User’s Manual CK32 I-Safe Handheld Computer
User’s Manual CK32 I-Safe Handheld Computer
Intermec Technologies Corporation Worldwide Headquarters 6001 36th Ave.W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of allowing customers to operate and service Intermec-manufactured equipment and is not to be released, reproduced, or used for any other purpose without written permission of Intermec Technologies Corporation.
Document Change This page records changes to this document. The document was originally released as version 001. iii Version Date Description of Change 002 9/07 Removed keypad mapping information, corrected some material as requested by SAC, and made other miscellaneous changes to the manual.
iv CK32 I-Safe Handheld Computer User’s Manual
Contents Contents Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Safety Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Global Services and Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Warranty Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Web Support . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents 2 Understanding Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Understanding Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Finding Information in Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . Learning the Basic Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Today Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Programs. . . . . .
Contents Supplicant Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Configuring Security on the CK32 I-Safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Understanding the Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Using WPA Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Using Static WEP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Problems While Configuring Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Problems with Wireless Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Resetting Your Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Preferred Reset Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Secondary Reset Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Before You Begin Before You Begin This section provides you with safety information, technical support information, and sources for additional product information. Safety Information Your safety is extremely important. Read and follow all warnings and cautions in this document before handling and operating Intermec equipment. You can be seriously injured, and equipment and data can be damaged if you do not follow the safety warnings and cautions.
Before You Begin • The Intermec Models CK32 I-Safe, AB6 Battery Pack, AN1 Communications Adapter, and AC11 Battery Charger contain no user serviceable components. Return these models ONLY to Intermec Authorized Service Centers for Repair. Intrinsic Safety Certifications and Warranties will be void if these models are opened or serviced at locations not certified by Intermec. • Only Intermec provided spare parts should be used in the repair of the CK32 I-Safe and accessory products.
Before You Begin Telephone Support These services are available from Intermec. Services Description Order Intermec • Place an order. products • Ask about an existing order. Order Intermec Order printer labels and media ribbons. Order spare Order spare parts. parts Technical Talk to technical support Support about your Intermec product. Service • Get a return authorization number for authorized service center repair. • Request an on-site repair technician.
Before You Begin AWOO Systems 102-1304 SK Ventium 522 Dangjung-dong Gunpo-si, Gyeonggi-do Korea, South 435-776 Contact: Mr. Sinbum Kang Telephone: +82-31-436-1191 Email: sbkang@awoo.co.kr Sammi Information Systems Co Ltd 7-9FL, Seo Jo Building 103-15, Galwor-Dong Seoul, Yong San-ku Korea, South 140-807 Contact: Kyung-Hee Koo Telephone: +82-2-790-5508 Email: jlovekoo@sammicomputer.co.
This product includes cryptographic software written by Eric Young. (eay@cryptsoft.com) This product uses Regex++, Index software during its operational phases. The owner of Regex++ has granted use of the software to anyone provided such use is accompanied by the following copyright and permission notice: Regex++, Index. (Version 3.31, 16th Dec. 2001) Copyright ©1998-2001 Dr.
Patent Information This product is covered by one or more of the following US Patents and corresponding international patents worldwide: 4894523, 4953113, 4961043, 4970379, 4988852, 5019699, 5021642, 5038024, 5081343, 5095197, 5144119, 5144121, 5182441, 5187355, 5187356, 5195183, 5216233, 5216550, 5195183, 5195183, 5218191, 5227614, 5233172, 5241488, 5243602, 5258606, 5278487, 5288985, 5308966, 5322991, 5331136, 5331580, 5342210, 5349678, 5359185, 5371858, 5373478, 5389770, 5397885, 5410141, 5414251, 541646
1 Using the CK32 I-Safe Handheld Computer Use this chapter to familiarize yourself with the CK32 I-Safe Handheld Computer.
Chapter 1 — Using the CK32 I-Safe Handheld Computer Introducing the CK32 I-Safe Handheld Computer The Intermec CK32 I-Safe is an ergonomically designed handheld computer built on the Microsoft® Windows® Mobile operating system. It is a easy-to-use, reliable computer that runs client/server and browser-based applications and is certified to be intrinsically safe. The CK32 I-Safe is designed to support world-wide intrinsic safety standards and comply with relevant European Directives.
Chapter 1 — Using the CK32 I-Safe Handheld Computer The CK32 I-Safe includes these features: • PXA270 Intel Processor • Windows Mobile 5.0 Operating System • Voice over IP support. User responsible for software integration.
Chapter 1 — Using the CK32 I-Safe Handheld Computer Using the Battery The CK32 I-Safe uses a Model AB6 (P/N 318-021-xxx) lithiumion battery as its main power source. You must fully charge the main battery before you can use the CK32 I-Safe. When you change the battery, a backup battery maintains your status, memory, and real-time clock for at least 10 minutes. You must suspend your CK32 I-Safe before removing the battery, or data loss may occur..
Chapter 1 — Using the CK32 I-Safe Handheld Computer Charging and Installing the Battery Make sure you fully charge the AB6 battery before using your CK32 I-Safe. To charge the battery • Insert the battery into the AC11 4-slot battery charger. Charging time is approximately 10 to 12 hours. To install the battery You must suspend your CK32 I-Safe before removing the battery, or data loss may occur. • Insert the tabs on the bottom of the charged battery into the CK32 I-Safe and snap the battery into place.
Chapter 1 — Using the CK32 I-Safe Handheld Computer Maximizing Battery Life There are several things that you can do to extend the life of your fully charged battery. • Verify that Radio Power Management is enabled (Fast PSP). Enabling radio power management allows your radio to switch between awake and sleep modes based on network traffic. If you use the default setting of disabled (CAM), you will have the best network performance (data throughput) but it will draw the most power from your battery.
Chapter 1 — Using the CK32 I-Safe Handheld Computer Understanding the Low Battery Warnings When the battery charge is getting low, you will receive an audible alert and an initial pop-up warning message with a blue border. The warning message indicates “Main Battery Low. To prevent possible data loss, replace or recharge your battery according to the owner’s manual.” A second battery icon with an ! inside also appears on the Status bar.
Chapter 1 — Using the CK32 I-Safe Handheld Computer Using the Keypad Your CK32 I-Safe has one of the following keypad overlay options: • 42-key large numeric and function • 42-key 3270/5250 • 42-key VT/ANSI • 56-key full alphanumeric and function • 56-key 3260/5250 • 56-key VT/ANSI You enter all of the characters and functions printed above the keys just like you would on a standard keypad.
Chapter 1 — Using the CK32 I-Safe Handheld Computer Enter Enter Ins Caps \ / Esc Shift B A Home 7 C 8 D 9 F E 4 5 6 I H G 1 2 , J Del . 0 K M L F2 F1 O T W < Ctl R X F8 F7 U F9 F4 F3 F6 F5 S N Q P 3 V F10 F11 > Y Alt Alpha F12 Z Sp Sp Programmable 42-Key Large Numeric and Function Keypad: This keypad is designed for applications that enter mainly numeric data (0-9) and that need dedicated function keys (F1- F12).
