LG710 is a rugged gun-type linear imager bar code scanner which is designed especially for retail, logistic and warehousing management market. We include friendly functions with replaceable multiple interface cable options that makes it more easily to be operated by the customers to accommodate itself to user environment. LG710 has most modern design with rugged casing and supports IP54 sealing protection, supports reading range up to 300 mm for the majority of 1D bar codes and GS1 DataBar™ codes. With its built-in automatic sense and switch on reading can extend its lifespan. A stand option can be ordered to facilitate hand-free reading options. In short, LG710 is a high performance rugged scanner, which provides the customer with the most cost-effective solution in the market. It is perfectly suitable and definitely the best choice for any retail and logistic environment.
|Up to 5,000 Lux|
|Dimension(WxDxH)||Light Source||Filed of View||Depth of Field||Resolution||Scan Rate||Indicators||Drop Resistance||Print Contrast Ratio||Sealing|
|177.9 x 75 x 71.3mm||650±10nm VLD||￼Horizontal: 45°||Up to 300mm@20mil/0.5mm, PCS90%, Code 39||5mil/0.127mm||50 scans ±5%||Beeper and LED||1.5m (wired model) ;1.2m (wireless model)||30%||IP54 (wired model), IP42 (wireless model)|
|Wireless Standard||Battery||Recharge Time||Scan Per Charge||Radio Transmission Range|
|Bluetooth V2.1, HID and SPP profile supported||Lithium-ion Battery (3.7V, 2600mAh)||Approx. 5 hours||50,000 times (continuous read)||Class 1, up to 100m (in open space)|
|RS232, USB (HID, Virtual COM), KBW||DC 5V|
When the scanner is the master device and cradle is the salve, while scanner goes to sleep mode, the cradle is always on for waiting the master device, to re-establish the connection is controlled by the master, hence press a trigger of the scanner will re-establish the connection
When you connect the scanner with PC, the scanner is set to Slave mode and the PC is the master, when BT disconnect you have to establish the connection from PC, since PC is the master device, it will search the slave device, and the slave device is listening.