没有合适的资源?快使用搜索试试~ 我知道了~
首页EPC Global C1G2 Protocol
EPC Global C1G2 Protocol
需积分: 35 10 下载量 164 浏览量
更新于2023-03-16
评论
收藏 3.92MB PDF 举报
EPC Global Class 1 Generation UHF RFID Protocol V109
资源详情
资源评论
资源推荐
Specification for RFID Air Interface
EPC™ Radio-Frequency Identity Protocols
Class-1 Generation-2 UHF RFID
Protocol for Communications at 860 MHz – 960 MHz
Version 1.0.9
Copyright notice
© 2004, EPCglobal Inc.
Unauthorized reproduction, modification and/or use of this Specification is prohibited. Any reproduction, modifi-
cation and/or use of this Specification is subject to the licensing obligations of the EPCglobal Intellectual Prop-
erty Policy and enforcement of the terms thereof.
Requests for permission to reproduce should be addressed to epcglobal@epcglobalinc.org.
Violators may be prosecuted.
© 2004, EPCglobal Inc. Page 1 of 94 31 January 2005
Contents
INDEX OF FIGURES .................................................................................................................................................5
INDEX OF TABLES ...................................................................................................................................................6
FOREWORD ..............................................................................................................................................................8
INTRODUCTION........................................................................................................................................................9
1. SCOPE..............................................................................................................................................................10
2. CONFORMANCE .............................................................................................................................................10
2.1 CLAIMING CONFORMANCE .............................................................................................................................10
2.2 GENERAL CONFORMANCE REQUIREMENTS.....................................................................................................10
2.2.1 Interrogators .......................................................................................................................................10
2.2.2 Tags....................................................................................................................................................10
2.3 COMMAND STRUCTURE AND EXTENSIBILITY....................................................................................................11
2.3.1 Mandatory commands ........................................................................................................................11
2.3.2 Optional commands............................................................................................................................11
2.3.3 Proprietary commands .......................................................................................................................11
2.3.4 Custom commands.............................................................................................................................11
3. NORMATIVE REFERENCES...........................................................................................................................11
4. TERMS AND DEFINITIONS.............................................................................................................................13
4.1 ADDITIONAL TERMS AND DEFINITIONS ............................................................................................................13
5. SYMBOLS, ABBREVIATED TERMS, AND NOTATION.................................................................................15
5.1 SYMBOLS.....................................................................................................................................................15
5.2 ABBREVIATED TERMS ...................................................................................................................................15
5.3 NOTATION....................................................................................................................................................16
6. PROTOCOL REQUIREMENTS........................................................................................................................17
6.1 PROTOCOL OVERVIEW ..................................................................................................................................17
6.1.1 Physical layer......................................................................................................................................17
6.1.2 Tag-identification layer .......................................................................................................................17
6.2 PROTOCOL PARAMETERS..............................................................................................................................17
6.2.1 Signaling – Physical and media access control (MAC) parameters...................................................17
6.2.2 Logical – Operating procedure parameters........................................................................................21
6.3 DESCRIPTION OF OPERATING PROCEDURE.....................................................................................................22
6.3.1 Signaling .............................................................................................................................................22
6.3.1.1 Operational frequencies ..............................................................................................................22
6.3.1.2 Interrogator-to-Tag (R=>T) communications...............................................................................22
6.3.1.2.1 Interrogator frequency accuracy...............................................................................................22
6.3.1.2.2 Modulation ................................................................................................................................22
6.3.1.2.3 Data encoding...........................................................................................................................22
6.3.1.2.4 Data rates .................................................................................................................................23
6.3.1.2.5 R=>T RF envelope....................................................................................................................23
6.3.1.2.6 Interrogator power-up waveform...............................................................................................24
