Library Security Pedestal 3 User's Guide Revision 0.
Library Security Pedestal 3 Publishing Information Disclaimer and Limitation of Liability All information herein is either public information or is the property of and owned solely by TAGSYS who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in connection with such information.
Library Security Pedestal 3 User's Guide Read This First Welcome to the TAGSYS L-SP3 Electronic Article Surveillance (EAS) system. This user’s guide is designed to help you get up and running quickly using this high-quality Radio Frequency Identification (RFID) Anti-Theft system. It describes all you need to know about how to install and use the TAGSYS EAS/AFI system and its associated applications.
Library Security Pedestal 3 If you need assistance Please contact your nearest TAGSYS sales representative or the TAGSYS Welcome Desk at: Telephone: +33 (0) 4 91 27 57 00 Fax: +33 (0) 4 91 27 57 01 E-Mail: info@tagsysrfid.com Website http://www.tagsysrfid.com Contact for Comments We welcome your feedback to help us provide high quality documentation. For technical comments, please contact our Welcome Desk: Telephone: +33 (0) 4 91 27 57 00 Fax: +33 (0) 4 91 27 57 01 E-Mail: info@tagsysrfid.
Table of Contents PUBLISHING INFORMATION __________________________________________________________ 2 DISCLAIMER AND LIMITATION OF LIABILITY __________________________________________________ 2 READ THIS FIRST ____________________________________________________________________ 3 CONVENTIONS _________________________________________________________________________ 3 IF YOU NEED ASSISTANCE ________________________________________________________________ 4 CONTACT FOR COMMENTS ________________________________
Library Security Pedestal 3 4.3.2 PLACEMENT OF PEDESTALS _______________________________________________________ 21 4.3.3 INSTALLING THE PEDESTAL________________________________________________________ 22 5 CONFIGURATION ________________________________________________________________ 27 5.1 CHIP CONFIGURATION _____________________________________________________________ 27 5.1.1 SCANNING DURATION ____________________________________________________________ 27 5.1.
11 WARRANTY CONDITIONS _______________________________________________________ 61 11.1 WARRANTY EXCLUSIONS __________________________________________________________ 61 11.2 GENERAL PROVISIONS ____________________________________________________________ 62 11.3 HOW TO RETURN DEFECTIVE PRODUCTS ____________________________________________ 62 May 2009 Revision 0.
Library Security Pedestal 3 List of Figures Figure 1: FCC power and uplink settings ......................................................................15 Figure 2: LSP3 Panel Overview ......................................................................................17 Figure 3: Electrical Installation Using Power Cord.......................................................20 Figure 4: Clearance Distances around Pedestals.........................................................
List of Tables Table 1: L-SP3 System Components .............................................................................21 Table 2: Description of Buzzer & Counter board Components ...................................24 Table 3: Scanning Duration One Tag in field.................................................................27 Table 4: GPIO Pins - Electrical Characteristics Max Ratings.......................................46 Table 5: Troubleshooting Table..............................................
Library Security Pedestal 3 1 For Your Safety 1.1 General Use The L-SP3 is designed to be rugged and reliable and to provide years of trouble-free service. Please observe the following general tips: Take care not to scratch the device. Keep the device clean. When working with the device, use only TAGSYS-approved accessories. This device is not waterproof and should not be exposed to rain or moisture. Under extreme conditions, water may enter the circuitry.
1.3 Important Safety Information 1.3.1 Operating Environment When connecting the device or any accessory to another device, read its user’s guide for detailed safety instructions. Do not connect incompatible products. As with any RF equipment, users are advised that the equipment should only be used in its normal operating position. May 2009 Revision 0.
Library Security Pedestal 3 2 Certification 2.1 Occupational Health TAGSYS L-SP3 EAS System has been designed and tested to be in conformity with the European Standard EN 50364 “Limitation of human exposure to electromagnetic fields from devices used in Electronic Article Surveillance (EAS), Radio Frequency Identification (RFID) and similar applications” in conjunction with the European Standard EN 50357 describing how to evaluate the exposure level. 2.1.
2.3.1 In Europe (CE and RTTE Directives) The L-SP3 complies (CE Declaration of Conformity granted) with the European EMC directive. The L-SP3 complies with the requirements of the Telecommunication Terminal Equipment Act (FTEG) and the RTTE Directive 1995/5/EC. It is the responsibility of the TAGSYS Reseller to install the L-SP3 as described in this User’s Guide or TAGSYS Documentation. Any modification of the L-SP3 is prohibited without the written consent of TAGSYS.