Chapter 1 — Using the CK32 I-Safe Handheld Computer Enter FldExit Ins Page Caps Esc Help A D NewLn 8 Print 9 F E 4 G C Home B 7 5 Fld + 6 I H 1 2 J Del EOF 3 , Reset Fld - .
Chapter 1 — Using the CK32 I-Safe Handheld Computer Enter Enter Ins Page Caps Esc A Home B Mode 7 Find Retrn 9 F E 4 5 PrvSc G C 8 D 6 2 J Del NxtSc I H 1 Remov 3 , Select .
Chapter 1 — Using the CK32 I-Safe Handheld Computer Enter Enter & * 9 _ F6 4 5 1 2 + 6 F4 3 .
Chapter 1 — Using the CK32 I-Safe Handheld Computer Roll Roll Enter FldExit * & 7 PA1 F5 _ F1 F6 Shift Print + Sp ) C Fld F11 H M O F21 Pg W > Erase G F F14 K L F19 Q P F23 SReq F24 F22 S R Esc B F17 FMark F18 N F20 \ / - Dup F9 J F16 F15 ’ Hex F13 F12 I F4 .
Chapter 1 — Using the CK32 I-Safe Handheld Computer Enter Enter & Mode * F1 Find + F2 Shift Remov 3 - C B H J I F16 F15 M F17 N F20 Vw O S < Pg > W F14 K L F19 F18 Q P Vw R G F F13 F12 Esc F9 E D F11 \ / .
Chapter 1 — Using the CK32 I-Safe Handheld Computer Capitalizing All Characters To type all alphabetic characters as uppercase letters, you can enable the Caps Lock feature on the CK32 I-Safe keypad. To enable Caps Lock 1 Press the orange B key. The B icon appears on the status bar. 2 To enable Caps Lock and make the Caps Lock icon ( appear on the status bar, press a second key: ) • On the 42-key keypad, press Shift. • On the 56-key keypad, press C. 3 Type an alphanumeric character.
Chapter 1 — Using the CK32 I-Safe Handheld Computer You can also use the Power button to reset the CK32 I-Safe. See “Resetting Your Computer” on page 114 for more information. Note: Microsoft Windows Mobile supports other power saving modes including Screen Off, Unattend, and Suspend. Refer to Windows Mobile documentation for additional information.
Chapter 1 — Using the CK32 I-Safe Handheld Computer Understanding the CK32 I-Safe Status Lights Light Name Description Keyboard Status lights The left keyboard status light (B) indicates the orange plane of the overlay is selected. The right keyboard status light ( C) indicates the green plane of the overlay is selected. Battery Light Status What It Means Off Blinking Red The battery is charged. The battery blinks when the charge is low. Continued use causes the CK32 I-Safe to enter Suspend mode.
Chapter 1 — Using the CK32 I-Safe Handheld Computer Using the Touch Screen The CK32 I-Safe has a color touch screen display. The screen is 240 x 320 pixels. The desktop is 240 x 300 pixels and the taskbar is 240 x 20 pixels. In addition, the screen supports Unicode characters, user-programmable fonts, and bitmap graphics. CK32 I-Safe Start Screen The Start screen has two distinct areas: the desktop and the taskbar. The desktop displays shortcuts to some of the applications installed on the CK32 I-Safe.
Chapter 1 — Using the CK32 I-Safe Handheld Computer Using the Stylus Your CK32 I-Safe has a stylus for selecting items and entering information on the touch screen. Use the stylus in place of a mouse. Using the Stylus Action Description Touch Touch the screen once with the stylus to select options, launch applications, close applications, or launch menus from the taskbar. Double-tap the screen with the stylus to launch applications.
Chapter 1 — Using the CK32 I-Safe Handheld Computer 2 Tap Settings > System. 3 Tap the Screen icon to open the Screen applet and then tap the Align Screen button. About the Audio System The CK32 I-Safe provides an integrated microphone and speaker, and audio paths to support the following third-party applications: • Interactive VoIP • Walkie-Talkie • Digital recording • AV playback Understanding the Audio Feedback The CK32 I-Safe provide you with audio feedback when it performs some functions.
Chapter 1 — Using the CK32 I-Safe Handheld Computer 3 Tap the Volume icon at the top of the screen, tap On, and then move the slider bar to the desired volume level. To disable the beeper volume • To disable the beeper, tap the Volume icon, then drag the slider to the bottom of the scale, or tap Off.
Chapter 1 — Using the CK32 I-Safe Handheld Computer You can also change the beeper volume using the Intermec Setting application or by using the Beeper Volume command as described below. Additional Ways of Changing the Beeper Volume Method Procedure Use the Intermec Settings application. Go to Start > Settings > System > Intermec Settings > Device Settings > Beeper > Volume. Remember to press Save when using Intermec Settings.
Chapter 1 — Using the CK32 I-Safe Handheld Computer 2 Tap Settings > System. 3 Tap the Intermec Settings icon. The Intermec Settings application appears. 4 From the Intermec Settings application, go to Data Collection > Internal Scanner > Symbologies. 5 Enable or disable any of the supported symbologies. 6 Tap File > Save Setting to save your settings. 7 Tap File > Exit to close Intermec Settings. 8 Scan bar code labels.
Chapter 1 — Using the CK32 I-Safe Handheld Computer 4 Point the scanner window at the bar code label and hold the computer at a slight angle 15 to 25 cm (6 to 10 in) from the label. 5 Press the Scan button on the keypad, or pull the trigger on a handle, and direct the red beam so that it falls across all bars in the bar code label. The information you scanned appears in the Word Mobile document.
Chapter 1 — Using the CK32 I-Safe Handheld Computer 3 Press the Scan button on the keypad or pull the trigger on a handle, and direct the red beam so that it falls across at the top row of the bar code label. Scanning a PDF417 or Micro PDF417 Bar Code Label Use this test bar code: PDF417 Test Bar Code *123456789abcdefg* 4 Move the beam down all rows of the bar code label. The CK32 clicks as it reads each row.
Chapter 1 — Using the CK32 I-Safe Handheld Computer 26 CK32 I-Safe Handheld Computer User’s Manual
2 Understanding Windows Mobile This chapter introduces Microsoft Windows Mobile 5.0 for Pocket PC.
Chapter 2 — Understanding Windows Mobile Understanding Windows Mobile This chapter introduces Microsoft Windows Mobile 5.0. While using your CK32 I-Safe, keep these key points in mind: • Tap Start on the navigation bar, located at the top of the screen, to quickly move to programs, files, and settings. Use the command bar at the bottom of the screen to perform tasks in programs. The command bar includes menus, icons, and the onscreen keyboard.
