没有合适的资源?快使用搜索试试~ 我知道了~
首页EPC Radio-Frequency Identity Protocols
EPC Radio-Frequency Identity Protocols
5星 · 超过95%的资源 需积分: 11 19 下载量 167 浏览量
更新于2023-03-16
评论 1
收藏 2.49MB PDF 举报
EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz – 960 MHz Version 1.2.0
资源详情
资源评论
资源推荐
Specification for RFID Air Interface
EPC™ Radio-Frequency Identity Protocols
Class-1 Generation-2 UHF RFID
Protocol for Communications at 860 MHz – 960 MHz
Version 1.2.0
Copyright notice
© 2004 – 2008 EPCglobal Inc.
All rights reserved. Unauthorized reproduction, modification, and/or use of this Document is not permitted. Requests for
permission to reproduce should be addressed to epcglobal@epcglobalinc.org.
EPCglobal Inc.
TM
is providing this document as a service to interested industries. This document was developed through a
consensus process of interested parties. Although efforts have been to assure that the document is correct, reliable, and
technically accurate, EPCglobal Inc. makes NO WARRANTY, EXPRESS OR IMPLIED, THAT THIS DOCUMENT IS
CORRECT, WILL NOT REQUIRE MODIFICATION AS EXPERIENCE AND TECHNOLOGICAL ADVANCES DICTATE, OR
WILL BE SUITABLE FOR ANY PURPOSE OR WORKABLE IN ANY APPLICATION, OR OTHERWISE. Use of this Docu-
ment is with the understanding that EPCglobal Inc. has no liability for any claim to the contrary, or for any damage or loss of
any kind or nature.
Disclaimer
Whilst every effort has been made to ensure that this document and the information contained herein are correct, EP-
Cglobal and any other party involved in the creation of the document hereby state that the document is provided on an “as
is” basis without warranty, either expressed or implied, including but not limited to any warranty that the use of the informa-
tion herein will not infringe any rights, of accuracy or fitness for purpose, and hereby disclaim any liability, direct or indirect,
for damages or loss relating to the use of the document.
© 2004 – 2008 EPCglobal Inc. Page 1 of 108 23 October 2008
Contents
INDEX OF FIGURES .................................................................................................................................................6
INDEX OF TABLES...................................................................................................................................................7
FOREWORD..............................................................................................................................................................9
INTRODUCTION......................................................................................................................................................10
1. SCOPE..............................................................................................................................................................11
2. CONFORMANCE .............................................................................................................................................11
2.1 CLAIMING CONFORMANCE .............................................................................................................................11
2.2 GENERAL CONFORMANCE REQUIREMENTS.....................................................................................................11
2.2.1 Interrogators .......................................................................................................................................11
2.2.2 Tags....................................................................................................................................................11
2.3 COMMAND STRUCTURE AND EXTENSIBILITY....................................................................................................12
2.3.1 Mandatory commands ........................................................................................................................12
2.3.2 Optional commands............................................................................................................................12
2.3.3 Proprietary commands .......................................................................................................................12
2.3.4 Custom commands.............................................................................................................................12
2.4 RESERVED FOR FUTURE USE (RFU).............................................................................................................12
3. NORMATIVE REFERENCES...........................................................................................................................13
4. TERMS AND DEFINITIONS.............................................................................................................................14
4.1 ADDITIONAL TERMS AND DEFINITIONS ............................................................................................................14
5. SYMBOLS, ABBREVIATED TERMS, AND NOTATION.................................................................................16
5.1 SYMBOLS.....................................................................................................................................................16
5.2 ABBREVIATED TERMS ...................................................................................................................................17
5.3 NOTATION....................................................................................................................................................18
6. PROTOCOL REQUIREMENTS........................................................................................................................19
6.1 PROTOCOL OVERVIEW ..................................................................................................................................19
6.1.1 Physical layer......................................................................................................................................19
6.1.2 Tag-identification layer .......................................................................................................................19
6.2 PROTOCOL PARAMETERS..............................................................................................................................19
6.2.1 Signaling – Physical and media access control (MAC) parameters...................................................19
6.2.2 Logical – Operating procedure parameters........................................................................................23