2.3.2 In USA (FCC Directive) L-SP3 WARNING TO USERS IN THE UNITED STATES FEDERAL COMMUNICATIONS COMMISSION (FCC) RADIO INTERFERENCE STATEMENT 47 CFR Section 15.105(b) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Figure 1: FCC power and uplink settings CAUTION: In any case, for operational configuration this value should not exceed 4W to be in compliance with FCC. The “Antennas and Power” parameter in “Advanced Configuration” Tab does not allow setting a higher power value than 4.0W at most. Please see above Figure 1: FCC power and uplink settings. CAUTION: ISO15693 uplink data rate you should not exceed 1.65kbits/s in order to comply with FCC standard certification.
Library Security Pedestal 3 3 System Overview 3.1 Features Being a standalone solution, TAGSYS security pedestal do not need to be linked to the library database, and can still operate when the Integrated Library System (ILS) is down or under maintenance. The security pedestal does not require additional equipment to operate.
3.2 Brief L-SP3 Description Figure 2: LSP3 Panel Overview May 2009 Revision 0.
Library Security Pedestal 3 The components of the L-SP3 EAS system are contained within the L-SP3 pedestal. At least two pedestals are required for each EAS gate. A set of pedestals is known as a gate and may consist of several pedestals. Please see section 4 “Installation” for more information. The L-SP3 is built in a one frame: An L-SP3 Electronics unit is used to control each pedestal. This electronics unit generates the RF signal transmitted by the antennas and picks up the reply from the RFID tag.
4 Installation 4.1 Recommendations before Installation 4.1.1 Wire Feed Sheaths Within the framework installation you need at least a power supply cable sheath and an Ethernet cable sheath to connect to the Ethernet network. These sheathed cables will be located at the bottom center of the pedestal as shown in Figure 8.
Library Security Pedestal 3 4.1.2 Electrical Safety Rules The L-SP3 is powered up via a Mains Supply IEC Cord. A group of up to 5 Pedestals can be daisy chained and powered via a single IEC power cord connected to a wall socket. The mains wall socket should provide at least 2 Ampere and be protected by a differential circuit breaker limiting the current to 5 Ampere maximum. Figure 3 here below shows how to connect the L-SP3 pedestals to the mains.
4.2 L-SP3 RFID System Components The components included in the L-SP3 RFID System package are listed in Table 1 Table 1: L-SP3 System Components Quantity Description 1 L-SP3 Pedestal 40 mm Philips-head, countersunk screws with a diameter of 6 mm 2 ways 3.81 mm Green Plugs Vertical Cable Entry with Screw for Synchronization cable 4 ways 3.81 mm Green Plugs Vertical Cable Entry with Screw for I/O Wiring 8 1 1 4.
Library Security Pedestal 3 CAUTION: Each L-SP3 should be installed within following tolerances: Horizontal angular alignment tolerance with reference to pedestals alignment: 0° +/-2° Vertical angular tolerance with reference to ground surface : 90° +/-1° CAUTION: Each L-SP3 must be installed at least 2 meters away from sliding doors. Metal frames do pick up & radiate stray Radio ham electromagnetic field which can lead to false triggering. Prior to installation a site survey is highly recommended.
They must be well aligned and well centered. The two Red Light Reflex Switch orange LED must be continuously ON when powered If one of the orange LED still blinks when perfectly aligned and centered, check that the spacing does not exceeds the recommended values or use the fine beam adjustment procedure using the support plate screws adjustment. Then the 2 pedestals can be secured to the ground. A good positioning will ensure the two red LED beams to be reflected by the reflector as shown below.
Library Security Pedestal 3 On figure 7 below, the two Beam Crossing Cells support is shown. To do a fine adjustment of the 2 beams, use a hexagonal key to screw or unscrew the top left screw (to adjust height of beams ref 7 circled) and the bottom right screw (to adjust the lateral positioning of the beams ref 8 circled). They are spring loaded to improve accuracy and keep in place the two sensors after adjustment.
Figure 8: Pedestal Mounting Base Dimensions 1. Identify and mark the location of the holes to be drilled for mounting the pedestal to the ground. The use of a tape measure and a square is recommended. 2. Drill the cable access and mounting holes according to the type of ground surface: a. Wooden floor: Drill eight holes with a diameter of 4 mm for the mounting screws and one hole with a diameter of 19 mm for the cable access. b.
Library Security Pedestal 3 5. Engage the power supply cable in the electric sheath and the Ethernet cable in the other sheath (please refer to section 4.1.1 “Wire Feed Sheaths”). 6. Place the pedestal base over the mounting holes. Insert and fasten the screws in the mounting holes according to the type of ground surface: Wooden floor: Insert the screws directly into the mounting holes and tighten the screws in place.