Chapter 2 — Understanding Windows Mobile Finding Information in Windows Mobile (continued) For Information on: See this Source: Connecting to and synchronizing with a PC. Last minute updates and detailed technical information. Up-to-date information on Windows Mobile. The ActiveSync Help on your desktop. To view Help, click Help > Microsoft ActiveSync Help. The readme files located in the Microsoft ActiveSync folder on the desktop and on the Windows Mobile CD. www.microsoft.
Chapter 2 — Understanding Windows Mobile Accessing Programs You can switch from one program to another by selecting it from the Start menu. To access programs • Tap Start > Programs and then the program name. The following is a partial list of programs that are on your CK32 I-Safe, in the order they appear in the Start menu. Look on the Windows Mobile CD for additional programs that you can install onto your CK32 I-Safe.
Chapter 2 — Understanding Windows Mobile Windows Mobile Command Bar Using Pop-Up Menus Use pop-up menus to quickly perform an action on an item. For example, you can use a pop-up menu to delete or make a copy of an item. To access a pop-up menu, tap and hold the item on which you want to perform the action. When the menu appears, tap the action you want to perform, or tap anywhere outside the menu to close the menu without performing the action.
Chapter 2 — Understanding Windows Mobile 2 Tap the arrow next to the Input Panel icon to see your choices. When you use the input panel, your CK32 I-Safe Computer anticipates the word you are typing or writing and displays it above the input panel. When you tap the displayed word, it is inserted into your text at the insertion point. The more you use the CK32 I-Safe, the more it learns to anticipate.
Chapter 2 — Understanding Windows Mobile To use larger keys 1 Tap the input panel arrow. 2 Select Options. 3 Select the Large keys radio button. Using Block Recognizer Character recognition software gives you a fast and easy method for entering information in any program on the CK32 I-Safe. Letters, numbers, and punctuation you write are translated into typed text. To use Block Recognizer 1 Tap the input panel arrow and then tap Block Recognizer. 2 Write a letter in the box.
Chapter 2 — Understanding Windows Mobile 3 Write anywhere on the screen. Pause and let Transcriber change the written characters to typed characters. For help using Transcriber, tap the question mark in the lower right-hand corner of the screen. Selecting Typed Text If you want to edit or format typed text, you must select it first. Drag the stylus across the text you want to select.
Chapter 2 — Understanding Windows Mobile Example of the Personal Tab Adjustable Settings on the CK32 I-Safe Setting Why Adjust It? Buttons To associate a program with a button or customize the way your Up/Down control repeats. To select and customize the input method you want to use (Keyboard, Block Recognizer, Letter Recognizer, or Transcriber). To limit access to the CK32 I-Safe. To customize what appears on the Start menu. Only 7 programs can appear on the Start menu.
Chapter 2 — Understanding Windows Mobile Adding or Removing Programs Programs added to your CK32 I-Safe at the factory are stored in Read Only Memory (ROM). You cannot remove this software. All other programs and files added to the CK32 I-Safe after factory installation are stored in Random Access Memory (RAM). You can install any program created for the CK32 I-Safe, as long as the computer has enough memory available. Go to the Windows Mobile web site (www.microsoft.
Chapter 2 — Understanding Windows Mobile After installation, ActiveSync automatically launches the ActiveSync Setup Wizard. 3 Follow the screens of the ActiveSync to complete the synchronization process. The wizard helps you connect to the CK32 I-Safe, set up a partnership for synchronization, and customizes synchronization settings. The synchronization process automatically begins when you finish the wizard. 4 Disconnect the CK32 I-Safe from your desktop PC.
Chapter 2 — Understanding Windows Mobile Using Internet Explorer Mobile You can use Internet Explorer Mobile to run web-based applications, and view pages downloaded to the CK32 I-Safe. You can also connect to the internet through an ISP or a network connection. You can make connections using a modem, a wireless network, or Ethernet. You can use a modem connection to set up connections with an external modem.
3 Configuring the CK32 I-Safe Use this chapter to understand how to configure the CK32 I-Safe to communicate in your network. In this chapter, you will find these sections: • Configuring the CK32 I-Safe Operating Parameters • Setting Up Ethernet Communications • Setting Up Bluetooth Communications • Setting Up 802.
Chapter 3 — Configuring the CK32 I-Safe Configuring the Operating Parameters You can configure many operating parameters on the CK32 I-Safe, such as the symbologies it decodes or the network settings it uses. The CK32 I-Safe provides a configuration application called Intermec Settings that allows you to set all of the operating parameters in one place. Configuring the CK32 I-Safe Using Intermec Settings Use Intermec Settings to configure the CK32 I-Safe and to view system information.
Chapter 3 — Configuring the CK32 I-Safe For detailed information on the commands available in Intermec Settings, see the Intermec Computer Command Reference Manual (P/N 073529). The Intermec Computer Command Reference Manual is available from the Intermec web site. Navigating in Intermec Settings To Do This Function Do This Select or expand a command Select text in a text box Tap the command Tap in the text box and drag the stylus over the text Tap File > Save Settings or tap the disk icon.
Chapter 3 — Configuring the CK32 I-Safe Intrinsically Safe rules prohibit direct connection to the CK32 I-Safe. To use the CK32 I-Safe in an Ethernet network 1 Tap the iConnect icon ( ) in the lower right corner of the Today screen.From the menu, select Enable > Ethernet. This change disables 802.11 networking on the CK32 I-Safe. 2 You will be prompted to reboot the device for changes to take affect. Press and hold the Power button for 10 seconds to initiate the reboot. Do not use the Reset button.
Chapter 3 — Configuring the CK32 I-Safe 5 If required for your network, you may also need to set these parameters on each CK32 I-Safe: • Primary and secondary DNS servers • Primary and secondary WINS servers 6 Make sure your CK32 I-Safe is talking to the network and that the network can see your CK32 I-Safe. To check the status of your Ethernet connection 1 Tap the iConnect icon ( Today screen. ) in the lower right corner of the 2 From the menu, select Status > Ethernet.
Chapter 3 — Configuring the CK32 I-Safe To turn the Bluetooth radio on 1 Select Start > Settings > System > Intermec Settings > Bluetooth. 2 Tap the Power On radio button and tap File > Save Settings. Once Bluetooth is enabled, it stays enabled through a warm or cold boot and maintains virtual COM ports (such as printing) registration. For more information on Bluetooth software, see the Bluetooth Resource Kit and the Wireless Printing Development Guide in the Intermec Developer Library (IDL).
Chapter 3 — Configuring the CK32 I-Safe Use this table to understand the settings you see in the Bluetooth menu in Intermec Settings. Bluetooth Settings Setting Description Power Set and view whether the Bluetooth radio is on or off. Determines how the device appears to other devices during discovery. Makes the CK32 I-Safe discoverable. Makes the CK32 I-Safe connectable. Displays the version of the Intermec Bluetooth Library. Displays the version of the Bluetooth Radio Hardware.