6.3 DESCRIPTION OF OPERATING PROCEDURE.....................................................................................................24
6.3.1 Signaling .............................................................................................................................................24
6.3.1.1 Operational frequencies ..............................................................................................................24
6.3.1.2 Interrogator-to-Tag (R=>T) communications...............................................................................24
6.3.1.2.1 Interrogator frequency accuracy...............................................................................................24
6.3.1.2.2 Modulation ................................................................................................................................24
6.3.1.2.3 Data encoding...........................................................................................................................24
6.3.1.2.4 Tari values ................................................................................................................................25
6.3.1.2.5 R=>T RF envelope....................................................................................................................25
6.3.1.2.6 Interrogator power-up waveform...............................................................................................25
6.3.1.2.7 Interrogator power-down waveform..........................................................................................26
6.3.1.2.8 R=>T preamble and frame-sync ...............................................................................................26
6.3.1.2.9 Frequency-hopping spread-spectrum waveform......................................................................27
6.3.1.2.10 Frequency-hopping spread-spectrum channelization...............................................................27
6.3.1.2.11 Transmit mask ..........................................................................................................................27
6.3.1.3 Tag-to-Interrogator (T=>R) communications...............................................................................29
6.3.1.3.1 Modulation ................................................................................................................................29
6.3.1.3.2 Data encoding...........................................................................................................................30
6.3.1.3.2.1 FM0 baseband....................................................................................................................30
6.3.1.3.2.2 FM0 preamble ....................................................................................................................30
6.3.1.3.2.3 Miller-modulated subcarrier................................................................................................31
© 2004 – 2008 EPCglobal Inc. Page 2 of 108 23 October 2008
6.3.1.3.2.4 Miller subcarrier preamble..................................................................................................32
6.3.1.3.3 Tag supported Tari values and backscatter link rates..............................................................34
6.3.1.3.4 Tag power-up timing .................................................................................................................34
6.3.1.3.5 Minimum operating field strength and backscatter strength.....................................................34
6.3.1.4 Transmission order......................................................................................................................35
6.3.1.5 Cyclic-redundancy check (CRC) .................................................................................................35
6.3.1.6 Link timing ...................................................................................................................................35
6.3.2 Tag selection, inventory, and access .................................................................................................37
6.3.2.1 Tag memory ................................................................................................................................37
6.3.2.1.1 Reserved Memory.....................................................................................................................38
6.3.2.1.1.1 Kill password ......................................................................................................................38
6.3.2.1.1.2 Access password................................................................................................................38
6.3.2.1.2 EPC Memory.............................................................................................................................38
6.3.2.1.2.1 CRC-16 (StoredCRC and PacketCRC)..............................................................................38
6.3.2.1.2.2 Protocol-control (PC) word (StoredPC and PacketPC)......................................................39
6.3.2.1.2.3 EPC for an EPCglobal™ Application..................................................................................41
6.3.2.1.2.4 EPC for a non-EPCglobal™ Application ............................................................................41
6.3.2.1.2.5 Extended Protocol Control (XPC) word or words (optional)...............................................41
6.3.2.1.3 TID Memory ..............................................................................................................................43
6.3.2.1.4 User Memory ............................................................................................................................43
6.3.2.1.4.1 User memory for an EPCglobal™ Application ...................................................................43
6.3.2.1.4.2 User memory for a non-EPCglobal™ Application ..............................................................43
6.3.2.2 Sessions and inventoried flags....................................................................................................43
6.3.2.3 Selected flag................................................................................................................................44
6.3.2.4 Tag states and slot counter.........................................................................................................45
6.3.2.4.1 Ready state...............................................................................................................................45
