logo资料库

EPC Class-1 Generation-2 UHF RFID Protocol v1.2.0.pdf

第1页 / 共108页
第2页 / 共108页
第3页 / 共108页
第4页 / 共108页
第5页 / 共108页
第6页 / 共108页
第7页 / 共108页
第8页 / 共108页
资料共108页,剩余部分请下载后查看
Index of Figures
Index of Tables
Foreword
Introduction
1. Scope
2. Conformance
2.1 Claiming conformance
2.2 General conformance requirements
2.2.1 Interrogators
2.2.2 Tags
2.3 Command structure and extensibility
2.3.1 Mandatory commands
2.3.2 Optional commands
2.3.3 Proprietary commands
2.3.4 Custom commands
2.4 Reserved for Future Use (RFU)
3. Normative references
4. Terms and definitions
4.1 Additional terms and definitions
5. Symbols, abbreviated terms, and notation
5.1 Symbols
5.2 Abbreviated terms
5.3 Notation
6. Protocol requirements
6.1 Protocol overview
6.1.1 Physical layer
6.1.2 Tag-identification layer
6.2 Protocol parameters
6.2.1 Signaling – Physical and media access control (MAC) parameters
6.2.2 Logical – Operating procedure parameters
6.3 Description of operating procedure
6.3.1 Signaling
6.3.1.1 Operational frequencies
6.3.1.2 Interrogator-to-Tag (R=>T) communications
6.3.1.2.1 Interrogator frequency accuracy
6.3.1.2.2 Modulation
6.3.1.2.3 Data encoding
6.3.1.2.4 Tari values
6.3.1.2.5 R=>T RF envelope
6.3.1.2.6 Interrogator power-up waveform
6.3.1.2.7 Interrogator power-down waveform
6.3.1.2.8 R=>T preamble and frame-sync
6.3.1.2.9 Frequency-hopping spread-spectrum waveform
6.3.1.2.10 Frequency-hopping spread-spectrum channelization
6.3.1.2.11 Transmit mask
6.3.1.3 Tag-to-Interrogator (T=>R) communications
6.3.1.3.1 Modulation
6.3.1.3.2 Data encoding
6.3.1.3.2.1 FM0 baseband
6.3.1.3.2.2 FM0 preamble
6.3.1.3.2.3 Miller-modulated subcarrier
6.3.1.3.2.4 Miller subcarrier preamble
6.3.1.3.3 Tag supported Tari values and backscatter link rates
6.3.1.3.4 Tag power-up timing
6.3.1.3.5 Minimum operating field strength and backscatter strength
6.3.1.4 Transmission order
6.3.1.5 Cyclic-redundancy check (CRC)
6.3.1.6 Link timing
6.3.2 Tag selection, inventory, and access
6.3.2.1 Tag memory
6.3.2.1.1 Reserved Memory
6.3.2.1.1.1 Kill password
6.3.2.1.1.2 Access password
6.3.2.1.2 EPC Memory
6.3.2.1.2.1 CRC-16 (StoredCRC and PacketCRC)
6.3.2.1.2.2 Protocol-control (PC) word (StoredPC and PacketPC)
6.3.2.1.2.3 EPC for an EPCglobal™ Application
6.3.2.1.2.4 EPC for a non-EPCglobal™ Application
6.3.2.1.2.5 Extended Protocol Control (XPC) word or words (optional)
6.3.2.1.3 TID Memory
6.3.2.1.4 User Memory
6.3.2.1.4.1 User memory for an EPCglobal™ Application
6.3.2.1.4.2 User memory for a non-EPCglobal™ Application
6.3.2.2 Sessions and inventoried flags
6.3.2.3 Selected flag
6.3.2.4 Tag states and slot counter
6.3.2.4.1 Ready state
6.3.2.4.2 Arbitrate state
6.3.2.4.3 Reply state
6.3.2.4.4 Acknowledged state
6.3.2.4.5 Open state
6.3.2.4.6 Secured state
6.3.2.4.7 Killed state
6.3.2.4.8 Slot counter
6.3.2.5 Tag random or pseudo-random number generator
6.3.2.6 Managing Tag populations
6.3.2.7 Selecting Tag populations
6.3.2.8 Inventorying Tag populations
6.3.2.9 Accessing individual Tags
6.3.2.10 Killing or recommissioning a Tag
6.3.2.11 Interrogator commands and Tag replies
6.3.2.11.1 Select commands
6.3.2.11.1.1 Select (mandatory)
6.3.2.11.2 Inventory commands
6.3.2.11.2.1 Query (mandatory)
6.3.2.11.2.2 QueryAdjust (mandatory)
6.3.2.11.2.3 QueryRep (mandatory)
6.3.2.11.2.4 ACK (mandatory)
6.3.2.11.2.5 NAK (mandatory)
6.3.2.11.3 Access commands
6.3.2.11.3.1 Req_RN (mandatory)
6.3.2.11.3.2 Read (mandatory)
6.3.2.11.3.3 Write (mandatory)
6.3.2.11.3.4 Kill (mandatory)
6.3.2.11.3.5 Lock (mandatory)
6.3.2.11.3.6 Access (optional)
6.3.2.11.3.7 BlockWrite (optional)
6.3.2.11.3.8 BlockErase (optional)
6.3.2.11.3.9 BlockPermalock (optional)
7. Intellectual property rights intrinsic to this specification
Annex A(normative)Extensible bit vectors (EBV)
Annex B(normative)State-transition tables
B.1 Present state: Ready
B.2 Present state: Arbitrate
B.3 Present state: Reply
B.4 Present state: Acknowledged
B.5 Present state: Open
B.6 Present state: Secured
B.7 Present state: Killed
Annex C(normative)Command-Response Tables
C.1 Command response: Power-up
C.2 Command response: Query
C.3 Command response: QueryRep
C.4 Command response: QueryAdjust
C.5 Command response: ACK
C.6 Command response: NAK
C.7 Command response: Req_RN
C.8 Command response: Select
C.9 Command response: Read
C.10 Command response: Write
C.11 Command response: Kill
C.12 Command response: Lock
C.13 Command response: Access
C.14 Command response: BlockWrite
C.15 Command response: BlockErase
C.16 Command response: BlockPermalock
C.17 Command response: T2 timeout
C.18 Command response: Invalid command
Annex D(informative)Example slot-count (Q) selection algorithm
D.1 Example algorithm an Interrogator might use to choose Q
Annex E(informative)Example of Tag inventory and access
E.1 Example inventory and access of a single Tag
Annex F(informative)Calculation of 5-bit and 16-bit cyclic redundancy checks
F.1 Example CRC-5 encoder/decoder
F.2 Example CRC-16 encoder/decoder
F.3 Example CRC-16 calculations
Annex G(Normative)Multiple- and dense-Interrogator channelized signaling
G.1 Overview of dense-interrogator channelized signaling (informative)
Annex H(informative)Interrogator-to-Tag link modulation
H.1 Baseband waveforms, modulated RF, and detected waveforms
Annex I(Normative)Error codes
I.1 Tag error codes and their usage
Annex J(normative)Slot counter
J.1 Slot-counter operation
Annex K(informative)Example data-flow exchange
K.1 Overview of the data-flow exchange
K.2 Tag memory contents and lock-field values
K.3 Data-flow exchange and command sequence
Annex L(informative)Optional Tag Features
L.1 Optional Tag passwords
L.2 Optional Tag memory banks and memory-bank sizes
L.3 Optional Tag commands
L.4 Optional Tag error-code reporting format
L.5 Optional Tag backscatter modulation format
L.6 Optional Tag functionality
Annex M(informative)Revision History