6.3.1.2.7 Interrogator power-down waveform..........................................................................................24
6.3.1.2.8 R=>T preamble and frame-sync ...............................................................................................24
6.3.1.2.9 Frequency-hopping spread-spectrum waveform......................................................................25
6.3.1.2.10 Frequency-hopping spread-spectrum channelization...............................................................25
6.3.1.2.11 Transmit mask ..........................................................................................................................26
6.3.1.3 Tag-to-Interrogator (T=>R) communications...............................................................................28
6.3.1.3.1 Modulation ................................................................................................................................28
6.3.1.3.2 Data encoding...........................................................................................................................28
6.3.1.3.2.1 FM0 baseband....................................................................................................................28
6.3.1.3.2.2 FM0 preamble ....................................................................................................................29
6.3.1.3.2.3 Miller-modulated subcarrier................................................................................................29
6.3.1.3.2.4 Miller subcarrier preamble..................................................................................................31
6.3.1.3.3 Data rates .................................................................................................................................32
6.3.1.3.4 Tag power-up timing .................................................................................................................33
© 2004, EPCglobal Inc. Page 2 of 94 31 January 2005
6.3.1.3.5 Minimum operating field strength and backscatter strength.....................................................33
6.3.1.4 Transmission order......................................................................................................................33
6.3.1.5 Link timing ...................................................................................................................................33
6.3.2 Tag selection, inventory, and access .................................................................................................35
6.3.2.1 Tag memory ................................................................................................................................35
6.3.2.1.1 Kill password.............................................................................................................................36
6.3.2.1.2 Access password......................................................................................................................36
6.3.2.1.3 CRC-16 .....................................................................................................................................36
6.3.2.1.4 Protocol-control (PC) bits..........................................................................................................37
6.3.2.1.5 EPC...........................................................................................................................................37
6.3.2.2 Sessions and inventoried flags....................................................................................................37
6.3.2.3 Selected flag................................................................................................................................38
6.3.2.4 Tag states and slot counter.........................................................................................................39
6.3.2.4.1 Ready state...............................................................................................................................39
6.3.2.4.2 Arbitrate state............................................................................................................................39
6.3.2.4.3 Reply state ................................................................................................................................39
6.3.2.4.4 Acknowledged state..................................................................................................................39
6.3.2.4.5 Open state ................................................................................................................................40
6.3.2.4.6 Secured state............................................................................................................................40
6.3.2.4.7 Killed state ................................................................................................................................40
6.3.2.4.8 Slot counter...............................................................................................................................40
6.3.2.5 Tag random or pseudo-random number generator.....................................................................40
6.3.2.6 Managing Tag populations ..........................................................................................................42
6.3.2.7 Selecting Tag populations...........................................................................................................42
6.3.2.8 Inventorying Tag populations ......................................................................................................42
6.3.2.9 Accessing individual Tags...........................................................................................................44
6.3.2.10 Interrogator commands and Tag replies .....................................................................................45
6.3.2.10.1 Select commands .....................................................................................................................47
6.3.2.10.1.1 Select (mandatory) .............................................................................................................47
6.3.2.10.2 Inventory commands ................................................................................................................49
6.3.2.10.2.1 Query (mandatory) .............................................................................................................49
6.3.2.10.2.2 QueryAdjust (mandatory) ...................................................................................................50
6.3.2.10.2.3 QueryRep (mandatory).......................................................................................................51