6.3.2.4.2 Arbitrate state............................................................................................................................45
6.3.2.4.3 Reply state ................................................................................................................................45
6.3.2.4.4 Acknowledged state..................................................................................................................45
6.3.2.4.5 Open state ................................................................................................................................46
6.3.2.4.6 Secured state............................................................................................................................46
6.3.2.4.7 Killed state ................................................................................................................................46
6.3.2.4.8 Slot counter...............................................................................................................................46
6.3.2.5 Tag random or pseudo-random number generator.....................................................................46
6.3.2.6 Managing Tag populations ..........................................................................................................48
6.3.2.7 Selecting Tag populations...........................................................................................................48
6.3.2.8 Inventorying Tag populations ......................................................................................................49
6.3.2.9 Accessing individual Tags...........................................................................................................51
6.3.2.10 Killing or recommissioning a Tag ................................................................................................52
6.3.2.11 Interrogator commands and Tag replies .....................................................................................53
6.3.2.11.1 Select commands .....................................................................................................................55
6.3.2.11.1.1 Select (mandatory) .............................................................................................................55
6.3.2.11.2 Inventory commands ................................................................................................................57
6.3.2.11.2.1 Query (mandatory) .............................................................................................................57
6.3.2.11.2.2 QueryAdjust (mandatory) ...................................................................................................58
6.3.2.11.2.3 QueryRep (mandatory).......................................................................................................59
6.3.2.11.2.4 ACK (mandatory)................................................................................................................60
6.3.2.11.2.5 NAK (mandatory)................................................................................................................61
6.3.2.11.3 Access commands....................................................................................................................62
6.3.2.11.3.1 Req_RN (mandatory) .........................................................................................................63
6.3.2.11.3.2 Read (mandatory)...............................................................................................................64
6.3.2.11.3.3 Write (mandatory)...............................................................................................................66
6.3.2.11.3.4 Kill (mandatory) ..................................................................................................................67
6.3.2.11.3.5 Lock (mandatory)................................................................................................................70
6.3.2.11.3.6 Access (optional) ................................................................................................................72
6.3.2.11.3.7 BlockWrite (optional) ..........................................................................................................74
6.3.2.11.3.8 BlockErase (optional) .........................................................................................................75
6.3.2.11.3.9 BlockPermalock (optional)..................................................................................................76
© 2004 – 2008 EPCglobal Inc. Page 3 of 108 23 October 2008
7. INTELLECTUAL PROPERTY RIGHTS INTRINSIC TO THIS SPECIFICATION............................................79
ANNEX A (NORMATIVE) EXTENSIBLE BIT VECTORS (EBV) ............................................................................80
ANNEX B (NORMATIVE) STATE-TRANSITION TABLES ....................................................................................81
B.1 PRESENT STATE: READY...............................................................................................................................81
B.2 PRESENT STATE: ARBITRATE ........................................................................................................................82
B.3 PRESENT STATE: REPLY ...............................................................................................................................83
B.4 PRESENT STATE: ACKNOWLEDGED................................................................................................................84
B.5 PRESENT STATE: OPEN ................................................................................................................................85
B.6 PRESENT STATE: SECURED ..........................................................................................................................86
B.7 PRESENT STATE: KILLED...............................................................................................................................87
ANNEX C (NORMATIVE) COMMAND-RESPONSE TABLES...............................................................................88
C.1 COMMAND RESPONSE: POWER-UP ................................................................................................................88
C.2 COMMAND RESPONSE: QUERY......................................................................................................................88