Specification for RFID Air Interface EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz – 960 MHz Version 1.2.0 Copyright notice © 2004 – 2008 EPCglobal Inc. All rights reserved. Unauthorized reproduction, modification, and/or use of this Document is not permitted. Requests for permission to reproduce should be addressed to epcglobal@epcglobalinc.org. EPCglobal Inc.TM is providing this document as a service to interested industries. This document was developed through a consensus process of interested parties. Although efforts have been to assure that the document is correct, reliable, and technically accurate, EPCglobal Inc. makes NO WARRANTY, EXPRESS OR IMPLIED, THAT THIS DOCUMENT IS CORRECT, WILL NOT REQUIRE MODIFICATION AS EXPERIENCE AND TECHNOLOGICAL ADVANCES DICTATE, OR WILL BE SUITABLE FOR ANY PURPOSE OR WORKABLE IN ANY APPLICATION, OR OTHERWISE. Use of this Docu- ment is with the understanding that EPCglobal Inc. has no liability for any claim to the contrary, or for any damage or loss of any kind or nature. Disclaimer Whilst every effort has been made to ensure that this document and the information contained herein are correct, EP- Cglobal and any other party involved in the creation of the document hereby state that the document is provided on an “as is” basis without warranty, either expressed or implied, including but not limited to any warranty that the use of the informa- tion herein will not infringe any rights, of accuracy or fitness for purpose, and hereby disclaim any liability, direct or indirect, for damages or loss relating to the use of the document. © 2004 – 2008 EPCglobal Inc. Page 1 of 108 23 October 2008
Contents INDEX OF FIGURES .................................................................................................................................................6 INDEX OF TABLES ...................................................................................................................................................7 FOREWORD ..............................................................................................................................................................9 INTRODUCTION......................................................................................................................................................10 1. SCOPE..............................................................................................................................................................11 2. CONFORMANCE .............................................................................................................................................11 2.1 CLAIMING CONFORMANCE.............................................................................................................................11 2.2 GENERAL CONFORMANCE REQUIREMENTS.....................................................................................................11 Interrogators .......................................................................................................................................11 2.2.1 Tags....................................................................................................................................................11 2.2.2 2.3 COMMAND STRUCTURE AND EXTENSIBILITY....................................................................................................12 2.3.1 Mandatory commands ........................................................................................................................12 2.3.2 Optional commands............................................................................................................................12 2.3.3 Proprietary commands .......................................................................................................................12 Custom commands.............................................................................................................................12 2.3.4 2.4 RESERVED FOR FUTURE USE (RFU).............................................................................................................12 3. NORMATIVE REFERENCES...........................................................................................................................13 4. TERMS AND DEFINITIONS.............................................................................................................................14 4.1 ADDITIONAL TERMS AND DEFINITIONS ............................................................................................................14 5. SYMBOLS, ABBREVIATED TERMS, AND NOTATION.................................................................................16 5.1 SYMBOLS.....................................................................................................................................................16 5.2 ABBREVIATED TERMS ...................................................................................................................................17 5.3 NOTATION....................................................................................................................................................18 6. PROTOCOL REQUIREMENTS........................................................................................................................19 6.1 PROTOCOL OVERVIEW..................................................................................................................................19 Physical layer......................................................................................................................................19 Tag-identification layer .......................................................................................................................19 6.2 PROTOCOL PARAMETERS..............................................................................................................................19 Signaling – Physical and media access control (MAC) parameters...................................................19 Logical – Operating procedure parameters........................................................................................23 6.3 DESCRIPTION OF OPERATING PROCEDURE.....................................................................................................24 Signaling.............................................................................................................................................24 Operational frequencies ..............................................................................................................24 