iv
3.1 What are RFID Command Macros? ...........................................................................22
3.2 Why use macros?.......................................................................................................22
3.3 What can macros do?.................................................................................................22
3.4 What is a macro trigger?.............................................................................................22
3.5 How are macros created?...........................................................................................23
3.6 Which communication interfaces support the use of macros? ...................................23
3.7 What happens to existing Macros if a controller must be replaced? ..........................23
3.8 How can I learn more about the Dashboard and C-Macro Builder? ...........................23
4 COMMAND PROTOCOL ...........................................................................................24
4.1 CBx Command Protocol Overview .............................................................................24
4.2 CBx - Command Packet Structure..............................................................................25
4.3 CBx - Response Packet Structure..............................................................................26
4.3.1 Instance Counter ........................................................................................................26
4.4 CBx Commands Table................................................................................................27
4.5 CBx Command Protocol Examples ............................................................................29
4.5.1 CBx - Controller Command Example..........................................................................29
4.5.2 CBx - Controller Response Example ..........................................................................30
4.5.3 CBx - Gateway Command Example ...........................................................................30
4.5.4 CBx - Gateway Response Example ...........................................................................31
4.6 Node Status Byte Definition Table..............................................................................32
4.7 CBx Error Response Packet Structure .......................................................................33
4.8 CBx Error Code Table ................................................................................................34
4.9 CBx - Error Response Example..................................................................................35
4.10 Notification Messages.................................................................................................36
4.10.1 Notification Message Table ........................................................................................37
4.10.2 Notification Mask Example .........................................................................................37
4.10.3 Notification Message Packet Structure.......................................................................38
5 PROFIBUS INTERFACE............................................................................................39
5.1 Profibus Overview.......................................................................................................39
5.2 Profibus-DP ................................................................................................................39
5.3 Data Exchange ...........................................................................................................40
5.4 Protocol Implementation.............................................................................................41
5.4.1 Definitions...................................................................................................................41
5.4.2 Control Field ...............................................................................................................42
5.4.3 SAP Field....................................................................................................................45
5.4.4 Length Field................................................................................................................45
5.4.5 Application Data Buffer...............................................................................................46
5.5 Examples of Profibus Command/Response Mechanism............................................46
5.5.1 Example 1: Normal Command/Response Sequence .................................................48
5.5.2 Example 2: Unsolicited Responses (Continuous Read Mode) ...................................58
5.5.3 Example 3: Fragmentation of Responses...................................................................62
5.5.4 Example 4: Fragmentation of Commands ..................................................................71
5.5.5 Example 5: Resynchronization ...................................................................................82
6 TECHNICAL FEATURES...........................................................................................87
A MODELS AND ACCESSORIES ................................................................................88
Datalogic Automation RFID Tags ...............................................................................89
B EXAMPLE NETWORK LAYOUTS.............................................................................90
Subnet16™ Gateway –ThickNet Network Layout ......................................................90
Subnet16™ Gateway –ThinNet Network Layout ........................................................91