value is 0%, which means that no contrast adjustment is performed.
LYNX™ D CAMERA CONTROL Exposure and Calibration Two different control modes are available for managing the camera: automatic mode and fixed mode. The automatic mode provides three different options to get the best tuning of the image to be captured: Automatic based on entire image: camera control mode based on the analysis of the whole image.
USING LYNX™ D DEFINING DATA FORMATTING The string of a decoded code to be sent to the host may be formatted as follows: • defining simple data formatting (see page 40); • defining advanced data formatting giving complete flexibility in changing the format of data (see par.
LYNX™ D 2.6.1 Concatenation It is possible to concatenate up to 4 different codes, set their length and enable the intercode delay between them (the intercode delay is set in the specific interface parameters, see page 25, 27 and 32). When enabling the delay one or more global headers and terminators are added to the decoded data.
INITIAL SETUP INITIAL SETUP This procedure allows setting up the reader to operate with the default settings: Whenever you need to change the default values refer to par. 4.2. RS232 INTERFACE SELECTION The Lynx™ D reader requires the RS232 interface cable and the AC/DC power adapter to be connected.
LYNX™ D WEDGE INTERFACE SELECTION The Lynx™ D reader requires the Wedge interface cable and the AC/DC power adapter to be connected. To install and configure your reader with the Wedge interface, follow these instructions: Make all the Lynx™ D reader connections as shown in Figure 4: Figure 4 –...
INITIAL SETUP When not using the Lynx™ D reader remember to disconnect the Wedge interface from the PC before disconnecting the power cord. CAUTION While using the Lynx™ D it is always necessary to use cables adopting an external power supply. NOTE USB INTERFACE SELECTION he Lynx™...
Page 32
OM the relevant files and drivers must be installed from the USB Device Installation software which can be downloaded from the web site http://www.datalogic.com • r USB Keyboard and for USB Generic HID the correct USB driver is cluded in the Host Operating System and will either be loaded tomatically or will be suggested by the O.S.
Page 33
INITIAL SETUP The Lynx™ D reader is a USB self-powered device. NOTE If you need to change the USB device interface, after having reconfigured the reader, you have to disconnect and reconnect the cable to the PC. NOTE...
LYNX™ D CONFIGURATION USING CODE SYMBOLS This section describes the programming method of using configuration code symbols to program your reader. By using the Lynx™ D reader to read/decode these special configuration symbols, you can configure, and obtain information from its system software.
CONFIGURATION USING CODE SYMBOLS DEFAULT SETTINGS Configuration Field Default Setting RS232 Communication Baud Rate 115200 Parity, Data Bits, Stop Bits No parity; 8 Data bits; 1 Stop bit Handshake None ACK/NACK Protocol None FIFO Enabled Intercharacter Delay Intercode Delay RX Timeout 10 seconds USB COM Emulation Handshake...
Page 36
LYNX™ D Configuration Field Default Setting Data Format-Symbology Dependent Parameters Symbology Specific Format Select All Header Symbology No headers Terminator Symbology No terminators Symbology Character Substitution No character to substitute Symbology Character Deletion No character to delete Data Format-Concatenation Concatenation Disabled Define Concatenation 2 EAN/UPC codes concatenated...
Page 37
CONFIGURATION USING CODE SYMBOLS Configuration Field Default Setting Code 32 Selection Disabled Interleaved 2 of 5 Selection Enabled - check digit control and tx Code Length Check Disabled Minimum Length Maximum Length Codabar Selection Disabled Code Length Check Disabled Minimum Length Maximum Length Code 128 Code128 Selection...
Page 38
LYNX™ D Configuration Field Default Setting Data Matrix Selection Enabled - normal & inverted Rectangular Style Enabled Minimum Code Length 0001 Maximum Code Length 3600 Selection Enabled Postal Codes Selection Disabled Maxicode Maxicode Mode 1 Disabled Maxicode Mode 2 Disabled Maxicode Mode 3 Disabled Maxicode Mode 4...
Page 39
CONFIGURATION USING CODE SYMBOLS Configuration Field Default Setting Reading Parameters (continued) Autoscan Illumination System Disabled Safety Time 500 ms (if Autoscan mode or Software trigger type is selected and the Multiple Reads per Cycle option is enabled. Image Formatting Image Preset 1, 2, 3, 4 Image Format JPEG format Resolution...
