line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package RFID::Alien::Reader::TCP; |
2
|
2
|
|
|
2
|
|
26995
|
use RFID::Alien::Reader; $VERSION=$RFID::Alien::Reader::VERSION; |
|
2
|
|
|
|
|
6
|
|
|
2
|
|
|
|
|
1309
|
|
3
|
|
|
|
|
|
|
@ISA = qw(RFID::Alien::Reader RFID::Reader::TCP); |
4
|
|
|
|
|
|
|
|
5
|
|
|
|
|
|
|
# Written by Scott Gifford |
6
|
|
|
|
|
|
|
# Copyright (C) 2004-2006 The Regents of the University of Michigan. |
7
|
|
|
|
|
|
|
# See the file LICENSE included with the distribution for license |
8
|
|
|
|
|
|
|
# information. |
9
|
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
=head1 NAME |
11
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
RFID::Alien::Reader::TCP - Implement L over a TCP connection |
13
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
=head1 SYNOPSIS |
15
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
This class takes a host and port to connect to, connects to it, and |
17
|
|
|
|
|
|
|
implements the Alien RFID protocol over that connection. It can use |
18
|
|
|
|
|
|
|
the reader's builting TCP service, or a serial-to-Ethernet adapter |
19
|
|
|
|
|
|
|
plugged into the serial port of the reader; I tested it with both. |
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
=cut |
22
|
|
|
|
|
|
|
|
23
|
2
|
|
|
2
|
|
12
|
use strict; |
|
2
|
|
|
|
|
2
|
|
|
2
|
|
|
|
|
61
|
|
24
|
2
|
|
|
2
|
|
10
|
use warnings; |
|
2
|
|
|
|
|
4
|
|
|
2
|
|
|
|
|
65
|
|
25
|
|
|
|
|
|
|
|
26
|
2
|
|
|
2
|
|
1688
|
use RFID::Reader::TCP; |
|
2
|
|
|
|
|
80400
|
|
|
2
|
|
|
|
|
99
|
|
27
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
=head1 DESCRIPTION |
29
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
This class is built on top of |
31
|
|
|
|
|
|
|
L and |
32
|
|
|
|
|
|
|
L. |
33
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
=cut |
35
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
=head2 Constructor |
37
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
=head3 new |
39
|
|
|
|
|
|
|
|
40
|
|
|
|
|
|
|
This constructor accepts all arguments to the constructors for |
41
|
|
|
|
|
|
|
L and |
42
|
|
|
|
|
|
|
L, and passes them along to both |
43
|
|
|
|
|
|
|
constructors. Any other settings are intrepeted as parameters to the |
44
|
|
|
|
|
|
|
L method. |
45
|
|
|
|
|
|
|
|
46
|
|
|
|
|
|
|
=cut |
47
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
=head1 SEE ALSO |
49
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
L, L, |
51
|
|
|
|
|
|
|
L, L. |
52
|
|
|
|
|
|
|
|
53
|
|
|
|
|
|
|
=head1 AUTHOR |
54
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
Scott Gifford Egifford@umich.eduE, Esgifford@suspectclass.comE |
56
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
Copyright (C) 2004-2006 The Regents of the University of Michigan. |
58
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
See the file LICENSE included with the distribution for license |
60
|
|
|
|
|
|
|
information. |
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
=cut |
63
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
1; |