RFID RF-N6004 UHF Reader Module User Manual

May 15, 2024
RFID

RFID RF-N6004 UHF Reader Module

RFID-RF-N6004-UHF-Reader-Module-image

Specifications

  • Software Environment: Windows Server 2003, Windows XP Service Pack 2, Windows 7, Windows 10 operating systems
  • Hardware Environment: P4/1.7GHz PC with better configuration, 512M or larger storage, 40G hard disk
  • Demo Version: V0.17.0.0

Product Usage Instructions

Connect Reader All functions can only be operated after a successful connection.

RS232 Communication ConnectionDouble click GReaderDemo.exe to start the Demo. Grey icons on the main interface means the reader is not connected. Select communication mode RS232 connection, connection parameters, COM (the COM number of the PC chosen) in Device Connection. Choose 115200 (default) as Baud rate, then click Confirm.If the connection is successful, the icons in the tool bar will be colored indicating a successful connection. RS485 Communication Connection Select communication mode RS485 connection in Device Connection, fill in the parameters, and then click Confirm to connect the device.

FAQs

Q: What should I do if the reader is not connecting?
A: Check the communication mode and parameters set in the Device Connection settings. Ensure that the hardware connections are secure and correctly configured.
Q: How do I know if the connection is successful?
A: Successful connections are indicated by colored icons in the tool bar of the demo interface.

“`

Demo Instruction

The Demo mainly carries out the functions of system control, parameter set and get, tag reading and writing, and data display, etc. Before using the demo, please check whether the reader hardware connection is all done, and pay attention to the following aspects:
1. The network parameters are configured correctly (connect WIFI if necessary); 2. The antenna ports that need to be used are connected to antennas; 3. The reader is power-on( the buzzer is ringing).
2 Demo Applicating Environment
Software Environment Windows Server 2003Windows XP Service Pack 2Windows 7 Windows10 operating systems.
Hardware Environment P4/1.7GHz PC with better configuration,512M or larger storage, 40G hard disk.
3 Demo Version
V0.17.0.0

Demo Operation

4.1 Connect Reader
All functions can only be operated after a successful connection.

4.1.1 RS232 Communication Connection
Double click “GReaderDemo.exe” to start the Demo. Grey icons on the main interface means the reader is not connected. Select communication mode “RS232 connection”, “connection parameters”, “COM”( the COM number of the PC chose) in Device Connection. Choose 115200(default) as Baud rate, then click “Confirm”, as figure 4.1.1.1 shows.
Figure 4.1.1.1 RS232 Connection
If the connection is successful, the icons in the tool bar will be colored as figure 4.1.1.2 shows. It means COM is connected.

Figure 4.1.1.2 RS232 Connection success
4.1.2 RS485 Communication Connection
Select communication mode “RS485 connection” in Device Connection, fill in the parameters, and then click “Confirm” to connect the device, as Figure 4.1.2.1 shows. If the connection is successful, the icons will be colored as Figure 4.1.2.2 shows.

Figure 4.1.2.1 RS485 Connection Figure 4.1.2.2 RS485 Connection success

4.1.3 TCP Client Communication Connection
Select communication mode” TCP client” in the ” connect reader”, “connection parameter”, and fill in” “192.168.1.168:8160 ” (192.168.1.168 is the default IP of the reader, 8160 is the port number). Click “Confirm”, as Figure 4.1.3.1 shows. If the connection is successful, the icons will be colored like Figure 4.1.3.2.
Figure 4.1.3.1 TCP Connection

Figure 4.1.3.2 TCP Connection success
4.2 Data Displaying Area
Click ,the data displaying area will be like Figure 4.2.1.