5 Configuration All configuration operations of L-SP3 systems are carried on with the L-SP3 Configuration Utility Software. 5.1 Chip Configuration 5.1.1 Scanning Duration For optimal performance the scanning duration (T_scan) should not exceed 250ms. T_scan is the period to scan all pedestals of a group of N pedestals, i.e. a Master and (N-1) Slave Pedestals. Depending on your chip configuration and the number of pedestals installed you can determine the scanning duration of your installation.
Library Security Pedestal 3 Default Configuration of the L-SP3 is set to Master. Figure 10: Chronogram Sample (1 Master/ 4 Slaves) T_scan Synchronization Burst MASTER Pt SLAVE1 SLAVE2 SLAVE 3 SLAVE 4 Synchronization burst: start burst to synchronize the gates (Period of T Scan ms) Processing time (Pt): depends on the number of tags to be detected and the settings.
5.2.2 Wireless Synchronization In Standard Synchronization mode, section 5.2.1, if pedestals spacing exceeds the recommendation of section 4.3.2 “Placement of Pedestals”, wire synchronization becomes mandatory. When more than two pedestals are installed, it is mandatory to install the Master on the far left or right of the slave’s line for a better propagation and detection of the air synchronization burst. Figure 11 below shows an example of optimal configuration.
Library Security Pedestal 3 L-SP3 Master and all others pedestals set as Slaves. Each pedestal is connected to the other using ideally a twisted pair cable. This cable will propagate the synchronization signal to all pedestals in parallel. Wire connection: First prepare a cable of appropriate length to connect 2 consecutive Electronics as shown in Figure 11. A minimum wire gauge of 22AWG (0.2mm²) is enough, preferably a twisted pair.
Figure 13: Advanced Settings Tab Sections and Fields Steps to undergo: 1. Prepare a 2 wire cable of appropriate length and number of connectors to wire up each pedestal. Use the 3.81 mm Green Plugs Vertical Cable Entry with Screw provided. 2. Connect all pedestals Synchronization to the Synchronization I/O as shown on Figure 11. 3. Set each pedestal to hardwire synchronization modifying the “Mode” in the “Synch” Section of the “Advanced Configuration” tab of the L-SP3 Pedestal Configuration Tool. 4.
Library Security Pedestal 3 5.3 Parameters Configuration of the Ethernet Interface Don’t forget to power up your installation before carrying on the following steps The first step is to allocate a unique IP address to each L-SP3. This operation will allow identifying each L-SP3 on site before configuring them on the Ethernet network. By default the IP address is 169.254.0.100 (port 4001) (IPv4 Automatic Private IP Addressing).
Follow the installer steps: May 2009 Revision 0.
Library Security Pedestal 3 After the Library Pedestal Configuration Tool is installed, a shortcut to the application will be added to the desktop and to the Start Menu. Double-click on the application shortcut to start the application. 34/63 Revision 0.
5.4.2 Communication Configuration Figure 14: Communication Configuration Tab (connected to a L-SP3) This tab is used either: • To establish connection to a pedestal when its IP address is known. • To discover pedestals connected to the same network as the PC running the configuration tool. • To modify the TCP/IP configuration of a discovered pedestal (not including port) if this address is not coherent with the address of the network it is connected to.
Library Security Pedestal 3 Click “Discover Devices” when not connected to a pedestal. After a few seconds, the list of discovered pedestals (IP Address, Port and MAC address) is displayed. Double-Click an item in the list to connect to the corresponding pedestal. In case a pedestal is properly discovered but connection attempts fail, please make sure that : • No other host is already connected to the pedestal.
5.4.3 TCP/IP Configuration and Firmware Upgrade Figure 16: TCP/IP Configuration and Firmware Upgrade Tab This tab is used either: • To upgrade System Firmware. • To upgrade Radio Firmware. • To modify TCP/IP Configuration, including port. Upgrading System Firmware Click “System Upgrade”, and then select the appropriate firmware file. A bar shows the progress of the upgrade process.
Library Security Pedestal 3 When upgrading both System and Radio firmware, it is advised to reboot the pedestal only once after both upgrades are completed. The EAS detection is suspended during the upgrade process. Do not power-off pedestal during the upgrade process. Failure to respect this procedure may corrupt pedestal firmware and require product to be sent back to TAGSYS.