LYNX™ D CHANGING DEFAULT SETTINGS Once the reader is setup, you can change the default parameters to meet your application needs. Refer to the preceding paragraphs for initial configuration in order to set the default values and select the interface for your application. In this manual, the configuration parameters are divided into logical groups making it easy to find the desired function base on its reference group.
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK RS232 AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL RX T IMEOUT RX Timeout AODKBPHMFNGNENEIEPANHOGOCK Read a number in the range AHPNIJAMDKEOFMHMLJALFFCFIK AKCBPJCJGIIJCMCEGJNHKMOHPK 00-99, where: AEFBJLBGMHPLMOFHAGONLNCEGK AAPHBAJJDFAAALCKIJIBHMDDFK = disabled AFKFAMNLMCOCGLMJDCDIENPLKK...
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL EYBOARD ATIONALITY This parameter default value is restored through the Interface Selection code and not Restore Default. Belgian English AOAPCOGMHNGNENEIEPANHOGOCK AOAPCOHMHNGNENEIEPANHOGOCK...
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL EYBOARD PEED This parameter default value is restored through the Interface Selection code and not Restore Default. Normal Fast AOAPBPGMFNGNENEIEPANHOGOCK AOAPBPHMFNGNENEIEPANHOGOCK...
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK WEDGE AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL AOCOCOHMHNGNENEIEPANHOGOCK AHHPMJAMDKEOFMHMLJALFHCGIK AKCBPJCJGIIJCMCFHONBADFLJK AEFBJLBGMHPKNIEKDOIAILNEGK AAPHBAJJCEHMLKBNKBBBBBCHFK AHKFALMFNCNOMKPODNGAEGPIIK DDLLLLLDLDLLLLLDLDDDDLDLLL EYBOARD ETTING The values set by this procedure are not effected by the Restore Default code but will be lost if the Interface Selection code is read.
Page 52
WEDGE Some ASCII characters may be missing as this depends on the type of keyboard: these are generally particular characters relative to the various national symbologies. In this case: • The first 4 characters (Shift, Alt, Ctrl, and Backspace) can only be substituted with keys not used, or substituted with each other.
Page 53
WEDGE Acoustic Signals Four types of acoustic signals are associated with the following steps: Enter keyboard setup Exit keyboard setup SHIFT, ALT, CTRL, BACKSPACE keys Keyboard keys (SHIFT, ALT, CTRL, BACKSPACE excluded) These signals facilitate the selection of those characters requiring more than one key pressed simultaneously.
WEDGE XTENDED EADER ERMINATOR For the WEDGE interface, the following extended keyboard values can also be configured: These values are restored through the Interface Selection code and not Restore Default. EXTENDED KEYBOARD TO HEX CONVERSION IBM AT ENTER HOME PG UP PG DOWN ↑...
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK WEDGE AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL USTOM XTENDED EADER ERMINATOR Set Extended Keys AOCOBLHMFNGNENEIEPANHOGOCK AHPNIJAMDKEOFMHMLJAKFAHEIK AKCBPJCJGIIJCMCEGJMDPHOPJK AEFBJLBGMHPKNMHNBGHNEDDEGK AAPHBAJJCBCBJNFHFHFBFPJNHK AFLFAOPHBFNMIOAIIIOEMAEJLK DLLLLLLDDDLLLLLDLDDDDLDLLL The extended Header/Terminator keys for Wedge Interface users can be customized by defining them through a simple keyboard setting procedure.
Page 56
WEDGE If the first 4 KEYS (Shift, Alt, Ctrl, and Backspace) are not available on your keyboard, you can only substitute them with keys not used, or substitute them with each other. The reader signals the end of the procedure with 3 beeps indicating the keys have been registered.
Page 57
WEDGE Acoustic Signals Four types of acoustic signals are associated with the following steps: Enter keyboard setup Exit keyboard setup SHIFT, ALT, CTRL, BACKSPACE keys Keyboard keys (SHIFT, ALT, CTRL, BACKSPACE excluded) These signals facilitate the selection of those characters requiring more than one key pressed simultaneously.
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK DATA FORMAT AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL DATA FORMAT The Data Format parameters can be restored to their default values using the following methods: the general “Restore Default”...