Figure 4.2.1 data displaying area parameter meaning
Type: type of tag:6C, 6B and GB ; EPC: EPC data of the tag which is readable and writable ; TID: TID data of the tag, which is a unique identification and readable only ; Userdata: data of the user area, readable and writable ; Reservedata: data of the reserved data, to store the tag password, etc. ; Totalcount: total number of the times the tag read ; ANT1: number of the times antenna 1 read ; ANT2: number of the times antenna 2 read ; ANT3: number of the times antenna 3 read ; ANT4:number of the times antenna 4 read ; ANT5: number of the times antenna 5 read ; ANT6: number of the times antenna 6 read ; ANT7: number of the times antenna 7 read ; ANT8: number of the times antenna 8 read ; RSSI: signal strength ; Frequency: the frequency of the tag being read ; Phase: phase value of the tag being read ; ReadTime: reading time .
4.2.1 Read EPC
Click , and the EPC being read will be displayed on the data displaying area. It can read the EPC data area of the ISO18000-6C tag and national standard tag.
EPC is displayed in hexadecimal strings, and the length is in words (1 word=2 bytes=4 hexadecimal character) .
To read the EPC data of custom length, please refer to Custom Reading for details.

4.2.2 Read TID
Click , and the EPC and TID data being read will be displayed on the data displaying area. It can read the EPC and TID data area of ISO18000-6B, ISO18000-6C, and national standard tag.
TID is displayed in hexadecimal strings, and the length is in words (1 word=2 bytes=4 hexadecimal character) . The length of TID is defaulted to be 6 words.
To read the TID data of custom length, please refer to Custom Reading for details.
4.2.3 Custom Read
4.2.3.1 ISO18000-6C Tag
Select “6C” as tag type , click ,and a dialog box will pop up, like Figure 4.2.3.1. Detail parameter instruction will be as follows:
Match parameter, which can be read by matching the known tag data, means that only this tag can be read.
Read TID: select read tag TID data. The reading mode is defaulted to be “self- adaptable” and the reading length is in words, as shown in Figure 4.2.3.1.
Read user data: choose to read the data of the tag user area. The starting address and reading length are in words, as shown in Figure 4.2.3.2.
Read reserved area: select the data of the tag reserve area. The starting address and reading length are in words, as shown in Figure 4.2.3.3.
Access password, the access password for tag checking, as shown in Figure 4.2.3.4.

Figure 4.2.3.1 Custom Reading for EPC Tag (TID) Figure 4.2.3.2 Custom Reading for EPC Tag (Userdata)

Figure 4.2.3.3 Custom Reading for EPC Tag (reserved area)
Figure 4.2.3.4 Custom Reading for EPC Tag (Access Password/Other)
4.2.3.2 ISO18000-6B Tag Select “6B” as tag type, click , and the dialog box will pop up. As
shown in Figure 4.2.3.5. TID data or user data can be selected to read, and TID matching reading can be performed. Users unfamiliar with tag protocol

please ignore this function. The starting address and reading length are in words.
Figure 4.2.3.5 Custom Reading for 6B tag
4.2.3.3 GB/T 297682013 Tag Select”GB” as tag tye, click ,and the dialog box will pop up as shown
in Figure 4.2.3.6. TID data or user data can be selected to read, and TID matching reading can be performed.

Figure 4.2.3.6 Custom Reading for GB-T 297682013 Tag (TID) Figure 4.2.3.7 Custom Reading for GB-T 297682013 Tag (userdata)

Figure 4.2.3.7 Custom Reading for GB-T 297682013 Tag (accesss password)
4.2.4 Stop
Click to stop all RFID operations of the reader and put the reader into an idle state.
4.3 Write Data 4.3.1 Write EPC Data
Select Write on the main interface -> click , and the dialog box will pop up as shown in Figure 4.3.1 .

Figure 4.3.1 Write EPC Data
Select data (with TID information) of a tag, fill in EPC data (hexadecimal character string), then click “Confirm”.
4.3.2 Write User Data

Select Write on the main interface -> click pop up, as shown in Figure 4.3.2.

and the dialog box will

Figure 4.3.2 write user data
Select data (with TID information) of a read tag, fill in EPC data (hexadecimal character string), then click “Confirm”.
4.3.3 Custom Tag Operation
Select a tag data in the displaying data area before custom tag operation.

Otherwise, the tag with the best signal will be the default one. Take care to follow the communication protocol about the writing/ reading/ locking/ destroying for the tag. 4.3.3.1 ISO18000-6C Tag
Select 6C as tag type. Click , and the dialog box will pop up, as shown in Figure 4.3.3.1. Writing operation can change data of the specified area of the tag. Access passwor is needed if such area is locked.
Figure 4.3.3.1 6C Tag Custom Operation(Write)
Locking operation to 6C tag. The interface is 6C as shown in Figure 4.3.3.2. Select the area for operation and corresponding operation, fill in password then the operation can be done, or it will fail (it also fails for tag without any password).