Chapter 3 — Configuring the CK32 I-Safe The Wireless Printing applet uses the concept of a “current wireless printer.” The CK32 I-Safe connects to the current wireless printer when your application opens the wireless printing COM port on the CK32 I-Safe. If there is no current wireless printer selected on your CK32 I-Safe, there is no wireless printing COM port registered on your CK32 I-Safe. You must select a current wireless printer on your CK32 I-Safe, as described in the next section.
Chapter 3 — Configuring the CK32 I-Safe To discover the printer with Bluetooth device discovery 1 Select Start > Settings > the Systems tab > Wireless Printing. The Wireless Printing wizard appears. 2 Tap Acquire Printer to initiate printer discovery. All Bluetooth printers discovered within range appear in the devices list. 3 Select the printer you want to connect to and then tap OK.
Chapter 3 — Configuring the CK32 I-Safe To manually enter the device address of the printer 1 Select Start > Settings > the System tab > Wireless Printing. The Wireless Printing wizard appears. 2 Tap Manual > Acquire Printer. The wizard advances to the next screen where you enter the device address. 3 Type the address of the printer in the Enter Device Address text box and then tap OK. The keyword -unknown- appears in the Device Name field in the Current Wireless Printer box.
Chapter 3 — Configuring the CK32 I-Safe Connecting to a Bluetooth Audio Device Use the Bluetooth Audio applet to discover, activate, and connect to Bluetooth audio devices such as a Bluetooth headset. You can control the audio volume and microphone gain for the connected Bluetooth audio device. To connect to a Bluetooth headset 1 Select Start > Settings > the System tab > Bluetooth Audio. 2 Tap Search for devices. Discovered audio devices are added to the list with an icon to identify them.
Chapter 3 — Configuring the CK32 I-Safe Configuring the Network Parameters for a TCP/IP Network In a TCP/IP network, the CK32 I-Safe communicates with a host computer directly using TCP/IP. The access point acts as a bridge to allow communications between the wired network and the wireless network. To use wireless communications in a TCP/IP network 1 Tap the iConnect icon ( ) in the lower right corner of the Today screen.From the menu, select Enable > Wireless. This disables the Ethernet connection.
Chapter 3 — Configuring the CK32 I-Safe 6 Configure security. For help, see See “Using ISpyWiFi” on page 52. You can configure the network parameters on the CK32 I-Safe to using Intermec Settings or ISpyWiFi. For information on Intermec Settings, see “Configuring the CK32 I-Safe Using Intermec Settings” on page 40. Configuring the Network Parameters for a UDP Plus Network In a UDP Plus network, the CK32 I-Safe communicates with a host computer through the Intermec Application Server.
Chapter 3 — Configuring the CK32 I-Safe You can also use iConnect to configure the network settings if you need to change anything by tapping Tools > Wireless Settings from the iConnect menu. Using ISpyWiFi The ISpyWiFi utility provides more detailed information for the 802.11 radio connection in your CK32 I-Safe, such as MAC address, access point information, association, encryption, power management, antenna status, RSSI, data link rates, and supplicant status.
Chapter 3 — Configuring the CK32 I-Safe 2 Scroll up to the “\Start Menu\Programs” folder, then tap it to open. 3 Press and hold your stylus in an empty (white) area in the folder, for its pop-up menu, then select Paste Shortcut. Close the File Explorer, select Start > Programs to locate the Shortcut to ISpyWifi icon, like the following. Tap this icon to access the ISpyWifi application. To start iSpyWiFi from iConnect 1 Tap the iConnect icon ( Today screen.
Chapter 3 — Configuring the CK32 I-Safe ISpyWiFi Tab Contents WiFi NIC (Network Interface Card) BCMCF1 A WLAN adapter and its associated driver version MAC The client radio MAC address IP(DHCP) The IP address of the client radio, if using DHCP IP (Static) The IP address of the client radio, if using a static IP address AP Status Shows whether the radio is associated with the access point Channel The channel on which the radio is communicating with the access point ESSID The text SSID (Network
Chapter 3 — Configuring the CK32 I-Safe information about any access points with which you can communicate. Tap Scan, then wait for the table to fill with information. Tap any of the columns to sort by ascending or descending order. Tap the slider bar on the bottom to scroll left and right to view all of the information.
Chapter 3 — Configuring the CK32 I-Safe Supplicant The Supplicant tab provides you with security and authentication information configured elsewhere in the CK32 I-Safe.
Chapter 3 — Configuring the CK32 I-Safe Supplicant Tab Contents (continued) Authentication Result success: Authentication successful time-out: Authentication Server not responding to requests, you may be out of range no credentials: Proper credentials not configured in device client reject: Unable to validate access point certificate server reject: Authentication Server rejects submitted credentials unknown: No authentication used or in the process of authentication Supplicant Events Displays output fro
Chapter 3 — Configuring the CK32 I-Safe Ping Use the Ping tab to contact with any host in your network for information.
Chapter 3 — Configuring the CK32 I-Safe 3 Tap Ping to initiate contact with the selected host 4 Depending on how the screen is set up, you can toggle between a graph and a list of ping results: • Tap Graph to toggle to the graphical view of 25 of the most recent pings and their response results, like in the following sample graph: Note the size of the gray area represents the standard deviation from the mean.
Chapter 3 — Configuring the CK32 I-Safe The debug output file is then stored in the “\My Device” root folder as a text file called “uroddsvc.” Using File Explorer, press and hold your stylus on this file for its pop-up menu, then select any of its options to copy, beam, send, or delete this file. Configuring Security on the CK32 I-Safe The CK32 I-Safe provides three types of security for your wireless network: • Wi-Fi Protected Access (WPA) • 802.
Chapter 3 — Configuring the CK32 I-Safe If you are using WPA-802.1x, WPA2-802.1x, or 802.1x security, this section assumes that your authentication server and authenticators are properly configured. Note: Your security choice does not depend on your authentication server. For example, you can choose Funk security if you use Microsoft’s Internet Authentication Service.
Chapter 3 — Configuring the CK32 I-Safe WPA runs in 802.1x (Enterprise) mode or PSK (Pre-Shared Key) mode: • In Enterprise mode, WPA provides user authentication using 802.1x and an Extensible Authentication Protocol (EAP). That is, an authentication server (such as a RADIUS server) must authenticate each device before the device can communicate with the wireless network. • In PSK mode, WPA provides user authentication using a shared key between the authenticator and the CV30.
Chapter 3 — Configuring the CK32 I-Safe To use WEP security, you need: • a CV30 with an 802.11b/g radio. • an access point with an 802.11b/g radio. Using 802.1x Security 802.1x security provides centralized user authentication using an authentication server, authenticators (access points), and supplicants. These components communicate using an EAP authentication type, such as TLS (Transport Layer Security) or PEAP (Protected Extensible Authentication Protocol). 802.
