| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
package RFID::Alien::Reader::TCP; |
|
2
|
2
|
|
|
2
|
|
26995
|
use RFID::Alien::Reader; $VERSION=$RFID::Alien::Reader::VERSION; |
|
|
2
|
|
|
|
|
6
|
|
|
|
2
|
|
|
|
|
1309
|
|
|
3
|
|
|
|
|
|
|
@ISA = qw(RFID::Alien::Reader RFID::Reader::TCP); |
|
4
|
|
|
|
|
|
|
|
|
5
|
|
|
|
|
|
|
# Written by Scott Gifford |
|
6
|
|
|
|
|
|
|
# Copyright (C) 2004-2006 The Regents of the University of Michigan. |
|
7
|
|
|
|
|
|
|
# See the file LICENSE included with the distribution for license |
|
8
|
|
|
|
|
|
|
# information. |
|
9
|
|
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
=head1 NAME |
|
11
|
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
RFID::Alien::Reader::TCP - Implement L over a TCP connection |
|
13
|
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
15
|
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
This class takes a host and port to connect to, connects to it, and |
|
17
|
|
|
|
|
|
|
implements the Alien RFID protocol over that connection. It can use |
|
18
|
|
|
|
|
|
|
the reader's builting TCP service, or a serial-to-Ethernet adapter |
|
19
|
|
|
|
|
|
|
plugged into the serial port of the reader; I tested it with both. |
|
20
|
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
=cut |
|
22
|
|
|
|
|
|
|
|
|
23
|
2
|
|
|
2
|
|
12
|
use strict; |
|
|
2
|
|
|
|
|
2
|
|
|
|
2
|
|
|
|
|
61
|
|
|
24
|
2
|
|
|
2
|
|
10
|
use warnings; |
|
|
2
|
|
|
|
|
4
|
|
|
|
2
|
|
|
|
|
65
|
|
|
25
|
|
|
|
|
|
|
|
|
26
|
2
|
|
|
2
|
|
1688
|
use RFID::Reader::TCP; |
|
|
2
|
|
|
|
|
80400
|
|
|
|
2
|
|
|
|
|
99
|
|
|
27
|
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
29
|
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
This class is built on top of |
|
31
|
|
|
|
|
|
|
L and |
|
32
|
|
|
|
|
|
|
L. |
|
33
|
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
=cut |
|
35
|
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
=head2 Constructor |
|
37
|
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
=head3 new |
|
39
|
|
|
|
|
|
|
|
|
40
|
|
|
|
|
|
|
This constructor accepts all arguments to the constructors for |
|
41
|
|
|
|
|
|
|
L and |
|
42
|
|
|
|
|
|
|
L, and passes them along to both |
|
43
|
|
|
|
|
|
|
constructors. Any other settings are intrepeted as parameters to the |
|
44
|
|
|
|
|
|
|
L method. |
|
45
|
|
|
|
|
|
|
|
|
46
|
|
|
|
|
|
|
=cut |
|
47
|
|
|
|
|
|
|
|
|
48
|
|
|
|
|
|
|
=head1 SEE ALSO |
|
49
|
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
L, L, |
|
51
|
|
|
|
|
|
|
L, L. |
|
52
|
|
|
|
|
|
|
|
|
53
|
|
|
|
|
|
|
=head1 AUTHOR |
|
54
|
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
Scott Gifford Egifford@umich.eduE, Esgifford@suspectclass.comE |
|
56
|
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
Copyright (C) 2004-2006 The Regents of the University of Michigan. |
|
58
|
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
See the file LICENSE included with the distribution for license |
|
60
|
|
|
|
|
|
|
information. |
|
61
|
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
=cut |
|
63
|
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
1; |