AHHPMBAMDKEOFMHMLJALEGCEIK AKCBPJCJGIIJCMCEGKJIDLDDLK AEFBJLBGMHPLMPGPPHKFDNJHGK AAPHBAJJCBHPJOJIKGAGPFMNBK AFLFAINIOIDAKBHBLJNIIBHJJK DLDLLLLDDLLLLLLDDLDDDLDLLL USTOM DENTIFIER Custom Code Identifier AOCPBLHMHNGNENEIEPANHOGOCK Select a Datalogic Standard Code AHPNIJAMDKEOFMHMLJALEHFHIK AKCBPJCJGIIJCMCFGJLLDNBJNK Identifier from the Code Identifier AEFBJLBGMHPKNOGANCECFEMGGK AAPHBAJIDDGNCMJCAFDEFOFNHK Table in Appendix AEKFALLKNIIMEADJNKJEAODLJK DLDLLLLDDDLLLLLDLLLDDLDLLL Set the number of characters in the range 0-3, where 0 = Code ID disabled.
The “Symbology Specific Format Default” code on page 46 allows restoring the symbology dependent parameters related to a specific code family to the default values. YMBOLOGY PECIFIC ORMAT Symbology Specific Format AOCLCIHOFNGNENEIEPANHOGOCK Select a Datalogic Standard Code AHPNIBAMDKEOFMHMLJAKEGHGIK AKCBPJCJGIIJCMCFHLNMJCGPLK Identifier from the Code Identifier AEFBJLBGMHPLMMGPEPDOAPMGGK AAPHBAJJDCFMDNCMBONAPKCNHK Table in Appendix AGKFALICLLGKIBEJGFOCKENJLK...
AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL YMBOLOGY HARACTER UBSTITUTION Symbology Character Substitution AOCPBLHMHNGNENEIEPANHOGOCK Select a Datalogic Standard Code AHPNIJAMDKEOFMHMLJAKFAGGIK AKCBPJCJGIIJCMCFGLKMBHMJPK Identifier from the Code Identifier AEFBJLBGMHPKMKHEEDGFDMGHGK AAPHBAJJDCFDBILOKBFBDLPDDK Table in Appendix AHKFAINIMEHCEPHBKFHEKPGIIK DLLLLDLDDLDLLLLDLDDDDLDLLL Read the corresponding character as Hex value from the Hex/Numeric table which identifies the character to be substituted.
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK DATA FORMAT AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL Concatenation Options IRST ONCATENATED ENGTH Set First Concatenated Code Length AOCLCKHOBNGNENEIEPANHOGOCK Read the number in the range AHHPMBIMDKEOFMHMLJAKEABHIK AKCBPJCJGIIJCMCFHLKPMKFPLK 000-255.
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK POWER SAVE AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL POWER SAVE LLUMINATION YSTEM OWER Illumination System OFF Low Power APDMCOHMHNGNENEIEPANHOGOCK APDMCOHMHNGNENEIEPANHOGOCK AHHPMJAMDKEOFMHMLJALFFFHIK AHHPMBIMDKEOFMHMLJALFDHEIK AKCBPJCJGIIJCMCFGOLCIKNHNK AKCBPJCJGIIJCMCFHPIOCFGJLK AEFBJLBGMHPLNPBMDCLPNODEGK AEFBJLBGMHPLNIGIMHMDHIIFGK AAPHBAJJCDDHDGLDACHDFPBJHK...
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK CODE SELECTION AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK Linear Symbologies AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL Maximum Code Length APCLBLFOFNGNENEIEPANHOGOCK Read the number in the range AHPNIJAMDKEOFMHMLJALEDAHIK AKCBPJCJGIIJCMCEGJMLKGPPPK 001-255. AEFBJLBGMHPKMKFDFMMJOOBHGK AAPHBAJJCBDNNGHKHKNHKCAJBK AEKFAINHJPFMGGDCLJBACEPKKK DDDLLLLDLDLLLLLDDLLDDLDLDL...
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK READING AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK PARAMETERS AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL Code Ordering and Selection ODES PER One Code per Scan All Codes per Scan APCKGOHMFNGNENEIEPANHOGOCK APCKGOHMFNGNENEIEPANHOGOCK AHHPMJAMDKEOFMHMLJAKEGEFIK AHHPMBIMDKEOFMHMLJAKEAGGIK AKCBPJCJGIIJCMCEHKJFDDGFPK...