Chapter 3 — Configuring the CK32 I-Safe Choosing Between Funk and Microsoft Security The CK32 I-Safe provides both Funk and Microsoft security choices. Funk security is the default setting. Use the following sections to set security using either Funk or Microsoft as your security choice. Both security choices offer similar features, but Funk security also offers these features: • CCX v2.
Chapter 3 — Configuring the CK32 I-Safe 6 Select one profile as the active profile by tapping Active Profile and choosing a profile fro the drop-down list. 7 Save your settings. Configuring WPA Security With Funk Security Use these procedures to set WPA-802.1x, WPA2-802.1x, WPAPSK, or WPA2-PSK security on your CK32 I-Safe with Funk security. To configure WPA-802.1x with Funk security 1 Open Intermec Settings. 2 Make sure you have configured the communications and radio parameters on your CK32 I-Safe.
Chapter 3 — Configuring the CK32 I-Safe Note: You must have the date on the CK32 I-Safe set correctly when you enable Validate Server Certificate. If you choose TLS: a Load a user and root certificate on your CK32 I-Safe. For help, see “Loading a Certificate” on page 80. b For Validate Server Certificate, choose Yes. c You must enter a User Name and Subject Name. You can also enter a Server Common Name if you want to increase your level of security. 8 Save your settings.
Chapter 3 — Configuring the CK32 I-Safe 2 Make sure you have configured the communications and radio parameters on your CK32 I-Safe. 3 Make sure you have selected Funk as your security choice. 4 Choose Communications > 802.11 Radio > Funk Security > Profile. 5 For Association, choose Open. 6 For Encryption, choose WEP. 7 For Inner Authentication, choose TTLS, PEAP or TLS. If you choose TTLS or PEAP: a Select User name and type your user name. b Select Password prompt, and choose Enter password now.
Chapter 3 — Configuring the CK32 I-Safe 3 From Intermec Settings, choose Communications > 802.11 Radio > Funk Security > Profile. 4 For 8021x, choose LEAP. 5 For Association, choose Open, WPA, WPA2, or Network EAP. Encryption automatically defaults to TKIP if you choose WPA, to AES if you choose WPA2, and to WEP if you choose Open or Network EAP. 6 For Prompt for Credentials, select Enter credentials now. 7 Select User name and type your user name. 8 Select User Password and type your user password.
Chapter 3 — Configuring the CK32 I-Safe Configuring Funk Security Using the Profile Wizard You can start 802.11 b/g communications on the CK32 I-Safe using the Profile Wizard. A profile contains all the information necessary to authenticate you to the network, such as login name, password or certificate, and protocols by which the CK32 I-Safe is authenticated. You can have up to four profiles for different networks. For example, you may have different login names or passwords on different networks.
Chapter 3 — Configuring the CK32 I-Safe 6 From the Network type list, select either Infrastructure or Ad-Hoc. Select Infrastructure if the network uses access points to connect to the corporate network or internet. Select Ad-Hoc to set up a private network with one or more participants. 7 Enter the SSID (Network Name) if different than the profile name. 8 Tap OK. Configuring WEP Security With Profile Wizard 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose None.
Chapter 3 — Configuring the CK32 I-Safe byte value for 64-bit WEP or a 13-byte value for 128-bit WEP. Hex keys must be preceded by 0x and contain 5 or 13 hex pairs. 7 Tap OK. Configuring WPA-PSK Security With Profile Wizard 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose None. 3 For Association, choose WPA. 4 For Pre-Shared Key field, enter the passphrase as ASCII. The passphrase must be 8 to 63 characters and match the passphrase on the access point. 5 Tap OK.
Chapter 3 — Configuring the CK32 I-Safe Configuring PEAP Security With Profile Wizard Protected EAP (PEAP) performs secure authentication against Windows domains and directory services. It is comparable to EAP-TTLS, though not as flexible. To configure PEAP security 1 In the Profile Wizard, select the Security page. 2 For 8021x Security, choose PEAP. 3 For Association, choose Open, WPA, or Network EAP.
Chapter 3 — Configuring the CK32 I-Safe 9 Tap Additional Settings to assign an inner PEAP authentication and set options for server certificate validation and trust. 10 From the Inner PEAP Authentication list, choose EAP/MSCHAP-V2, EAT/Token Card, or EAP/MD5-Challenge. 11 Check Validate Server Certificate to verify the identity of the authentication server based on its certificate when using PEAP. 12 Tap Root CA, select a root certificate, and then tap OK. 13 Enter the Common Names of trusted servers.
Chapter 3 — Configuring the CK32 I-Safe 9 Tap Additional Settings to Certificate Settings. 10 Check Validate Server Certificate to verify the identity of the authentication server based on its certificate when using TLS. 11 Tap Root CA, select a root certificate, and then tap OK. 12 Enter the Common Names of trusted servers. 13 Tap OK. Configuring TTLS Security With Profile Wizard TTLS protocol provides authentication like EAP-TLS but does not require user certificates.
Chapter 3 — Configuring the CK32 I-Safe 10 From the Inner TTLS Authentication list, choose PAP, CHAP, MS-CHAP, MS-CHAP-V2, PAP/Token Card, or EAP. 11 If you select EAP for the inner authentication protocol, select an inner EAP protocol from the Inner EAP list. 12 Check Validate Server Certificate to verify the identity of the authentication server based on its certificate when using PEAP. 13 Tap Root CA, select a root certificate, and then tap OK. 14 Enter the Common Names of trusted servers.
Chapter 3 — Configuring the CK32 I-Safe 4 For Encryption, choose TKIP or AES if you selected WPA2 for association, or WEP or CKIP if you selected Network EAP for association. 5 For Username, type a unique username for this protocol. 6 In the Password field, type a unique password for this protocol.
Chapter 3 — Configuring the CK32 I-Safe 9 Tap PAC Manager to view the PAC files currently installed on the CK32 I-Safe. Tap ok to return to the Additional Settings screen. 10 If you already have a PAC on the CK32 I-Safe, clear Allow Automatic PAC provisioning to avoid receiving more PACs from the server. 11 If Allow Automatic PAC provisioning is selected, you can check: • Prompt before acquiring a new PAC for notification of any incoming PACs.
Chapter 3 — Configuring the CK32 I-Safe 3 From the Security Choice list, select Microsoft Security and save your settings. An alert box appears telling you that you must save your settings and warm boot the CV30 for the new security choice to take effect. 4 An alert box appears telling you that you must save your settings and warm boot the CK32 I-Safe for the new security choice to take effect. Tap Yes to warm boot the CK32 I-Safe with Microsoft Security as the Security Choice.