This tab is used either: • To check / update pedestal clock. • To check / toggle GPIOs Level. • To check antenna noise level. • To check / configure people counter. • To check alarms database. Checking / Updating pedestal clock Pedestal clock is displayed in real-time in the “Date & Time” section. Click “Synchronize Time” to synchronize pedestal clock with computer clock. Pedestal clock is used as a date stamp when a theft is committed.
Library Security Pedestal 3 An icon appears in real-time in “People Counter” section as IR sensor is crossed. Click “Clear People Counter” to reset people counter. To reset people counter, you can also use a pointed element (for example, a paper clip), insert it in the hole on the left of the display window and press (not too strong) until zero is displayed.
Figure 18: Database Window When this window is open and “suspend detection” check box is selected then EAS/AFI detection is automatically suspended. It is resumed when the window is closed. If “suspend detection” check box is not selected then detection is not suspended (in this case database download may be slower). In “Database” window: • Click “Refresh” to update database display. • Click “Clear” to permanently erase pedestal database. • Click “Close” to close the window.
Library Security Pedestal 3 5.4.5 Basic Pedestal Configuration Figure 19: Basic Pedestal Configuration Tab This tab is used either: • To select the chip to be detected as well as detection options. • To configure inter-pedestal RF synchronization. • To configure / test alarm duration. • To configure the 2 GPIO available to user with predefined functions. Selecting the chips to be detected as well as detection options In the “Chips” section, select the chip to be detected in the drop-list.
to be read in the corresponding fields. You must also specify which blocks should be reported first (lowest or highest) by selecting/unselecting the “Lowest Blocks First” checkbox. Configuring / Testing alarm duration In the “Alarm Duration” section: • Select the alarm duration in the drop-list. • Click “Test” to trigger an alarm (this is useful either to test alarm duration, or to identify the pedestal you’re connected to).
Library Security Pedestal 3 Figure 20: Multi-gate configuration with two different IDs System B ID = 2 Nearby area with interferences M2 System A ID = 1 S1 M1 S1 S2 S3 S2 Once you have set the basic configuration, check that all the slaves are well synchronized. To do so, L-SP3 electronics unit green LEDs should flicker cyclically. If not, proceed to the advanced configuration stage.
• GPIO: Port has no predefined function; it can be driven remotely by Host PC via API. • Output Trigger: when Theft is detected (EAS or AFI signal setting the alarm), the Port Signal level matches the Active Level Setting (“Low” or “High”). The output voltage level of the port should match the active voltage to set the external alarm device wired up. Whenever the GPIO is set as an Output Trigger, It is possible to set a pulse Width and a Pause in ms. In Figure 21, the Pulse Width is set to 100ms.
Library Security Pedestal 3 Table 4: GPIO Pins - Electrical Characteristics Max Ratings Parameters Min. Typ. Max. Unit Input Voltage Range 0 -28 V Input Voltage (Low Level) 0 -0.9 V Input Voltage (High Level) 1.5 -28 V Output Voltage Range 0 -28 V Maximum Continuous Output --1.4 A Current Output Over Current Protection 1.9 2.8 3.8 A In output mode the LSP3 GPIO can only sink current to ground. User needs to provide adequate DC Limited Current Supply to Port#1 and Port#2 (Open Drain).
Figure 24: Connection of a Switch as an Input Device. Figure 25: Connection of a Source and Sink Current Supply as an input Device Applying negative voltage may destroy the GPIO! Beware not to inadvertently toggle the GPIO from Input to Output Mode: you may create a short circuit when using a high current source to ground as an input device! Refer to Figure 25. May 2009 Revision 0.
Library Security Pedestal 3 5.4.6 Advanced Pedestal Configuration Figure 26: Advanced Pedestal Configuration Tab This tab is used either: • To configure advanced inter-pedestal RF synchronization parameters. • To configure advanced alarm detection parameters. • To configure advanced alarm signaling parameters. • To configure antenna sequence, RF output power and region of operation.
If wireless synchronization is selected: • Select the antenna that should be used for emitting and receiving synchronization bursts. • Select the synchronization burst detection sensitivity. If default value does not ensure the correct synchronization of all slaves then it is possible to adjust the sensitivity of the nonsynchronized slaves. You just have to adjust the detection level until you get the required synchronization (LEDs flickering cyclically).
Library Security Pedestal 3 In “Antennas and Power” section: • Select the RF output power. The output power can be lowered to avoid disturbing nearby RFID systems (in such a case, check system performance). The output power can be increased, but only to carry on tests. • Select antenna sequence used when scanning the pedestal. Select “Top>Center>Bottom” for standard operation or specifically an antenna for diagnosis operations (Top, Center or Bottom).