Interrogator-to-Tag (R=>T) communications...............................................................................24 6.3.1.2.1 Interrogator frequency accuracy...............................................................................................24 6.3.1.2.2 Modulation ................................................................................................................................24 6.3.1.2.3 Data encoding...........................................................................................................................24 6.3.1.2.4 Tari values ................................................................................................................................25 6.3.1.2.5 R=>T RF envelope....................................................................................................................25 6.3.1.2.6 Interrogator power-up waveform...............................................................................................25 6.3.1.2.7 Interrogator power-down waveform..........................................................................................26 6.3.1.2.8 R=>T preamble and frame-sync...............................................................................................26 6.3.1.2.9 Frequency-hopping spread-spectrum waveform......................................................................27 6.3.1.2.10 Frequency-hopping spread-spectrum channelization...............................................................27 6.3.1.2.11 Transmit mask ..........................................................................................................................27 Tag-to-Interrogator (T=>R) communications...............................................................................29 6.3.1.3.1 Modulation ................................................................................................................................29 6.3.1.3.2 Data encoding...........................................................................................................................30 6.3.1.3.2.1 FM0 baseband....................................................................................................................30 6.3.1.3.2.2 FM0 preamble ....................................................................................................................30 6.3.1.3.2.3 Miller-modulated subcarrier................................................................................................31 6.1.1 6.1.2 6.2.1 6.2.2 6.3.1 6.3.1.1 6.3.1.2 6.3.1.3 © 2004 – 2008 EPCglobal Inc. Page 2 of 108 23 October 2008
6.3.2 6.3.2.2 6.3.2.3 6.3.2.4 6.3.1.4 6.3.1.5 6.3.1.6 6.3.2.1 6.3.1.3.2.4 Miller subcarrier preamble..................................................................................................32 6.3.1.3.3 Tag supported Tari values and backscatter link rates..............................................................34 6.3.1.3.4 Tag power-up timing .................................................................................................................34 6.3.1.3.5 Minimum operating field strength and backscatter strength.....................................................34 Transmission order......................................................................................................................35 Cyclic-redundancy check (CRC) .................................................................................................35 Link timing ...................................................................................................................................35 Tag selection, inventory, and access .................................................................................................37 Tag memory ................................................................................................................................37 6.3.2.1.1 Reserved Memory.....................................................................................................................38 6.3.2.1.1.1 Kill password ......................................................................................................................38 6.3.2.1.1.2 Access password................................................................................................................38 6.3.2.1.2 EPC Memory.............................................................................................................................38 6.3.2.1.2.1 CRC-16 (StoredCRC and PacketCRC)..............................................................................38 6.3.2.1.2.2 Protocol-control (PC) word (StoredPC and PacketPC)......................................................39 6.3.2.1.2.3 EPC for an EPCglobal™ Application..................................................................................41 6.3.2.1.2.4 EPC for a non-EPCglobal™ Application ............................................................................41 6.3.2.1.2.5 Extended Protocol Control (XPC) word or words (optional)...............................................41 6.3.2.1.3 TID Memory ..............................................................................................................................43 6.3.2.1.4 User Memory ............................................................................................................................43 6.3.2.1.4.1 User memory for an EPCglobal™ Application ...................................................................43 6.3.2.1.4.2 User memory for a non-EPCglobal™ Application ..............................................................43 Sessions and inventoried flags....................................................................................................43 Selected flag................................................................................................................................44 Tag states and slot counter.........................................................................................................45 6.3.2.4.1 Ready state...............................................................................................................................45 6.3.2.4.2 Arbitrate