Chapter 3 — Configuring the CK32 I-Safe Networks already configured are preferred networks. You can connect to only preferred networks or search for and connect to any available network. You can add a wireless network when the network is detected or manually by entering settings information. To determine if authentication information is needed, see your network administrator.
Chapter 3 — Configuring the CK32 I-Safe Follow these steps to enable WPA authentication using a preshared key: a Set Authentication to WPA-PSK. b Set Data Encryption to either WEP or TKIP. c Enter the new Network key. 5 From the EAP type list, select either MD5-Challenge, PEAP or TLS. 6 Tap OK to close the screen. Note: If you select to automatically connect to non-preferred networks, the CK32 I-Safe detects any new networks and provides you with the opportunity to configure them.
Chapter 3 — Configuring the CK32 I-Safe 2 From Intermec Settings, select Communications > 802.11 Radio > Certificates. 3 Select Enroll Certificates and tap the Run App button. The Enroll Certificates dialog box appears. 4 In the Enroll Certificates dialog box, enter the User Name, Password, and Server (IP address) to log into the CA server. 5 Tap OK. A dialog box appears asking if you want to load the root certificate. 6 Tap OK for yes.
Chapter 3 — Configuring the CK32 I-Safe To load multiple certificates 1 Create the \Temp\Root and the \Temp\User folders on the CK32 I-Safe. 2 Copy at least one root certificate .cer file into the \Temp\Root folder. 3 Copy at least one user certificate .cer file and key .pvk file into the \Temp\User folder. The filenames must match (for example, cert1.cer and cert1.pvk). 4 From Intermec Settings, select Communications > 802.11 Radio > Certificates. 5 Select Import Root Certificates = False.
Chapter 3 — Configuring the CK32 I-Safe Disabling Security If you choose not to use security with your wireless network, you can disable it on the CK32 I-Safe. Intermec recommends that you always set security in your network. To disable security 1 Open Intermec Settings. 2 Choose Communications > 802.11 Radio > Microsoft Security. 3 For Network Authentication, choose Open. 4 For Data Encryption, choose Disabled. 5 Close Intermec Settings.
Chapter 3 — Configuring the CK32 I-Safe 84 CK32 I-Safe Handheld Computer User’s Manual
4 Developing and Installing Applications Use this chapter to understand the guidelines for developing applications and converting existing Trakker Antares applications for use on the CK32 I-Safe. You will also find information on installing applications and automatically launching them.
Chapter 4— Developing and Installing Applications Developing Applications for the CK32 I-Safe The CK32 I-Safe Handheld Computers run applications programmed in Microsoft Visual Studio 2003 or later. You can also use Microsoft eMbedded Visual C++ version 4.2 or later, but some features may not be available. Use this section to understand the hardware and software you need to: • develop a new application for the CK32 I-Safe. • develop a web-based application for the CK32 I-Safe.
Chapter 4 — Developing and Installing Applications Developing a Web-Based Application You can develop web-based data collection applications for use on the CK32 I-Safe. For help, see any HTML source book. The CK32 I-Safe contains Internet Explorer Mobile for you to use. Microsoft Internet Explorer Mobile is available from the Start menu and provides all of the common elements you expect to find.
Chapter 4— Developing and Installing Applications Installing Applications on the CK32 I-Safe There are several ways you can install applications on the CK32 I-Safe: • You can package your application as a cabinet (.cab) file. • If you have a simple application, you may only need to deliver the .exe file. • You can copy a directory structure that contains the application, supporting files, DLLs, images, and data files. Intermec recommends using .cab files to install your applications.
Chapter 4 — Developing and Installing Applications Installing Applications Using SmartSystems Foundation You can use the SmartSystems server to drag-and-drop Intermec applications onto your CK32 I-Safe. The CK32 I-Safe ships with the SmartSystems client, which means it is SmartSystemsenabled. The console is part of SmartSystems Foundation, which you can download from www.intermec.com/SmartSystems. For help using the console, see the online help.
Chapter 4— Developing and Installing Applications 2 Wait for a “Connected” message to appear in the Microsoft ActiveSync application to signal a connection to the CK32 I-Safe. If necessary, select File > Get Connected to initiate a connection. 3 Click Tools > Explore Device to open the Mobile Device window on the CK32 I-Safe. 4 On your desktop PC, locate the .cab file you want to download to the CK32 I-Safe and copy it.
Chapter 4 — Developing and Installing Applications 5 From the Mobile Device window, open the My Windows Mobile-Based Device folder and navigate to the folder where you want to paste the .cab file. 6 Paste the .cab file into the desired folder. 7 When you are done copying files, reset the CK32 I-Safe. 8 After the CK32 I-Safe is done resetting, tap Start > Programs > File Explorer to locate the newly copied files. 9 Tap the .cab files to install them.
Chapter 4— Developing and Installing Applications 3 Tap OK on the Install Select Caution dialog.
Chapter 4 — Developing and Installing Applications 4 Select Avalanche Enabler and tap the Apply button. 5 You will need to clean boot the CK32 I-Safe to install the selected files. Tap Yes to initiate a clean boot. For help, see “Performing a Clean Boot” on page 115. This completes the installation process for Install Select. Each time the Avalanche Enabler is activated (typically on a reset), the CK32 I-Safe attempts to connect to the Avalanche Agent.
Chapter 4— Developing and Installing Applications For more information on using Wavelink Avalanche, contact your local Intermec representative or visit the Wavelink web site at www.wavelink.com. Launching An Application Automatically Note: This describes the system component startup for Intermec provided components only. It does not describe the bootstrap loader process. It only describes the component installation process provided by Windows Mobile.
Chapter 4 — Developing and Installing Applications Folder names used for the mounted volumes above are retrieved from the registry to maintain coherence with the naming of the mounted volumes on the platform. These folder names are not hard-coded. If AutoExec is present in the “\SYSTEM” folder on any of these media, it executes the program only on the first media it is found on and no other. AutoExec is reserved for Intermec use to configure Intermecspecific applications. It launches the .
Chapter 4— Developing and Installing Applications AutoExec Commands Command Description -% Passes an ID to use in a call to SignalStarted. This argument is useful only during system startup that relies on a SignalStarted to call. W is an integer value. Passes a signal event name to use when autoexec completes. X is a string value. Overrides the data file to use. This must be a fully qualified name. Default is “autoexec.dat” in the same location as the AutoExec.exe program. “Y” is a string value.
Chapter 4 — Developing and Installing Applications There are two ways to automatically launch your application when you perform a reset on the CK32 I-Safe: • Make sure your .cab file places a shortcut to your application in the \Windows\StartUp folder. • Configure the AutoRun program to launch your application. The CK32 I-Safe contains a program called AutoRun.exe which automates operations such as launching other processes. You can configure AutoRun.exe through the AutoRun data file, AutoRun.dat.