Set Order APBPBPFOHNGNENEIEPANHOGOCK Select the number of codes AHPNIJAMDKEOFMHMLJAKEEAHIK AKCBPJCJGIIJCMCFGPKMGNENLK in the range 0-9. AEFBJLBGMHPKNJGKFLAALGHHGK AAPHBAJJCFCGFDNNCBIJALKDHK Select Datalogic AGLFALNLKIAEAMIJIJEICMAIIK DLLLLLLDLDDLLLLDLDLDDLDLLL Standard Code Identifier for each above defined code from the table in Appendix See par. 2.6 for details. Autoscan UTOSCAN...
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK CAPTURE IMAGE AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL CAPTURE IMAGE In order to capture an image, you should read one of these codes (for further details see par.
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK ADVANCED AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK IMAGE CAPTURE AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL Advanced Configuration – INDOW IMENSIONS PRESET Origin along X Axis APCNBLHMDNGNENEIEPANHOGOCK Read a number in the range AHPNIJAMDKEOFMHMLJAKFCHGIK AKCBPJCJGIIJCMCFHLIPJCENLK 0-630...
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK ADVANCED AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK IMAGE CAPTURE AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL Advanced Configuration – INDOW IMENSIONS PRESET Origin along X Axis APCJFPHMDNGNENEIEPANHOGOCK Read a number in the range AHPNIJAMDKEOFMHMLJALEDDHIK AKCBPJCJGIIJCMCEHNIMGJFPLK 0-630...
Enter Gun Configuration Exit and Save Gun Configuration AMHKGMHOFNGNENEIEPANHOGOCK AMHKCMHOFNGNENEIEPANHOGOCK ADVANCED AHPNIBAMDKEOFMHMLJALFCAFIK AHPNIBAMDKEOFMHMLJALFEGFIK AKCBPJCJGIIJCMCEGOODCCEDJK AKCBPJCJGIIJCMCEGLJKNEBJLK AEFBJLBGMHPLNPGLABJHFIAEGK AEFBJLBGMHPLMIFPAFAIIBNHGK IMAGE CAPTURE AAPHBAJICCBGBIAFNLNLLAINDK AAPHBAJIDGDHOJDKAICECIENBK AFLFBPPCOIHKILNFFOCKOLJILK AGLFBOMJMHLIGBPCKIGAGOEKLK DLDDLDDLDDLLLLLDDDLDDLDLLL DDLDLDDLLLDLLLLDDDDDDLDLDL Advanced Configuration – INDOW IMENSIONS PRESET Origin along X Axis APCJFLHMDNGNENEIEPANHOGOCK Read a number in the range AHPNIJAMDKEOFMHMLJAKEBFFIK AKCBPJCJGIIJCMCFHKOLBHLNJK 0-630...
CONFIGURATION USING CODE SYMBOLS ADVANCED DATA FORMAT Advanced data format has been designed to offer you complete flexibility in changing the format of barcode data before transmitting it to the host system. Up to 5 advanced code management formats can be defined by completing the four given procedures following the desired order: −...
CONFIGURATION USING CODE SYMBOLS STEP 2 FORMAT DEFINITION Method 1 - Extracting Information from Barcode Method 1 allows extracting one or more fields by position or by characters from the decoded barcode. These fields are sent to the host computer as data of the output message, while the characters not included in the formatting procedure will be deleted and not inserted in the output message.
Page 114
LYNX™ D Example Method 1 Extracting Information from Barcode Decoded code: <DATALOGICproduct> Formatting procedure: Add new string + Extract field by position + Add new string + Extract field by character + Add new string Add New String String character(s) End String ANGOGIFKDNGNENEIEPANHOGOCK ANGOGIFKDNGNENEIEPANHOGOCK...