Figure 4.3.3.2 6C Tag Custom Operation( Lock)
Destroying operation to 6C tag is as shown in Figure 4.3.3.3. Click Destroy after filling in the password, then the tag will be destroyed. This operation is irrevocable and the tag destroyed will be invaid permanently.
Figure 4.3.3.3 6C Tag Custom Operation(Destroy)

4.3.3.2 ISO18000-6B Tag Select 6B as tag type. Click , and the dialog box will pop up, as
shown in Figure 4.3.3.4. Only user area is writable area for 6B tag. Click “Write” after filling in the start address and writing content.
Figure 4.3.3.4 6B Tag Custom Operation(Write)
The locking operation for 6B tag includes locking and locking get. As shown in Figure 4.3.3.5, fill in operation address, and click “Lock” to lock this address. The locked address is irreversible. Click “Get” to check if the adress is locked.
Notes: The locking for 6B tag is irrevocable and irreversibel. And The lock operation defined by this command is a single operation.

Figure 4.3.3.5 6B Tag Custom Operation(lock)
4.3.3.3 GB/T 297682013 Tag
Select GB as tag type. Click , and the dialog box will pop up, as shown in Figure 4.3.3.6. Select the writing area, fill iin the address and content, click “Write”, then the opertion is done with the Write successfully Prompt. Read the data after writing to check if the data writing is correct if needed.

Figure 4.3.3.6 GB/T 297682013 Tag Custom Operation(Write)
The locking operation of national-standard tag is as shown in Figure 4.3.3.7. Select the area for operation and corresponding operation, fill in password then the operation can be done, or it will fail (it also fails for tag without any password).
Figure 4.3.3.7 GB/T 297682013 Tag Custom Operation(Lock)
Destroying operation to national-standard tag is as shown in Figure 4.3.3.8. Click Destroy after filling in the password, then the tag will be

destroyed. This operation is irrevocable and the tag destroyed will be invaid permanently.
Figure 4.3.3.8 National-standard Tag Custom Operation(destroy)
4.4 Device Configuration
Select Device Control in the main interface of the Demo ->Device Configuration and then the dialog will pop up as shown in Figure 4.4 .

Figure 4.4 Device Configuration
4.4.1 RS232 Parameter
The COM parameter is on the top left corner as shown in Figure 4.4.1. Click “Get” to acquire the communication baud rate parameter of the COM. Then click Setting to set the communication baud rate parameter of the COM. Baud rate includes 9600 bps, 19200 bps, 115200 bps, 230400 bps and 460800bps, and the others are unsupported. The default one is 115200 bps.

Figure 4.4.1 COM Parameter
4.4.2 RS485 Parameter
The RS485 parameter is on the top left corner as shown in Figure 4.4.2. Click “Get” to acquire the communication baud rate parameter of the RS485. Then click Setting to set the communication baud rate parameter of the COM. Baud rate includes 9600 bps, 19200 bps, 115200 bps, 230400 bps and 460800bps. The default one is 115200 bps. The RS485 BUS address(0~255) is on the text box on the right.

Figure 4.4.2 RS485 parameter
4.4.3 Ethernet Parameter
The Ethernet parameter is on the lower left corner as shown in Figure 4.4.3.1. Click “Get” to check the Ethernet parameter of the reader, then click Setting to set the Ethernet parameter.
Click “Get” to check the Ethernet parameter after configuration(as shown in Figure 4.4.3.2) if Acquire IP Automatically is being used as shown in Figure 4.4.3.3. Connect the reader with TCP as shown in Figure 4.4.3.4,fill in IP address, click “Set”, then the prompt will pop up as shown in Figure 4.4.3.5. Acquire IP Automatically normally works with a router.