6.3.2.10.2.4 ACK (mandatory)................................................................................................................52
6.3.2.10.2.5 NAK (mandatory)................................................................................................................53
6.3.2.10.3 Access commands....................................................................................................................54
6.3.2.10.3.1 Req_RN (mandatory) .........................................................................................................55
6.3.2.10.3.2 Read (mandatory)...............................................................................................................56
6.3.2.10.3.3 Write (mandatory)...............................................................................................................57
6.3.2.10.3.4 Kill (mandatory) ..................................................................................................................58
6.3.2.10.3.5 Lock (mandatory)................................................................................................................61
6.3.2.10.3.6 Access (optional) ................................................................................................................63
6.3.2.10.3.7 BlockWrite (optional) ..........................................................................................................65
6.3.2.10.3.8 BlockErase (optional) .........................................................................................................66
7. INTELLECTUAL PROPERTY RIGHTS INTRINSIC TO THIS SPECIFICATION ............................................67
ANNEX A (NORMATIVE) EXTENSIBLE BIT VECTORS (EBV) ............................................................................68
ANNEX B (NORMATIVE) STATE-TRANSITION TABLES ....................................................................................69
B.1 PRESENT STATE: READY ..............................................................................................................................69
B.2 PRESENT STATE: ARBITRATE ........................................................................................................................70
B.3 PRESENT STATE: REPLY...............................................................................................................................71
B.4 PRESENT STATE: ACKNOWLEDGED ...............................................................................................................72
B.5 PRESENT STATE: OPEN ................................................................................................................................73
B.6 PRESENT STATE: SECURED ..........................................................................................................................74
B.7 PRESENT STATE: KILLED ..............................................................................................................................75
ANNEX C (NORMATIVE) COMMAND-RESPONSE TABLES ...............................................................................76
C.1 COMMAND RESPONSE: POWER-UP................................................................................................................76
C.2 COMMAND RESPONSE: QUERY......................................................................................................................76
C.3 COMMAND RESPONSE: QUERYREP ...............................................................................................................77
© 2004, EPCglobal Inc. Page 3 of 94 31 January 2005
C.4 COMMAND RESPONSE: QUERYADJUST ..........................................................................................................77
C.5 COMMAND RESPONSE: ACK .........................................................................................................................77
C.6 COMMAND RESPONSE: NAK .........................................................................................................................78
C.7 COMMAND RESPONSE: REQ_RN ..................................................................................................................78
C.8 COMMAND RESPONSE: SELECT.....................................................................................................................78
C.9 COMMAND RESPONSE: READ ........................................................................................................................79
C.10 COMMAND RESPONSE: WRITE...................................................................................................................79
C.11 COMMAND RESPONSE: KILL ......................................................................................................................80
C.12 COMMAND RESPONSE: LOCK ....................................................................................................................80
C.13 COMMAND RESPONSE: ACCESS ................................................................................................................81
C.14 COMMAND RESPONSE: BLOCKWRITE ........................................................................................................81
C.15 COMMAND RESPONSE: BLOCKERASE ........................................................................................................82
C.16 COMMAND RESPONSE: T
2
TIMEOUT ...........................................................................................................82
C.17 COMMAND RESPONSE: INVALID COMMAND .................................................................................................83
ANNEX D (INFORMATIVE) EXAMPLE SLOT-COUNT (
Q
) SELECTION ALGORITHM.......................................84
D.1 EXAMPLE ALGORITHM AN INTERROGATOR MIGHT USE TO CHOOSE Q ...............................................................84
ANNEX E (INFORMATIVE) EXAMPLE OF TAG INVENTORY AND ACCESS.....................................................85
E.1 EXAMPLE INVENTORY AND ACCESS OF A SINGLE TAG .....................................................................................85
ANNEX F (INFORMATIVE) CALCULATION OF 5-BIT AND 16-BIT CYCLIC REDUNDANCY CHECKS............86
F.1 EXAMPLE CRC-5 ENCODER/DECODER ..........................................................................................................86
F.2 EXAMPLE CRC-16 ENCODER/DECODER ........................................................................................................86
ANNEX G (NORMATIVE) DENSE-INTERROGATOR CHANNELIZED SIGNALING............................................87
G.1 INTERROGATOR AND TAG SIGNALING IN DENSE-INTERROGATOR ENVIRONMENTS .............................................87