CONFIGURATION USING CODE SYMBOLS FIELD EXTRACTION BY CHARACTER Define Field Starting Character(s) Field Starting Character(s) AOCKHMFKFNGNENEIEPANHOGOCK Read the Hex value from the Hex/Numeric table AHJLJFGOPKEOFMHMLJALEDGHKK AOJDPBCJGIIJCMCEGNOJDNBPEK identifying the starting character(s) of the field to be AIFBJLBGMHPLNIDFFINJEEAJOK AAPHBAJICCGOBPPLKMDJODJLBK extracted. Valid values are in the range 00-7F. AHLFALLKHHHKCDLGLEPOABEKIK DLDLDLLDLDDLLLLDDDLDDLDLLL Define Field Ending Character(s)
LYNX™ D FIELD EXTRACTION BY POSITION Define Field Starting Position Field Starting Position AOBLHMFKFNGNENEIEPANHOGOCK Read a number corresponding to the field starting AHJLJDHODKEOFMHMLJAKFAAEKK AOJDPBCJGIIJCMCFHLLMNMLLCK position. AIFBJLBGMHPKNODINAHHKIIIOK AAPHBAJJCEENANJPDPICKJMNDK AELFAOIHAAIMAJHDEOOCAELIJK DDLLDLLDLDLLLLLDLLLDDLDLDL Define Field Ending Position Field Ending Position Last Position AMHMGIFKDNGNENEIEPANHOGOCK AODIHMFKFNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJAKFAEHIK AHJLJDHODKEOFMHMLJAKECEFKK AKCBPJCJGIIJCMCEGJNNFJBHPK...
Page 117
CONFIGURATION USING CODE SYMBOLS ADD NEW STRING Define New String String Character(s) Read the Hex value from the Hex/Numeric table ANGOGIFKDNGNENEIEPANHOGOCK AHPNIBAMDKEOFMHMLJAKFCDGIK AKCBPJCJGIIJCMCEHJLONAJLLK identifying the character(s). Valid values are in the range AEFBJLBGMHPLMJGBFHKLALDGGK AAPHBAJJDECHGDKMOEDDMEBJBK 00-7F. AHLEBNKAODJIMPLGJNNKMCKJIK DDDLLLDDDLDLLLLDLDDDDLDLDL End String End String ANGOGIFKDNGNENEIEPANHOGOCK Read the code to end the string defined in step a.
LYNX™ D Method 2 - Manipulating the Barcode Data Method 2 allows modifying the barcode data by means of one of the following procedures: − String insertion; − String deletion; − String substitution; − Field deletion. Once the data has been modified, it is sent to the host computer as data of the output message.
CONFIGURATION USING CODE SYMBOLS STRING INSERTION To complete this procedure proceed as follows: Define Format 1, 2, 3, 4, or 5 Add String? Add new String Insert String Add String? Add new String End Format Definition Example Decoded code: <DATALOGICproduct> Formatting procedure: Add new string + Insert String Add New String String...
LYNX™ D String Insertion Procedure Insert String Insert String APCJHMFKFNGNENEIEPANHOGOCK Read the Hex value from the Hex/Numeric table AHJLJFGOPKEOFMHMLJAKFBEFKK AOJDPBCJGIIJCMCFGNNKPHPHEK identifying the characters to be inserted. Valid values are AIFBJLBGMHPKMNFKECEKLIIKOK AAPHBAJJCHGNHBHGFNLIIFKNBK in the range 00-7F. AGLFAPNMBCJCECKOAHGMMHGJIK DLLLDLLDLDDLLLLDDLLDDLDLLL Define String Position String Position ANGKGIHOFNGNENEIEPANHOGOCK Read a number corresponding to the string position within...
CONFIGURATION USING CODE SYMBOLS STRING DELETION To complete this procedure proceed as follows: Define Format 1, 2, 3, 4, or 5 Add String? Add new String Delete String Delete Add String? Add new String End Format Definition Example Decoded code: <DATALOGICproduct> Formatting procedure: Delete First String + Delete Second String + Add New String.
LYNX™ D String Deletion Procedure Delete String Delete AMHLGLEKHNGNENEIEPANHOGOCK Read the Hex value from the Hex/Numeric table AHLNEBIMDKEOFMHMLJAKEDDEJK AKCBPJCJGIIJCMCEHKMCKLPJPK identifying the string character(s) to be deleted. Valid AEFBJLBGMHPLMMEILNAAMKFHGK AAPHBAJIDFHJHFNFIEAPKCANBK values are in the range 00-7F. AFKFAIMEHLPACFEFIKDEGEPKLK DLDLLLLDDLLLLLLDDDLDDLDLDL (optional) Select Other Strings to be Deleted Loop ANGKBPDMFNGNENEIEPANHOGOCK Read the code above and repeat the procedure from step...