Chapter 4— Developing and Installing Applications AutoRun handles quoted file names for the first parameter to allow specifying path names or file names that contain white space. Note only one set of quotes per command is supported. AutoRun.dat entry examples Command Description RUN CALL “Flash File Store\Apps\some.exe” arg1, arg2, arg3 “Flash File Store\2577\usercmds.dat” AutoRun supports the following script commands in AutoRun.
Chapter 4 — Developing and Installing Applications ; Log any debug output to a trace file. LOGGING 1 ; Perform a SetEvent on the event name "autoexec_started". SIGNAL "autoexec_started" ; Include this child data file, childexec.dat. CALL "\childexec.dat" ; Use autocopy to copy the audio control panel from flash file store to the windows directory. Wait for up to 60 seconds for it to exit. EXEC "\Flash File Store\SYSTEM\autocopy.exe" -S"\Flash File Store\System\CPLAudio.cpl" -D"\Windows\CPLAudio.
Chapter 4— Developing and Installing Applications Example: ; use AutoCopy to copy the control panel from flash file store to windows. autocopy.exe -S"\Flash File Store\System\Audio.cpl" D"\Windows\Audio.cpl" ; use AutoCopy to move the control panel from flash file store to windows. autocopy.exe -M1 -S"\Flash File Store\System\Audio.cpl" D"\Windows\Audio.cpl" AutoReg The AutoReg (AutoReg.exe) component adds registry information to the Windows Mobile registry.
Chapter 4 — Developing and Installing Applications The format of the input file, in this example, is the standard registry format which should ease the creation of the input file since there are many publicly available utilities to generate a registry file besides Notepad. One example of a tool is the Microsoft Remote Registry Editor. AutoCab AutoCab (AutoCab.exe) extracts files, registry settings, and shortcuts from Windows Mobile cabinet (.cab) files.
Chapter 4— Developing and Installing Applications AutoCab Script Commands Command Description -ChkRst= Set to 1 to configure AutoCab to check for the Reset flag after all .cab files are installed. This file is created by .cab files that want a clean reset after installation. Default is 0 (do not check for flag). Specifies the .cab files to extract. Note that the specified files need not end with the .cab extension. Forces the specified .
5 Troubleshooting and Maintenance Use this chapter to solve problems you may encounter while using the CK32 I-Safe. You will also find information on booting the computer and routine maintenance. If you have any problems using the CK32 I-Safe, look in this chapter to find a possible solution. This chapter consists of the following section.
Chapter 5— Troubleshooting and Maintenance Upgrading the CK32 I-Safe Using SmartSystems You can use the SmartSystems™ Foundation application from Intermec to perform operating system upgrades on your CK32 I-Safe. SmartSystems client is installed on your CK32-I-Safe, which means it is SmartSystems-enabled. The console is part of SmartSystems Foundation, which you can download from www.intermec.com/SmartSystems.
Chapter 5— Troubleshooting and Maintenance 3 Select Computers: CK32 I-Safe Mobile Computer from the list. 4 Select the download you need. Make sure the download you select is for the CK32 I-Safe computer and that it contains the upgrade you want: operating system only, SSPB only, or operating system and SSPB. 5 Download the .zip file to your desktop computer. 6 Use the SmartSystems server to upgrade the CK32 I-Safe. Note: You cannot install the files for the OS and the SSPB bundle at the same time.
Chapter 5— Troubleshooting and Maintenance The SmartSystem Console screen has three sections: • Keypad Computers (devices you are using) • SmartSystem Applications (used to upgrade) • Software Vault (where your upgrades are stored) 4 Click the Discover icon on the SmartSystems Console. Your CK32 I-Safe should appear in the Keypad Computers area of the screen. 5 Click and drag the OS bundle from the Software Vault and drag to the C32 I-Safe icon.
Chapter 5— Troubleshooting and Maintenance 3 Double-click the SmartSystems icon on your taskbar to start the SmartSystems Console. 4 Click the Discover icon on the SmartSystems Console. Your CK32 I-Safe should appear in the Keypad Computers area of the screen. 5 Click and drag the SSPB bundle from the Software Vault and drag to the C32 I-Safe icon. Release the SSPB bundle on the device icon. 6 Click the Yes button when the SmartSystem message appears.
Chapter 5— Troubleshooting and Maintenance • Power management settings • If you are using terminal emulation (TE), know the version and protocol • If you are not using TE, know the language your custom application was written in and the tools you used to create it You can find most of the information listed above in Intermec Diagnostics or Intermec Settings. Consult your application developer for information on your custom application.
Chapter 5— Troubleshooting and Maintenance Problems While Operating the CK32 I-Safe Problem Solutions You press the Power button to turn Make sure the backlight is on by pressing E. on the CK32 I-Safe and nothing Make sure you have a charged battery installed correctly. happens. For help, see “Charging and Installing the Battery” on page 5. The battery may be discharged. Replace the battery with a spare charged battery, or charge the battery and try again. The Battery light is blinking.
Chapter 5— Troubleshooting and Maintenance Problems While Configuring Security If you have trouble configuring the computer for security, check these problems and possible solutions. Problems While Configuring Security Problem Solution You are using static WEP keys and you have a strong connection to the access point, but you cannot communicate with it. You are setting up multiple access points in a network, with different SSIDs, and the connection fails.
Chapter 5— Troubleshooting and Maintenance Problems with Wireless Connectivity If you have trouble with wireless connectivity, check these problems and possible solutions. Problems With Wireless Connectivity Problem Solution When you turn on the CK32 I-Safe after it was suspended for 10-15 minutes or longer, it can no longer send or receive messages over the network. The network connection icon is in the status bar, but the host computer is not receiving any data from the CK32 I-Safe.
Chapter 5— Troubleshooting and Maintenance Problems With Wireless Connectivity (continued) Problem Solution The CK32 I-Safe is connected to the Intermec Application Server or host computer and you move to a new site to collect data. The network connection icon was visible but now the no network connection icon ( ) is visible. While configuring or using wireless printing, you see the message, “The Bluetooth COM port does not exist [55]. This is probably because the computer was just resumed.
Chapter 5— Troubleshooting and Maintenance Problems While Scanning Bar Codes Problem Solution You may be too far from the bar code label. Move closer to the bar code label and try again. You may be scanning the bar code label “straight on.” Change the scanning angle and try again. You can test the effective range of the scanner. Move within 61 cm (2 feet) of a wall and try again. You must be within the scanning range to scan bar code labels. For help, see “Scanning Bar Codes” on page 22.
Chapter 5— Troubleshooting and Maintenance Resetting Your Computer You may need to reset your computer if: • the CK32 I-Safe completely stops responding • an application is locked up and stops responding • when you upgrade the firmware • when you reflash the CK32 I-Safe Preferred Reset Method This procedure is the recommended method in recovering the CK32 I-Safe. It performs a graceful system shutdown and no data is lost in the process.