Figure 4.4.3.1 Ethernet parameter Figure 4.4.3.2 Acquire IP Automatically

Figure 4.4.3.3 IP Parameter Figure 4.4.3.4 TCP Connection

Figure 4.4.3.5 TCP Connect Success
4.4.4 Reader Time
The reader time is on the top right of the reader as shown in Figure 4.4.4.1. Click “Get” to acquire the time of the reader. The time is based on UTC and displayed according to the current time zone. Double click the text box to fill in the current system time automatically. Click setting to set the reader time as shown in Figure 4.4.4.2 .

Figure 4.4.4.1 Get the Reader Time Figure 4.4.4.2 Reader Time Setting

4.4.5 Reader MAC
The MAC parameter is on the top right of the popup as shown in Figure 4.4.5. Click “Get” to acquire the MAC parameter of the reader.
Figure 4.4.5 Reader MAC
4.4.6 TCP Server/Client Mode
The TCP server/client mode parameter is on the lower right of the popup as shown in Figure 4.4.6.1. Click “Get” to acquire the TCP server/client mode parameter of the reader. If it is configured to be client mode, this IP should be fill in the IP of the user’s computer, then click Setting as shown in Figure 4.4.6.2. The default port is 8160.
Disconnect and go back to the main interface after setting, select Connect Device ->Tcp Server,then the tcp server interface will pop up as shown in Figure 4.4.6.3. Click Start Monitoring as shown in Figure 4.4.6.4, there will be prompt saying the connection is successful after a few seconds. Then click Stop Monitoring or close the popup directly.

Figure 4.4.6.1 TCP Server/Client Mode Parameter Figure 4.4.6.2 Set TCP Server/Client Mode Parameter

Figure 4.4.6.3 TCP Client Mode Figure 4.4.6.4 Monitoring Port

Figure 4.4.6.5 Connection success
4.5 GPI/O Configuration
Select Device Control in the main interface of the Demo->Device Configuration, and the dialog box will pop up. Select GPIO on the left of the popup and enter the GPIO controlling interface as shown in Figure 4.6 .

Figure 4.6 GPIO Configuration
4.5.1 GPO Configuration
GPO configuration is on the top left of the interface, through which the electrical level of the GPO can be configured as shown in Figure 4.6.1. The low electrical level will be on and high electrical level will be off, if it is connected with a relay. If it is connected with a optocoupler, the electrical levels remain unchanged.

Figure 4.6.1 GPO Configuration
4.5.2 GPI State Get
The GPI state is on the top right of the interface. Through which the GPI state can be queried as shown in Figure 4.6.2.
Figure 4.6.2 GPI State Get

4.5.3 GPI Operation Configuration

The GPI operation is on the lower right of the interface. Select a GPI port number, and click “Get” to check the related configuration of the port as shown in Figure 4.6.3.1. There are multiple conditions optional for trigger condition and Stop condition. Trigger instructions can be written according to communication protocols or extract directly from logs with the following methods:
1. Suppose that a port (GPI1) need to be configured to read the TID of the 6C tag after triggering. Operations are detailed in Read TID, as shown in Figure 4.6.3.2 and Figure 4.6.3.3 ;

2. Click

on the left to switch and an interface as shown in

Figure 4.6.3.4 will be seen ;

Find

data

with

“send-[MsgBaseInventoryEpc]-[5A000102100008000000010102

0006ED08]” in the log interface and extract”

5A0001021000080000000101020006ED

08″ from it ;

4. Remove the 2-digit frame header and 4-digit check code in the end.

0001021000080000000101020006 is the TID command for tag reading.

Other command can be also acquired with the same operation ;

5. Open GPIO interface, select GPI 1 get as shown in Figure 4.6.3.1. Select

trigger condition and stop condition, fill the command from step 4 in the

trigger command, then click Configure as shown in Figure 4.6.3.4. When the

configuration is successful, the reader reads the TID operation of 6C tag

when the electrical level of GPI1 port is high and stop reading when the

electrical level is low .

When the stop condition is “delay stop”, the specific delay time can be

filled in at delay time area (0 means infinite delay time). And the unit is 10ms.

The reader will stop after corresponding period when the stop condition is

triggered if the configuration is done.

Figure 4.6.3.1 GPI Operation Get Figure 4.6.3.2 Main Interface

Figure 4.6.3.3 Read TID of 6C tag Figure 4.6.3.3 Log

Figure 4.6.3.4 GPI Operation Configuration
4.6 RFID Configuration
Select Device Control in the main interface of the Demo-> RFID Configuration and the dialog will pop up as shown in Figure 4.7 .