5.5.2 Resetting the Remote People Counter See section Checking / Configuring people counter of 5.4.4 Monitoring Pedestal Activity for more information. 5.5.3 Adjusting the Level of the Buzzer Sound Using a flat headed 4mm screw driver (less than 4mm max diameter) through the outermost left hole, adjust the buzzer sound to the desired level turning clockwise or anticlockwise.
Library Security Pedestal 3 6 Operation 6.1 Theory of Operation The RF motherboard in the electronics unit produces radio frequency (RF) electromagnetic signals that are transmitted via the antennas in each pedestal. Each antenna transmits for a short period, receives for a short period, and is inactive for the remainder of the time. 6.2 Starting the System There is no ON/OFF switch. The system operates when mains power is applied plugging in the IEC plug into the Wall mounted plug. 6.
7 Maintenance 7.1 Servicing the Pedestals No regular servicing or maintenance is required, except for keeping the covers clean, and occasionally checking the integrity of the cover seals. It is recommended that the pedestal unit be inspected at least once per year by an approved TAGSYS technical representative. Refer to section 1.2 “Care and Maintenance” for general maintenance information. 7.
Library Security Pedestal 3 How to change them: WARNING: Beware of Hazardous AC mains 110/230V Voltage! Make sure there is no power supply before carrying on maintenance operation. To do so, the micro circuit-breaker must be opened and the Main Power Supply Cord Unplugged from the Wall Socket. 54/63 Revision 0.
8 Troubleshooting The following table lists the most common problems and describes their solutions. Table 5: Troubleshooting Table Fault Possible Causes Solution Differential or micro circuit Check the differential and breakers micro circuit breaker status System fuse Replace fuse. Check cabling and connections. Cabling fault. Replace any suspected Power cable fault faulty cables. No power Alarms missed (TAGSYS RFID tags with theft bit ON Tuning fault. not triggering alarms). Tuning fault.
Library Security Pedestal 3 data or power cables within 400 mm illuminated exit signs generating noise between 80 and 100 kHz digital phone lines (wideband noise) within 200 mm 56/63 Revision 0.
9 Technical Specifications 9.1 Mechanical Data Parameter Weight Value Pedestal: 24 kg (48 lb) Pedestal dimensions (H x W Approx. 1780 mm x 550 mm x 45 mm (70 x 22 x 2 in) x D) excluding base plate. Connection for pedestal IEC Supply Power Cord and Ethernet Cable 9.2 Electrical Data Parameter Power supply Power consumption Conformity Microchip compatibility Operating temperature Storage temperature Fuse on AC mains Fuse on DC supply Value 100/240 Volts AC, 0.
Figure 31: Outer Dimensions of LSP3 Panel May 2009 Revision 0.
10 Performance Test 10.1 Test Conditions Distance between each pedestal not greater than the maximum recommended distance of 915 mm (3 ft.). All tags used must have the theft bit set. Use of reference tag (Antenna Tuning Kit Test Card) is strongly recommended for repeatable results. Testing to be carried out at walking pace (maximum of 1 meter/second). Metal, conductive materials, human hands or body must not shield tags.
Library Security Pedestal 3 L-SP3 Detection Performance Test Library / Facility installed: _______________________________ Location of Pedestals: _______________________________ Specific installation notes: _______________________________ Figure 34: Test Chart Pedestal A Pedestal B S/N: S/N: Software Version: Software Version: 183mm. 366 mm. 549 mm. 732 mm. Zone 1 Zone 5 Zone 6 Zone 10 Zone 11 Zone 15 1320 mm. 920 mm. 520 mm.
11 Warranty Conditions TAGSYS warrants that its L-SP3 shall comply with the functional specifications set forth herein for a period of one year from the date of delivery to the Buyer. This warranty is valid for the original Buyer of the Product and is not assignable or transferable to any other party.
Library Security Pedestal 3 11.2 General Provisions This warranty sets forth the full extent of TAGSYS responsibility regarding the Product. In any event, TAGSYS warranty is strictly limited to (at TAGSYS’ sole option) the replacement, the repair or refund of the Products purchase price to TAGSYS, of Products considered as defective by TAGSYS.
Product Return Form Customer Profile: Company: ………………………………….. Address: Contact Name: …………………………………. …………………………………………………………… Contact e-mail: …………………………………. …………………………………………………………… Contact Phone: …………………………………. City & State: ………………………………….. Contact Fax: …………………………………. Zip Code: ………………………………….. Country: …………………………………... Order identification: Invoice Number: …………………………………. Product Name: ………………………………….. Return Quantity: …………………………………. Order Number (OEF): Parcel Pick up: Length: .…………………………………..