CONFIGURATION USING CODE SYMBOLS STRING SUBSTITUTION To complete this procedure proceed as follows: Define Format 1, 2, 3, 4, or 5 Add String? Add new String Substitute String Add String? Add new String End Format Definition Example Decoded code: <DATALOGICproduct> Formatting procedure: Add new string + String substitution + Add new string.
Page 124
LYNX™ D String Substitution Procedure Define String to be Substituted Substitute String APAKHMFKFNGNENEIEPANHOGOCK Read the Hex value from the Hex/Numeric table AHJLJFGOPKEOFMHMLJAKEDHGKK AOJDPBCJGIIJCMCEGOLKBIGLCK identifying the characters of the string to be substituted. AIFBJLBGMHPLNKFOPDLBPKNKOK AAPHBAJICGBMGPOCHHEBNAMFHK Valid values are in the range 00-7F. AHLFAKKFLHGOGEAFKMLMANFIKK DDLLDLLDLLDLLLLDLDLDDLDLLL Define Substituting String...
CONFIGURATION USING CODE SYMBOLS FIELD DELETION To complete this procedure proceed as follows: Define Format 1, 2, 3, 4, or 5 Add String? Add new String Delete Field Delete Add String? Add new String End Format Definition Example Decoded code: <DATALOGICproduct> Formatting procedure: Delete First Field + Delete Second Field + Add New String.
Page 126
LYNX™ D Field Deletion Procedure Delete Field Delete AMHLGLEKHNGNENEIEPANHOGOCK Read the code to enable the command deleting the field. AHHPEBIMDKEOFMHMLJALEAHEIK AKCBPJCJGIIJCMCEHILFPJABJK AEFBJLBGMHPKNIFAMGIDOBPFGK AAPHBAJIDBDPFCPCBLBBIHELFK AGLFAMKAJEOIKHFKIGKEMGNILK DDLLLLLDLLLLLLLDDLDDDLDLLL Define Field Starting Character Field Starting Character AOCKHMFKFNGNENEIEPANHOGOCK Read the Hex value from the Hex/Numeric table AHJLJFGOPKEOFMHMLJALEDGHKK AOJDPBCJGIIJCMCEGNOJDNBPEK identifying the starting characters.
Page 127
CONFIGURATION USING CODE SYMBOLS EITHER Add String AMHNGIFKDNGNENEIEPANHOGOCK To add a new string of characters read the code and AHPNIBAMDKEOFMHMLJALFCGEIK AKCBPJCJGIIJCMCEHKODEMDDPK follow the procedure described on page 110; AEFBJLBGMHPKMOBCLFFFACLGGK AAPHBAJIDBGAJHMKPCBLOPFBFK AHKEBMPDMCJKIFABFMGICEEIJK DLDLLLDDDLLLLLLDLLLDDLDLDL End Format Definition End Format Definition AOHPGIFKDNGNENEIEPANHOGOCK Read the code to end the format definition. AHPNIBAMDKEOFMHMLJALFDHEIK AKCBPJCJGIIJCMCEGPJNABHNLK AEFBJLBGMHPKMIGKBFNOFMEFGK...
Page 128
LYNX™ D ADD NEW STRING Define New String String Character ANGOGIFKDNGNENEIEPANHOGOCK Read the Hex value from the Hex/Numeric table AHPNIBAMDKEOFMHMLJAKFCDGIK AKCBPJCJGIIJCMCEHJLONAJLLK identifying the starting characters. Valid values are in the AEFBJLBGMHPLMJGBFHKLALDGGK AAPHBAJJDECHGDKMOEDDMEBJBK range 00-7F. AHLEBNKAODJIMPLGJNNKMCKJIK DDDLLLDDDLDLLLLDLDDDDLDLDL End String and Define Procedure End String Plus Procedure ANGKGMHOFNGNENEIEPANHOGOCK Read the code to end the string selection and continue...
CONFIGURATION USING CODE SYMBOLS 4.3.2 Match Conditions By setting one or more of the following conditions it is possible to select the codes to be formatted. Follow the given steps to define the desired condition: MATCH WITH PREDEFINED SUBSTRING Define Matching Substring Match with Substring AOCLFLFOHNGNENEIEPANHOGOCK Read the above code and:...