Figure 4.7 RFID Configuration
4.6.1 EPC Baseband Parameter
The EPC baseband parameter is on the top left as shown in Figure 4.7.1. Click “Get” to acquire the EPC baseband parameter. And click Setting to set the EPC baseband parameter.
Figure 4.7.1 Baseband Parameter Configuration
R/W effect changes with the changing of the baseband parameter configuration (the configuration can be customized according to the real application, but under the guidance of our engineer).
There are 6 choices for EPC baseband rate: Tair=25us, FM0, LHF=40KHz; dense reading mode; Tair=25us, Miller4, LHF=300KHz; fast reading mode; Tari=25us, Miller4, LHF=320KHz; 255/AUTO .
4 choices for Session:0 ; 1 ; 2 ; 3 . 16 choices for Q value:0/single tag; 1; 2; 3; 4/multiple tag; 5; 6; 7; 8; 9; 10; 11; 12; 13; 14; 15 . 3 choices for tag searching: A side inventory-taking; B side inventory-taking; A|B double sides inventory-taking .

4.6.2 Power Configuration for Antenna Port
The antenna port is on the lower left as shown in Figure 4.7.2. Click “Get” to acquire the antenna power. And click Setting to set the antenna power.
Figure 4.7.2 Power Configuration for Antenna Port
Select the corresponding antenna port(connected with antenna), and select corresponding power value from the power list. Then click Set, and the Configured Successfully prompt will pop up.
4.6.3 Auto-idleness Configuration
Automatic idle mode means: when in constantly reading, the reader will enter idle state automatically for power saving for a period if no tag is read for 3 round constantly. When the idle state is over time, the reader will start reading again as shown in Figure 4.7.3.

Figure 4.7.3 Automatic Idleness Configuration
4.6.4 Tag Filtering
The antenna power is on the lower left as shown in Figure 4.7.4. Click “Get” to acquire the tag uploading parameter. And click Setting to set the tag uploading parameter.
Filtering Time: means during a reading instruction execution period, the same tag content can only be uploaded once in repeated tag filtering time, 0~65535,the time unit is 10ms.
RSSI threshold value:give up uploading and discard when the RSSI value of the tag is lower than the threshold value.

Figure 4.7.4 Tag Filtering
4.6.5 Hopping Frequency Management

Select hopping frequency in the menu bar on the left as shown in Figure

4.7.5.1. Select FCC902~928MHz in the Working frequency range spinner (as

shown in Figure 4.7.5.2). Click Set Frequency Range, then select single

frequency(as shown in Figure 4.7.5.4) in the frequency list on the left.

Click”

” to import it to the list box on the right. Then click Set again.

To choose full frequency range, just click

. All frequency is in the list

box on the right. All frequency in the list box on the right will be removed

if

is clicked.

Figure 4.7.5.1 Hopping Frequency Management Figure 4.7.5.2 Working Frequency Range Selection

Figure 4.7.5.3 Hopping Frequency Switch Selection
Figure 4.7.5.4 Frequency Selection
Notes: When doing this setting, the purpose of the automatic operations is to avoid the external signal interference. Normally it is defaulted to be automatically(as shown in the spinner of Figure 4.7.5.3).

4.7 Other Configurations 4.7.1 Wiegand Communication Parameter Configuration
Select Device Control in the main interface of the Demo->Device Configuration, and the dialog box will pop up. Select GPIO on the left popup. The Wiegand Configuration is at the lower left. Click “Get” to check the Wiegand communication parameter of the current device as shown in Figure 4.8.1.1.
There are 3 types of Wiegand communication: Wiegand 26, Wiegand 34 and Wiegand 66. Reader extracts the end data of EPC code or TID code according to Wiegand communication format and outputs it through Wiegand signal. It extracts 3 bytes at the end for Wiegand 26 , 4 bytes for Wiegand 34 format and 8 bytes for Wiegand 66 format. There are 2 types for data transfer: Transfer EPC end data and transfer TID end data. Click Set after selecting corresponding parameters as shown in Figure 4.8.1.2.
Figure 4.8.1.1 Wiegand Communication Parameter Get

Figure 4.8.1.2 Wiegand Communication Parameter Configuration
4.7.2 Buzzer Control
Select Device Control in the main interface of the Demo->Device Configuration, and the dialog box will pop up. Select GPIO in the popup on the left. The Buzzer Control is on the lower left. Click Set to set the state of the buzzer as shown in Figure 4.8.2.