C.3 COMMAND RESPONSE: QUERYREP ...............................................................................................................89
C.4 COMMAND RESPONSE: QUERYADJUST ..........................................................................................................89
C.5 COMMAND RESPONSE: ACK .........................................................................................................................90
C.6 COMMAND RESPONSE: NAK .........................................................................................................................90
C.7 COMMAND RESPONSE: REQ_RN...................................................................................................................90
C.8 COMMAND RESPONSE: SELECT.....................................................................................................................91
C.9 COMMAND RESPONSE: READ ........................................................................................................................91
C.10 COMMAND RESPONSE: WRITE ...................................................................................................................91
C.11 COMMAND RESPONSE: KILL.......................................................................................................................92
C.12 COMMAND RESPONSE: LOCK.....................................................................................................................92
C.13 COMMAND RESPONSE: ACCESS.................................................................................................................93
C.14 COMMAND RESPONSE: BLOCKWRITE.........................................................................................................93
C.15 COMMAND RESPONSE: BLOCKERASE ........................................................................................................94
C.16 COMMAND RESPONSE: BLOCKPERMALOCK................................................................................................94
C.17 COMMAND RESPONSE: T
2
TIMEOUT............................................................................................................94
C.18 COMMAND RESPONSE: INVALID COMMAND .................................................................................................95
ANNEX D (INFORMATIVE) EXAMPLE SLOT-COUNT (
Q
) SELECTION ALGORITHM.......................................96
D.1 EXAMPLE ALGORITHM AN INTERROGATOR MIGHT USE TO CHOOSE Q...............................................................96
ANNEX E (INFORMATIVE) EXAMPLE OF TAG INVENTORY AND ACCESS.....................................................97
E.1 EXAMPLE INVENTORY AND ACCESS OF A SINGLE TAG .....................................................................................97
ANNEX F (INFORMATIVE) CALCULATION OF 5-BIT AND 16-BIT CYCLIC REDUNDANCY CHECKS............98
F.1 EXAMPLE CRC-5 ENCODER/DECODER ..........................................................................................................98
F.2 EXAMPLE CRC-16 ENCODER/DECODER ........................................................................................................98
F.3 EXAMPLE CRC-16 CALCULATIONS ................................................................................................................99
ANNEX G (NORMATIVE) MULTIPLE- AND DENSE-INTERROGATOR CHANNELIZED SIGNALING.............100
G.1 OVERVIEW OF DENSE-INTERROGATOR CHANNELIZED SIGNALING (INFORMATIVE)............................................100
ANNEX H (INFORMATIVE) INTERROGATOR-TO-TAG LINK MODULATION ..................................................102
H.1 BASEBAND WAVEFORMS, MODULATED RF, AND DETECTED WAVEFORMS .......................................................102
ANNEX I (NORMATIVE) ERROR CODES............................................................................................................103
I.1 TAG ERROR CODES AND THEIR USAGE .........................................................................................................103
ANNEX J (NORMATIVE) SLOT COUNTER .........................................................................................................104
J.1 SLOT-COUNTER OPERATION........................................................................................................................104
ANNEX K (INFORMATIVE) EXAMPLE DATA-FLOW EXCHANGE....................................................................105
K.1 OVERVIEW OF THE DATA-FLOW EXCHANGE ..................................................................................................105
K.2 TAG MEMORY CONTENTS AND LOCK-FIELD VALUES .......................................................................................105
K.3 DATA-FLOW EXCHANGE AND COMMAND SEQUENCE ......................................................................................106
ANNEX L (INFORMATIVE) OPTIONAL TAG FEATURES ..................................................................................107
L.1 OPTIONAL TAG PASSWORDS .......................................................................................................................107
L.2 OPTIONAL TAG MEMORY BANKS AND MEMORY-BANK SIZES ...........................................................................107
© 2004 – 2008 EPCglobal Inc. Page 4 of 108 23 October 2008
© 2004 – 2008 EPCglobal Inc. Page 5 of 108 23 October 2008
L.3
OPTIONAL TAG COMMANDS.........................................................................................................................107
L.4 OPTIONAL TAG ERROR-CODE REPORTING FORMAT.......................................................................................107
L.5 OPTIONAL TAG BACKSCATTER MODULATION FORMAT ...................................................................................107
L.6 OPTIONAL TAG FUNCTIONALITY ...................................................................................................................107
ANNEX M (INFORMATIVE) REVISION HISTORY...............................................................................................108
剩余107页未读,继续阅读
horacedu
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- 27页智慧街道信息化建设综合解决方案.pptx
- 计算机二级Ms-Office选择题汇总.doc
- 单链表的插入和删除实验报告 (2).docx
- 单链表的插入和删除实验报告.pdf
- 物联网智能终端项目设备管理方案.pdf
- 如何打造品牌的模式.doc
- 样式控制与页面布局.pdf
- 武汉理工Java实验报告(二).docx
- 2021线上新品消费趋势报告.pdf
- 第3章 Matlab中的矩阵及其运算.docx
- 基于Web的人力资源管理系统的必要性和可行性.doc
- 基于一阶倒立摆的matlab仿真实验.doc
- 速运公司物流管理模式研究教材
- 大数据与管理.pptx
- 单片机课程设计之步进电机.doc
- 大数据与数据挖掘.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论4