Page 130
1-5 corresponding to the AEFBJLBGMHPLMLHPOCDCLFDGGK AAPHBAJJCECGCJGBDFGBNLINBK desired format number; AHKFAILPHFEMACFDFLIEKIPKLK DDDLLDLDDLDLLLLDDDLDDLDLLL set the number of the matching code symbologies in the range 0-4; select the Datalogic Standard Code Identifier from the Code Identifier Table in Appendix...
LYNX™ D 4.3.4 Mismatch Result The result of each format may be set in case the match conditions previously selected are not satisfied. Once the desired formats have been enabled and a code has been read, the results corresponding to each format will be concatenated together and transmitted in the output message.
REFERENCES REFERENCES RS232 – USB COM 5.1.1 ACK/NACK Protocol The transmission protocol takes place between reader and Host. Once the reader has read a code, it emits a good read beep and passes its data to the Host. When ACK/NACK is disabled, there is no control from reader to Host transmission. When ACK/NACK is enabled, the Host sends an ACK character (06 HEX) in the case of good reception or the NACK character (15 HEX) requesting re-transmission, in the case of bad reception.
LYNX™ D USB KEYBOARD 5.2.1 Keyboard Speed This parameter manages the transmission speed of characters to the Host. A fast Keyboard Speed allows rapid transmission of a great amount of characters (for example 2D codes), but it might not be compatible with slower systems. CODE SELECTION 5.3.1 Issue Identical Codes...
REFERENCES CONFIGURATION EDITING COMMANDS The following commands carry out their specific function and do not require reading the Enter or Exit and Save Configuration codes. Command Description AMHKGPAOFNGNENEIEPANHOGOCK AHHPMBAMDKEOFMHMLJALECHGIK AKCBPJCJGIIJCMCFGPLCMMMNLK Restore Lynx™ D reader default configuration: AEFBJLBGMHPKMOGNKKNDPDMGGK AAPHBAJIDGHPOJKEFPNCEACBHK AFKFBKNGLGMOMELLGOPCMJFKIK DDDDLDLLLDDLLLLDDDLDDLDLDL AMHKGPBOFNGNENEIEPANHOGOCK AHHPMBIMDKEOFMHMLJAKECBEIK AKCBPJCJGIIJCMCEGNOKAKPHJK...
LYNX™ D TEST CODE SYMBOLS Use these 1D and 2D test symbols to check that the reader is imaging and decoding properly, according to your configuration. UPC-A 52637 48509 EAN-13 1 234567 000992 Code 39 (Standard) Code 128...
Page 137
TEST CODE SYMBOLS PDF417 DataMatrix (Normal) DataMatrix (Inverse)
LYNX™ D MAINTENANCE You do not need to perform regular preventative maintenance on the Lynx™ D reader. Do not try to open the case, because you might damage the interior electronic components and such action voids the warranty. You can keep your reader in good operating condition by: •...
TECHNICAL FEATURES TECHNICAL FEATURES LYNX™ D432 / D432E Common Features Electrical Features Operating Voltage 10 to 30 V Power Consumption @ 12V (Stand-by) 110 mA @ 12V (Typical) 245 mA @ 10V (Peak current) 305 mA Communications Features Standard Interfaces RS232, Keyboard emulation AT IBM, , USB COM emulation, USB Keyboard emulation Proprietary Interfaces...
Page 140
LYNX™ D LYNX™ D432 / D432E Common Features Optical Features Sensor 640 x 480 pixel element, 2D CMOS Array Illuminator LED array Wavelength In the range 630 ~ 670 nm Max. LED Output Power 0.896 mW LED Safety Class Class 1 to EN 60825-1 Aiming System Visible Laser Diode Wavelength...
Page 141
TECHNICAL FEATURES LYNX™ D432 Optical Features Focus distance 115 mm Field of view 21.8° (H) x 16.7° (V) Horizontal field of view at 0.4d + 12 distance (d) in mm Vertical field of view at 0.3d + 9 distance (d) in mm Max Resolution Linear codes - mm (mils) DataMatrix –...
Page 142
LYNX™ D LYNX™ D432E Optical Features Focus distance 65 mm Field of view 20° (H) x 15° (V) Horizontal field of view at 0.32d + 8.67 distance (d) in mm Vertical field of view at 0.24d + 6.50 distance (d) in mm Max Resolution Linear codes - mm (mils) DataMatrix –...
