User's Manual
Table Of Contents
- Appendix A
- Appendix B
- Appendix C
- Bar Code Settings - TBD
- C.2 Decoded (Internal) Scanners
- C.2.1 Options
- C.2.2 Decoded (Internal) Advanced Options
- C.2.3 Decoded (Internal) Data Options
- C.2.4 Code 39
- C.2.5 Code 128
- C.2.6 EAN 13
- C.2.7 EAN 8
- C.2.8 UPC A
- C.2.9 UPC E
- C.2.10 UPC/EAN Shared Settings
- C.2.11 Code 93
- C.2.12 Codabar
- C.2.13 MSI Plessey
- C.2.14 Interleaved 2 of 5
- C.2.15 Discrete 2 of 5
- C.2.16 RSS Code (Reduced Space Symbology)
- C.2.17 Composite
- C.2.18 PDF-417
- C.2.19 Micro PDF-417
- C.3 Decoded (HHP)
- C.4 Decoded (Intermec ISCP)
- C.4.1 Decoded (ISCP) Options
- C.4.2 Decoded (ISCP) Advanced Options
- C.4.3 Code 39
- C.4.4 Code 128
- C.4.5 EAN 13
- C.4.6 EAN 8
- C.4.7 UPC A
- C.4.8 UPC E Settings
- C.4.9 UPC/EAN Shared Settings
- C.4.10 Code 93
- C.4.11 Codabar
- C.4.12 MSI Plessey
- C.4.13 Code 11
- C.4.14 Interleaved 2 of 5
- C.4.15 Matrix 2 of 5
- C.4.16 Discrete 2 of 5
- C.4.17 Telepen
- C.4.18 RSS Code (Reduced Space Symbology)
- C.4.19 Composite
- C.4.20 TLC-39
- C.4.21 PDF-417
- C.4.22 Micro PDF-417
- C.4.23 Codablock
- C.5 Non-Decoded Scanners
- Appendix D
- Teklogix Imagers Applet
- D.1 Required Applets
- D.2 Presets
- D.3 Using the Teklogix Imagers Applet
- D.3.1 Configuring the Image Capture Presets (Imaging Tab)
- D.3.2 Configuring the Bar Code Decoding Camera Presets (Barcoding Tab)
- D.3.3 Configuring the Bar Code Decoding Symbologies (Barcoding Tab)
- D.3.4 Barcoding Tab – Configuring Symbologies
- D.3.5 Filter Tab – Manipulating Bar Code Data
- D.3.6 Translation Tab – Configuring Rules
- D.3.7 Advanced Tab
- D.4 Bar Code Symbologies – Descriptions
- D.4.1 Options
- D.4.2 All 1D With Strong Recovery Enabled
- D.4.3 Code 39
- D.4.4 Code 128
- D.4.5 EAN 13
- D.4.6 EAN 8
- D.4.7 UPC-A
- D.4.8 UPC-E
- D.4.9 Code 93
- D.4.10 Codabar
- D.4.11 Interleaved 2 of 5
- D.4.12 GS1 DataBar
- D.4.13 2D PDF-417
- D.4.14 2D Micro PDF-417
- D.4.15 2D Data Matrix
- D.4.16 2D QR Code
- D.4.17 2D Maxicode
- D.4.18 2D Aztec
- D.4.19 Postal: PlaNET
- D.4.20 Postal: PostNET
- D.4.21 Postal: Australian
- D.4.22 Postal: Canadian
- D.4.23 Postal: Japanese
- D.4.24 Postal: Kix
- D.4.25 Postal: Korean
- D.4.26 Postal: Royal
B-6 Psion Teklogix Omnii Hand-Held Computer User Manual
Appendix B: Wireless Zero Config
Wireless Information Tab
• Ad Hoc And Infrastructure: If you are using an Infrastructure network—one in which
the hand-helds must pass data through an access point—leave the checkbox next to This
is an ad hoc network blank.
If you are using an Ad Hoc network—a network in which the hand-helds pass data
directly to other Ad Hoc devices without an access point—add a checkmark in the
checkbox next to This is an ad hoc network to enable Ad Hoc.
• Encryption: WEP (Wired-Equivalent Privacy) encryption prevents others from acci-
dentally accessing your network. If you are not using encryption, you can choose
Disabled from the drop-down encryption menu. Otherwise, leave this field as is.
AES (Advanced Encryption Standard) is a standard for protecting data through encryp-
tion. AES supports key sizes of 128 bits, 192 bits and 256 bits and will serve as a
replacement for the Data Encryption Standard (DES), which has a key size of 56 bits. In
addition to the increased security that comes with larger key sizes, the AES algorithm is
a symmetrical block cipher that can encrypt (encipher) and decrypt (decipher)
information.
• Authentication: 802.11 supports several subtypes of network authentication services:
Open, Shared, WPA, and WPA-PSK. Under Open authentication, any wireless station
can request authentication. The station that needs to authenticate with another wireless
station sends an authentication management frame that contains the identity of the
sending station. The receiving station then sends back a frame that indicates whether it
recognizes the identity of the sending station.
Under Shared authentication, each wireless station is assumed to have received a secret
shared key over a secure channel that is independent from the 802.11 wireless network
communications channel.
Under WPA and WPA-PSK authentication, the use of 802.1x authentication is required.
For wireless networks without a Remote Authentication Dial-In User Service
(RADIUS) infrastructure, WPA supports the use of a preshared key. For wireless net-
works with a RADIUS infrastructure, Extensible Authentication Protocol (EAP) and
RADIUS is supported.
• Network Key: This text box is used to specify a 5 or 13 ASCII character sequence or an
equivalent 10 or 26 Hexadecimal digit sequence that matches the active WEP key on the
access point.
To assign a Network key, highlight The key is provided automatically, and uncheck
the checkbox to disable this option.
Important: Keep in mind that Omnii will only communicate with access points that are
configured with the same SSID.