4.7.3 EAS Alarm

Figure 4.8.2 Buzzer Control

Select Device Control in the main interface of the Demo -> Device Configuration, and the dialog box will pop up. Select Custom-1 in the popup on the left as shown in Figure 4.8.3. This operation is used for configuration for matching alarm parameters. “matching succeeded operation” will be performed when the tags meet the matching condition is read. And “match failed operation” will be performed when the tags fail to meet the matching condition is read. The matching rules are as below:
The calculated result of the mask Bitwise AND and zone data to be matched in the tag is A. And the result of the mask Bitwise AND and zone data matched is B. If A is equal to B, then the matching is successfully, and then the EAS match-successfully operation shall be performed. Conversely, the EAS match- failed operation shall be performed.

4.8 Tools 4.8.1 Restart

Figure 4.8.3 EAS Alarm

Select Tools ->” “Restart as shown in Figure 4.9.1.1. Click the icon, and the Command Sent Successfully prompt will pop up as shown in Figure 4.9.1.2.
The reader will restart when it receives this message. And the restart is finished when the beep from the buzzer is heard.

Figure 4.9.1.1 Restart Figure 4.9.1.2 Command Sent Successfully

4.8.2 Restore Factory Setting
Select Tools in the main interface ->” “Factory Reset as shown in Figure 4.9.2.1. Click the icon, and the prompt “Factory Reset?” will pop up as shown in Figure 4.9.2.2. This operation will restore all parameters, including RFID configuration parameters, to factory setting except for system time and MAC address.
Figure 4.9.2.1 Factory Reset

4.8.3 Data Export

Figure 4.9.2.2 Prompt

Select Tools ->” ” export the text( or” “export the spreadsheet), and a dialog will pop up as shown in Figure 4.9.3. Then choose the path for the files to be saved.

Figure 4.9.3 Data Export
The tag data supports data export and the exporting format can be .csv and .xls(Excel datasheet).
4.8.4 Upgrade
It supports baseband software (underlying software) upgrading and application software (system application software) upgrading. Select Tools -> ” ” upgrade baseband (or ” ” upgrade application). And the dialog box will pop up as shown in Figure 4.9.4.

Figure 4.9.4.1 upgrade baseband

Figure 4.9.4.2 Select Upgrade Files
Find the path to the required. bin(.apk) upgrading file in the Upgrade File

list as shown in Figure 4.9.4.3, click

. The baseband is upgraded

when the upgrading progress bar shows 100%. And then the Upgraded Successfully prompt will pop up. Then click “OK” to restart as shown in Figure 4.9.4.4 .
Figure 4.9.4.3 Upgrading baseband

Figure 4.9.4.4 Restart Confirm
The upgrading process of baseband software is the same as the application software. And the detail operation is the same also.
4.8.5 Custom Command
Select Tools ->” ” Custom Command as shown in Figure 4.9.5.1. Click the icon, and a custom command sending popup will come out as shown in Figure 4.9.5.2.
Head: data frame header, defaulted to be 5A Command: can be written according to the communication protocol of the reader, or extract by double clicking lines of the log window (detailed in GPI Operation Configuration) CRC: check code(automatically generated by filling in command and head and clicking the CRC text box).
Figure 4.9.5.1 Custom Command

Figure 4.9.5.2 Custom Command Sending
Figure 4.9.5.3 Send Custom Command
4.8.6 Device Info
Select Tools ->” “Device Info as shown in Figure 4.9.6.1. Click the icon and a Device Info window will pop up as shown in Figure 4.9.6.2.