TECHNICAL FEATURES INDICATORS 8.1.1 Lynx™ D LED Indicators The following LED indicators signal the reader functions: Behavior at power on, blinks briefly, then a beep occurs. Then, it turns off. lights when a wrong read occurs. lights when the aiming system is enabled. It turns off only when the trigger is released and the aiming system is disabled.
LYNX™ D HOST CONFIGURATION STRINGS In this section we provide a description of how to modify the device configuration using serial strings sent from the Host. This method requires the RS232, USB-Com, USB Bulk or USB Generic HID interface. The device configuration can be changed by receiving commands from the Host through the current interface.
Page 145
HOST CONFIGURATION STRINGS SERIAL CONFIGURATION STRINGS ENTER/EXIT CONFIGURATION COMMANDS DESCRIPTION STRING Enter Configuration Exit and Save Configuration Restore Default $+$* Transmit Software Release $+$! Transmit Device Configuration in ASCII $?$& These commands do not require $- INTERFACE SELECTION DESCRIPTION STRING RS232 Standard CPA0...
Page 147
HOST CONFIGURATION STRINGS DATA FORMAT DESCRIPTION STRING Data Format Restore Default SYMBOLOGY INDEPENDENT PARAMETERS Code Identifier disabled EAA0 AIM standard Code ID EAA2 Code Length disabled ECA0 enabled ECA1 Set Headers no header EDA00 one character EDA01x two characters EDA02xx three characters EDA03xxx four characters...
Page 148
LYNX™ D POWER SAVE DESCRIPTION STRING Illumination System Power Illumination System OFF HAA0 Low Power HAA1 Intermediate Power HAA2 Maximum Power HAA3 CODE SELECTION DESCRIPTION STRING Disable All Symbologies AZA0 Disable All Linear Symbologies AXA0 Disable All 2D Symbologies AYA0 Issue Identical Codes disabled AWB0...
Page 149
HOST CONFIGURATION STRINGS CODE SELECTION DESCRIPTION STRING LINEAR SYMBOLOGIES Interleaved 2/5 disabled ACA0 enabled – no check digit control ACA1 enabled – check digit control and without transmission ACA2 enabled – check digit control and transmission ACA3 Code Len Check disabled ACB0 enabled...
PROGRAMMING FOR EXPERT USERS PROGRAMMING FOR EXPERT USERS This document is addressed to expert users who are familiar with software programming languages and want to define a personalized code formatting. The provided programming language allows creating either simple or complex formatting expressions by means of the basic functions connected together through the following operators: (, ), -, +.
Page 158
LYNX™ D CONVENTIONS DESCRIPTION Concatenates two strings or fields. Deletes a substring or a field from the original string. Returns the string which has been decoded by the library. #F<n> Returns the result of a format which has been previously defined.
Page 159
PROGRAMMING FOR EXPERT USERS SelectString (SSTR) This function has the following syntax: SSTR<source_string, pos_start, pos_end> string It extracts a substring whose characters are between "pos_start" and "pos_end" from the "source_string". If "pos_end" is longer than the "source_string" length, no error will be generated since the exceeding characters are ignored.
Page 160
LYNX™ D StringDiscard This function has the following syntax: string1 - string2 string This function discards all the strings having the same value as "string2" which can be found in "string1". If no "string2" is found within "string1", the result returns "string1". InsertString (ISTR) This function has the following syntax: ISTR<source_string, string1, position>...
PROGRAMMING FOR EXPERT USERS Examples The string transmitted is 12345abcdef3790 and corresponds to the #DS function, as defined in the programming language. expression SSTR<#DS,1,5> + SSTR<#DS,11,15> + SSTR<#DS,6,9> result 12345f3790abcd expression FSTR<#DS, 616263 , 616263 , 0> + SSTR<#DS,LSTR<#DS> -3, LSTR<#DS> result abc3790 expression...
Page 169
DATALOGIC S.p.A., Via Candini, 2 40012 - Lippo di Calderara Bologna - Italy dichiara che declares that the déclare que le bescheinigt, daß das Gerät declare que el LYNX D432, 2D Reader LYNX D432 E, 2D Reader e tutti i suoi modelli and all its models et tous ses modèles...