ANNEX H (INFORMATIVE) INTERROGATOR-TO-TAG LINK MODULATION ....................................................89
H.1 BASEBAND WAVEFORMS, MODULATED RF, AND DETECTED WAVEFORMS .........................................................89
ANNEX I (NORMATIVE) ERROR CODES..............................................................................................................90
I.1 TAG ERROR CODES AND THEIR USAGE ...........................................................................................................90
ANNEX J (NORMATIVE) SLOT COUNTER ...........................................................................................................91
J.1 SLOT-COUNTER OPERATION..........................................................................................................................91
ANNEX K (INFORMATIVE) EXAMPLE DATA-FLOW EXCHANGE......................................................................92
K.1 OVERVIEW OF THE DATA-FLOW EXCHANGE ....................................................................................................92
K.2 TAG MEMORY CONTENTS AND LOCK-FIELD VALUES.........................................................................................92
K.3 DATA-FLOW EXCHANGE AND COMMAND SEQUENCE ........................................................................................93
ANNEX L (INFORMATIVE) REVISION HISTORY..................................................................................................94
© 2004, EPCglobal Inc. Page 4 of 94 31 January 2005
Index of Figures
FIGURE 6.1 – PIE SYMBOLS........................................................................................................................................22
FIGURE 6.2 – INTERROGATOR-TO-TAG RF ENVELOPE..................................................................................................23
FIGURE 6.3 – INTERROGATOR POWER-UP AND POWER-DOWN RF ENVELOPE ................................................................24
FIGURE 6.4 – R=>T PREAMBLE AND FRAME-SYNC .......................................................................................................25
FIGURE 6.5 – FHSS INTERROGATOR RF ENVELOPE ....................................................................................................26
FIGURE 6.6 – TRANSMIT MASK FOR MULTIPLE-INTERROGATOR ENVIRONMENTS .............................................................27
FIGURE 6.7 – TRANSMIT MASK FOR DENSE-INTERROGATOR ENVIRONMENTS .................................................................27
FIGURE 6.8 – FM0 BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM .......................................................................28
FIGURE 6.9 – FM0 SYMBOLS AND SEQUENCES ............................................................................................................28
FIGURE 6.10 – TERMINATING FM0 TRANSMISSIONS .....................................................................................................29
FIGURE 6.11 – FM0 T=>R PREAMBLE ........................................................................................................................29
FIGURE 6.12 – MILLER BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM..................................................................30
FIGURE 6.13 – SUBCARRIER SEQUENCES ....................................................................................................................30
FIGURE 6.14 – TERMINATING SUBCARRIER TRANSMISSIONS .........................................................................................31
FIGURE 6.15 – SUBCARRIER T=>R PREAMBLE ............................................................................................................31
FIGURE 6.16 – LINK TIMING.........................................................................................................................................34
FIGURE 6.17 – LOGICAL MEMORY MAP ........................................................................................................................35
FIGURE 6.18 – SESSION DIAGRAM...............................................................................................................................38
FIGURE 6.19 – TAG STATE DIAGRAM ...........................................................................................................................41
FIGURE 6.20 – INTERROGATOR/TAG OPERATIONS AND TAG STATE ...............................................................................42
FIGURE 6.21 – ONE TAG REPLY ..................................................................................................................................44
FIGURE 6.22 – SUCCESSFUL WRITE SEQUENCE ..........................................................................................................57
FIGURE 6.23 – KILL PROCEDURE.................................................................................................................................60
FIGURE 6.24 – LOCK PAYLOAD AND USAGE..................................................................................................................62
FIGURE 6.25 – ACCESS PROCEDURE...........................................................................................................................64
FIGURE D.1 – EXAMPLE ALGORITHM FOR CHOOSING THE SLOT-COUNT PARAMETER Q ...................................................84
FIGURE E.1 – EXAMPLE OF TAG INVENTORY AND ACCESS ............................................................................................85
FIGURE F.1 – EXAMPLE CRC-5 CIRCUIT .....................................................................................................................86
FIGURE F.2 – EXAMPLE CRC-16 CIRCUIT ...................................................................................................................86
FIGURE G.1 – MULTI-CHANNEL CEPT ENVIRONMENT ..................................................................................................87
FIGURE G.2 – SUBCARRIER SPECTRAL ALLOCATION FOR CEPT AND FCC ENVIRONMENTS............................................88
FIGURE H.1 – INTERROGATOR-TO-TAG MODULATION ...................................................................................................89
FIGURE J.1 – SLOT-COUNTER STATE DIAGRAM.............................................................................................................91
© 2004, EPCglobal Inc. Page 5 of 94 31 January 2005
剩余93页未读,继续阅读
小猪Lylon
- 粉丝: 0
- 资源: 4
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- RTL8188FU-Linux-v5.7.4.2-36687.20200602.tar(20765).gz
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
- SPC统计方法基础知识.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0