Figure 4.9.6.1 Device Info Figure 4.9.6.2 Device Info Popup

4.8.7 Devices Search
Select Device searching in the main interface of the Demo -> Device Search (as shown in Figure 4.9.7.1) and then a dialog box will pop up as shown in Figure 4.9.7.2. Open the popup, and the reader will start searching the devices with the same network segment as the computer. And the devices will be in the list as shown in Figure 4.9.7.3.
Notes: This function is also workable when the demo is not connected with any device.
Figure 4.9.7.1 Network Devices Searching

Figure 4.9.7.2 Searching Devices Figure 4.9.7.3 Searching Devices Successfully

FCC

WARNING FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
This device and its antenna(s) must not be co-located or operating in conjunction with any other antenna or transmitter.
15.105 Information to the user. (b) For a Class B digital device or peripheral, the instructions furnished the user shall include the following or similar statement, placed in a prominent location in the text of the manual:
Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and usedin
accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
–Reorient or relocate the receiving antenna. –Increase the separation between the equipment and receiver. –Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
–Consult the dealer or an experienced radio/TV technician for help. This equipment complies with FCC radiation exposure limits set forth for an uncon- trolled environment. This equipment should be installed and operated with minimum distance 20
cm between the radiator and your body. Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.

This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination.
The firmware setting is not accessible by the end user. The final end product must be labelled in a visible area with the following: “Contains Transmitter Module “FCC ID: 2AUF7RF-N6004”

Requirement per KDB996369 D03
2.2 List of applicable FCC rules
List the FCC rules that are applicable to the modular transmitter. These are the rules that specifically establish the bands of operation, the power, spurious emissions, and operating fundamental frequencies. DO NOT list compliance to unintentional-radiator rules (Part 15 Subpart B) since that is not a condition of a module grant that is extended to a host manufacturer. See alsoSection
2.10 below concerning the need to notify host manufacturers that further testing is required.3
Explanation: This module meets the requirements of FCC part 15C (15.247).it Specifically identified AC Power Line Conducted Emission, Radiated Spurious emissions, Band edge and RF Conducted Spurious Emissions, Conducted Peak Output Power, Bandwidth, Power Spectral Density, Antenna Requirement.
2.3 Summarize the specific operational use conditions
Describe use conditions that are applicable to the modular transmitter, including for example any limits on antennas, etc. For example, if point-to- point antennas are used that require reduction in power or compensation for cable loss, then this information must be in the instructions. If the use condition limitations extend to professional users, then instructions must state that this information also extends to the host manufacturer’s instruction manual. In addition, certain information may also be needed, such as peak gain per frequency band and minimum gain, specifically for master devices in 5 GHz DFS bands. Explanation: The product antenna uses an irreplaceable antenna with a gain of 6.29dBi
2.4 Single Modular If a modular transmitter is approved as a “Single Modular,” then the module manufacturer isresponsible for approving the host environment that the Single Modular is used with. The manufacturer of a Single Modular must describe, both in the filing and in the installation instructions, the alternative means that the Single Modular manufacturer uses to verify that the host meets the necessary requirements to satisfy the module limiting conditions.
A Single Modular manufacturer has the flexibility to define its alternative method to address the conditions that limit the initial approval, such as: shielding, minimum signaling amplitude, buffered modulation/data inputs, or power supply regulation. The alternative method could include that the limited

module manufacturer reviews detailed test data or host designs prior to giving the host manufacturer approval.
This Single Modular procedure is also applicable for RF exposure evaluation when it is necessary to demonstrate compliance in a specific host. The module manufacturer must state how control of the product into which the modular transmitter will be installed will be maintained such that full compliance of the product is always ensured. For additional hosts other than the specific host originally granted with a limited
module, a Class II permissive change is required on the module grant to register the additional host as a specific host also approved with the module. Explanation: The module is a single module.