Chapter 5— Troubleshooting and Maintenance Performing a Clean Boot If performing either reset method fails to restore system operation, you may have to perform a clean boot. This is a boot method which formats the Object Store (user store) to clean data and registry information from the CK32 I-Safe system and restore them to their factory-default state. The clean boot process will erase the memory in the CK32 ISafe, including all applications and data files found in the object store.
Chapter 5— Troubleshooting and Maintenance • Clean with a soft cloth designed for cleaning photographic lenses or reading glasses. Some of these products are cotton based and some are synthetic. • If you are using a cleaning agent, spray it on the cleaning media and not on the scanner window or screen. Cleaning agents should not contain ammonia, abrasives, or oils. There are no user-serviceable parts inside the CK32 I-Safe or in the battery.
Chapter 5— Troubleshooting and Maintenance Add just enough soap to a quantity of water to start and create sudsing (using agitation while adding), but no more; you can't go wrong with this solution. Keep in mind that the water should just be warm; hot water can have adverse affects on some plastics. • Ammonia is not compatible with polycarbonates, a major component in the CK32 I-Safe housing; it is NOT recommended as a cleaner.
Chapter 5— Troubleshooting and Maintenance 118 CK32 I-Safe Handheld Computer User’s Manual
A Specifications CK32 I-Safe Handheld Computer User’s Manual 119
Appendix A — Specifications Physical and Environmental Specifications Use this section to locate technical information about the CK32 I-Safe and its available features and options. Physical Dimensions Length: 24.6 cm (9.41 in) Width: 8.89 cm (3.5 in) Thickness: 7.62 cm (3.0 in) Weight CK32 I-Safe Weight (without battery): 893.59 g (31.52 oz) Battery weight: 194.48 g (6.86 oz) Handle weight: 132.96 g (4.
Chapter A — Specifications Keypad Options • 42-key large numeric and function keypad, available with programmable, 3270 TE/5250 TE, and VT/ANSI TE overlays • 56-key full alphanumeric keypad, available with programmable, 3270 TE/5250 TE, and VT/ANSI TE overlays Bar Code Symbologies The CK32 I-Safe supports these bar code symbologies: • • • • • • • • • • • Codabar Codablock A Codablock F Code 11 Code 2 of 5 Code 39 Code 93 Code 128 EAN.
Appendix A — Specifications Linear Imager Reading Distances Minimum reading distances are measured in the dark (0 lux). Minimum Reading Distances With 0.655 cm (0.258 in) Setback Bar Code Symbology Contents Code 39 RESO 0.100 MM R 0.125 MM 0.25 0.5 R1MM UPC/EAN 120010010100 PDF417 10 mils 15 mils 122 Density Minimum Distance Maximum Distance 0.1 mm (4 mils) 0.125 mm (5 mils) 0.25 mm (10 mils) 0.5 mm (20 mils) 1 mm (40 mils) 0.33 mm (13 mils) 0.254 mm (10 mils) 0.381 mm (15 mils) 10.27 cm (4.
Chapter A — Specifications 0" 2" 4" 6" 8" 10" 12" 14" 16" 18" 20" in 10" 25 8" 20 100% contrast UPC/ EAN 6" 15 4" 10 2" 5 0" 0 2" 5 4" 10 0.125 mm/ 5 mil 0.25 mm/10 mil 6" 15 0.5 mm/20 mil 20 8" 1 mm/40 mil 25 10" 0 5 10 15 20 25 30 35 40 45 50 cm Linear Imager Minimum Reading Distances: This graphic does not include the 0.665 cm (0.258 in) setback for the CK32 I-Safe.
Appendix A — Specifications Minimum Reading Distances With 1.087 cm (0.428 in) Setback Symbology Density Minimum Distance Maximum Distance Code 39 0.125 mm (5 mils) 0.25 mm (10 mils) 0.5 mm (20 mils) 1 mm (40 mils) 1.3 mm (51 mils) 8.564 cm (3.272 in) 5.770 cm (2.272 in) 7.802 cm (3.072 in) 8.818 cm (3.472 in) Depends on the symbology length and scan angle 17.962 cm (7.072 in) 37.774 cm (14.872 in) 78.922 cm (31.072 in) 130.992 cm (51.572 in) 148.772 cm (58.572 in) UPC/EAN 0.33 mm (13 mils) 5.
Chapter A — Specifications Battery Eliminator (P/N 714-619-xxx) The battery eliminator provides AC power to your CK32 I-Safe handheld computer. Power Supply (P/N 851-061-xxx) Power supply for the Communications Adapter and Quad Battery Charger. Screen Protector - Ten Pack (P/N 346-312-xxx) Clear covering designed to protect the CK32 I-Safe screen.
Appendix A — Specifications 126 CK32 I-Safe Handheld Computer User’s Manual
I Index CK32 I-Safe Handheld Computer User’s Manual 127
Index Numerics 802.11 network protocols, 49 802.
Index WEP security with Funk security, 68 with Microsoft security, 79 WPA security with Microsoft security, 79 WPA-PSK security with Microsoft security, 80 with Profile Wizard, 71 D developing applications AutoCab, 101 AutoCopy, 99 AutoExec, 95 AutoReg, 100 AutoRun, 97 installing applications, 88 Intermec Developer Library, using, 86 launching automatically, 94 RunAutoRun, 94 Trakker Antares, converting from, 87 web-based, 87 drag-and-drop, using SmartSystems Console, 104 E EAP, defined, 62 EAP-FAST securit
Index 56-key illustrated, 12 terminal emulation, 8 using, 8 using color-coded keys, 14 L LEAP security configuring, 67 configuring with Profile Wizard, 75 required equipment, 63 Load certificate active directory, using, 80 third-party CA, 81 M manuals Data Collection Browser Client User’s Guide, 3 iBrowse User’s Guide, 3 TE2000 Terminal Emulation Programmer’s Guide, 3 Microsoft security configuring, 77 configuring WEP, 79 configuring WPA, 79 configuring WPA-PSK, 80 Minimum, 124 O orange key, using, 14 P pas
Index touch screen, using, 18 troubleshooting wireless connectivity, 111 TTLS security configuring with Profile Wizard, 74 U UDP Plus network wireless communications, 51 Updating the system software, 104 upgrading downloading files, 104 operating system, 105 SSPB, 106 Upgrading the operating system, 104 using green key, 14 orange key, 14 V verify scanner operation, 23 volume beeper volume, disable, 21 W WEP security configuring with Funk security, 68 with Microsoft security, 79 overview, 62 Windos Mobile in
Index 132 CK32 I-Safe Handheld Computer User’s Manual
Worldwide Headquarters 6001 36th Avenue West Everett, Washington 98203 U.S.A. tel 425.348.2600 fax 425.355.9551 www.intermec.