Trace antenna designs

For a modular transmitter with trace antenna designs, see the guidance in Question 11 of KDB Publication 996369 D02 FAQ ­ Modules for Micro-Strip Antennas and traces. The integration information shall include for the TCB review the integration instructions for the following aspects: layout of trace design, parts list (BOM), antenna, connectors, and isolation requirements.
Information that includes permitted variances (e.g., trace boundary limits, thickness, length, width, shape(s), dielectric constant, and impedance as applicable for each type of antenna); b) Each design shall be considered a different type (e.g., antenna length in multiple(s) of frequency, the wavelength, and antenna shape (traces in phase) can affect antenna gain and must be considered); c) The parameters shall be provided in a manner permitting host manufacturers to design the printed circuit (PC) board layout; d) Appropriate parts by manufacturer and specifications; e) Test procedures for design verification; and f) Production test procedures for ensuring compliance
The module grantee shall provide a notice that any deviation(s) from the defined parameters of the antenna trace, as described by the instructions, require that the host product manufacturer must notify the module grantee that they wish to change the antenna trace design. In this case, a Class II permissive change application is required to be filed by the grantee, or the host manufacturer can take responsibility through the change in FCC ID (new application) procedure followed by a Class II permissive change application
2.6 RF exposure considerations
It is essential for module grantees to clearly and explicitly state the RF exposure conditions that permit a host product manufacturer to use the module. Two types of instructions are required for RF exposure information: (1) to the host product manufacturer, to define the applicationconditions
(mobile, portable ­ xx cm from a person’s body); and (2) additional text needed for the host product manufacturer to provide to end users in their end- product manuals. If RF exposure statements and use conditions are not provided, then the host product manufacturer is required to take responsibility of the module through a change in FCC ID (new application).

Explanation: The module complies with FCC radiofrequency radiation exposure limits for uncontrolled environments. The device is installed and operated with a distance of more than 20 cm between the radiator and your body.” This module follows FCC statement design, FCC ID: 2AUF7RF-N6004
2.7Antennas
A list of antennas included in the application for certification must be provided in the instructions. For modular transmitters approved as limited modules, all applicable professional installer instructions must be included as part of the information to the host product manufacturer. The antenna list shall also identify the antenna types (monopole, PIFA, dipole, etc. (note that for example an “omni-directional antenna” is not considered to be a specific “antenna type”).
For situations where the host product manufacturer is responsible for an external connector, for example with an RF pin and antenna trace design, the integration instructions shall inform the installer that unique antenna connector must be used on the Part 15 authorized transmitters used in the host product.

The module manufacturers shall provide a list of acceptable unique connectors.
Explanation: The product antenna uses an irreplaceable antenna with a gain of 6.29dBi
2.7 Label and compliance information Grantees are responsible for the continued compliance of their modules to the FCC rules. This
includes advising host product manufacturers that they need to provide a physical or e-label stating “Contains FCC ID” with their finished product. See Guidelines for Labeling and User Information for RF Devices ­ KDB Publication 784748.
Explanation: The host system using this module, should have label in a visible area indicated the following texts: “Contains FCC ID: 2AUF7RF-N6004
2.8 Information on test modes and additional testing requirements5 Additional guidance for testing host products is given in KDB Publication 996369 D04 Module Integration Guide. Test modes should take into consideration different operational conditions for a stand-alone modular transmitter in a host, as well as for multiple simultaneously transmitting modules or other transmitters in a host product. The grantee should provide information on how to configure test modes for host product evaluation for different operational conditions for a stand-alone modular transmitter in a host, versus with multiple, simultaneously transmitting modules or other transmitters in a host.
Grantees can increase the utility of their modular transmitters by providing special means, modes, or instructions that simulates or characterizes a connection by enabling a transmitter. This can greatly simplify a host manufacturer’s determination that a module as installed in a host complies with FCC requirements.
Explanation: Shenzhen Nation RFID Technology Co., Ltd. can increase the utility of our modular transmitters by providing instructions that simulates or characterizes a connection by enabling a transmitter.
2.9 Additional testing, Part 15 Subpart B disclaimer The grantee should include a statement that the modular transmitter is only FCC authorized for the specific rule parts (i.e., FCC transmitter rules) listed on the grant, and that the host product manufacturer is responsible for compliance to any other FCC rules that apply to the host not covered by the modular transmitter grant of certification. If the grantee markets their product

as being Part 15 Subpart B compliant (when it also contains unintentional- radiator digital circuity), then the grantee shall provide a notice stating that the final host product still requires Part 15 Subpart B compliance testing with the modular transmitter installed.
Explanation: The module without unintentional-radiator digital circuity, so the module does not require an evaluation by FCC Part 15 Subpart B. The host shoule be evaluated by the FCC Subpart B.

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

Related Manuals