state............................................................................................................................45 6.3.2.4.3 Reply state................................................................................................................................45 6.3.2.4.4 Acknowledged state..................................................................................................................45 6.3.2.4.5 Open state ................................................................................................................................46 6.3.2.4.6 Secured state............................................................................................................................46 6.3.2.4.7 Killed state ................................................................................................................................46 6.3.2.4.8 Slot counter...............................................................................................................................46 Tag random or pseudo-random number generator.....................................................................46 6.3.2.5 6.3.2.6 Managing Tag populations..........................................................................................................48 Selecting Tag populations...........................................................................................................48 6.3.2.7 6.3.2.8 Inventorying Tag populations ......................................................................................................49 6.3.2.9 Accessing individual Tags...........................................................................................................51 6.3.2.10 Killing or recommissioning a Tag ................................................................................................52 Interrogator commands and Tag replies .....................................................................................53 6.3.2.11 6.3.2.11.1 Select commands .....................................................................................................................55 6.3.2.11.1.1 Select (mandatory) .............................................................................................................55 6.3.2.11.2 Inventory commands ................................................................................................................57 6.3.2.11.2.1 Query (mandatory) .............................................................................................................57 6.3.2.11.2.2 QueryAdjust (mandatory) ...................................................................................................58 6.3.2.11.2.3 QueryRep (mandatory).......................................................................................................59 6.3.2.11.2.4 ACK (mandatory)................................................................................................................60 6.3.2.11.2.5 NAK (mandatory)................................................................................................................61 6.3.2.11.3 Access commands....................................................................................................................62 6.3.2.11.3.1 Req_RN (mandatory) .........................................................................................................63 6.3.2.11.3.2 Read (mandatory)...............................................................................................................64 6.3.2.11.3.3 Write (mandatory)...............................................................................................................66 6.3.2.11.3.4 Kill (mandatory) ..................................................................................................................67 6.3.2.11.3.5 Lock (mandatory)................................................................................................................70 6.3.2.11.3.6 Access (optional)................................................................................................................72 6.3.2.11.3.7 BlockWrite (optional) ..........................................................................................................74 6.3.2.11.3.8 BlockErase (optional) .........................................................................................................75 6.3.2.11.3.9 BlockPermalock (optional)..................................................................................................76 © 2004 – 2008 EPCglobal Inc. Page 3 of 108 23 October 2008
7. INTELLECTUAL PROPERTY RIGHTS INTRINSIC TO THIS SPECIFICATION............................................79 ANNEX A (NORMATIVE) EXTENSIBLE BIT VECTORS (EBV) ............................................................................80 ANNEX B (NORMATIVE) STATE-TRANSITION TABLES ....................................................................................81 B.1 PRESENT STATE: READY...............................................................................................................................81 B.2 PRESENT STATE: ARBITRATE ........................................................................................................................82 B.3 PRESENT STATE: REPLY...............................................................................................................................83 B.4 PRESENT STATE: ACKNOWLEDGED................................................................................................................84 B.5 PRESENT STATE: OPEN ................................................................................................................................85 B.6 PRESENT STATE: SECURED ..........................................................................................................................86 B.7 PRESENT STATE: KILLED...............................................................................................................................87 ANNEX C (NORMATIVE) COMMAND-RESPONSE TABLES ...............................................................................88 C.1 COMMAND RESPONSE: POWER-UP................................................................................................................88 C.2 COMMAND RESPONSE: QUERY......................................................................................................................88 C.3 COMMAND RESPONSE: QUERYREP ...............................................................................................................89 C.4 COMMAND RESPONSE: QUERYADJUST..........................................................................................................89 C.5 COMMAND RESPONSE: ACK .........................................................................................................................90 C.6 COMMAND RESPONSE: NAK .........................................................................................................................90 C.7 COMMAND RESPONSE: REQ_RN...................................................................................................................90 C.8 COMMAND RESPONSE: SELECT.....................................................................................................................91 C.9 COMMAND RESPONSE: READ ........................................................................................................................91 COMMAND RESPONSE: WRITE...................................................................................................................91 C.10 C.11 COMMAND RESPONSE: KILL.......................................................................................................................92 C.12 COMMAND RESPONSE: LOCK.....................................................................................................................92 COMMAND RESPONSE: ACCESS.................................................................................................................93 C.13 COMMAND RESPONSE: BLOCKWRITE.........................................................................................................93 C.14 C.15 COMMAND RESPONSE: BLOCKERASE ........................................................................................................94 C.16 COMMAND RESPONSE: BLOCKPERMALOCK................................................................................................94 C.17 COMMAND RESPONSE: T2 TIMEOUT............................................................................................................94 COMMAND RESPONSE: INVALID COMMAND .................................................................................................95 C.18 ANNEX D (INFORMATIVE) EXAMPLE SLOT-COUNT (Q) SELECTION ALGORITHM.......................................96 D.1 EXAMPLE ALGORITHM AN INTERROGATOR MIGHT USE TO CHOOSE Q ...............................................................96 ANNEX E (INFORMATIVE) EXAMPLE OF TAG INVENTORY AND ACCESS.....................................................97 E.1 EXAMPLE INVENTORY AND ACCESS OF A SINGLE TAG .....................................................................................97 ANNEX F (INFORMATIVE) CALCULATION OF 5-BIT AND 16-BIT CYCLIC REDUNDANCY CHECKS............98 F.1 EXAMPLE CRC-5 ENCODER/DECODER ..........................................................................................................98 F.2 EXAMPLE CRC-16 ENCODER/DECODER ........................................................................................................98 F.3 EXAMPLE CRC-16 CALCULATIONS ................................................................................................................99 ANNEX G (NORMATIVE) MULTIPLE- AND DENSE-INTERROGATOR CHANNELIZED SIGNALING.............100 G.1 OVERVIEW OF DENSE-INTERROGATOR CHANNELIZED SIGNALING (INFORMATIVE)............................................100 ANNEX H (INFORMATIVE) INTERROGATOR-TO-TAG LINK MODULATION ..................................................102 H.1 BASEBAND WAVEFORMS, MODULATED RF, AND DETECTED WAVEFORMS .......................................................102 ANNEX I (NORMATIVE) ERROR CODES............................................................................................................103 TAG ERROR CODES AND THEIR USAGE .........................................................................................................103 ANNEX J (NORMATIVE) SLOT COUNTER .........................................................................................................104 SLOT-COUNTER OPERATION........................................................................................................................104 ANNEX K (INFORMATIVE) EXAMPLE DATA-FLOW EXCHANGE....................................................................105 K.1 OVERVIEW OF THE DATA-FLOW EXCHANGE ..................................................................................................105 K.2 TAG MEMORY CONTENTS AND LOCK-FIELD VALUES.......................................................................................105 K.3 DATA-FLOW EXCHANGE AND COMMAND SEQUENCE ......................................................................................106 ANNEX L (INFORMATIVE) OPTIONAL TAG FEATURES ..................................................................................107 L.1 OPTIONAL TAG PASSWORDS .......................................................................................................................107 L.2 OPTIONAL TAG MEMORY BANKS AND MEMORY-BANK SIZES ...........................................................................107 J.1 I.1 © 2004 – 2008 EPCglobal Inc. Page 4 of 108 23 October 2008
L.3 OPTIONAL TAG COMMANDS.........................................................................................................................107 L.4 OPTIONAL TAG ERROR-CODE REPORTING FORMAT.......................................................................................107 L.5 OPTIONAL TAG BACKSCATTER MODULATION FORMAT ...................................................................................107 L.6 OPTIONAL TAG FUNCTIONALITY...................................................................................................................107 ANNEX M (INFORMATIVE) REVISION HISTORY ...............................................................................................108 © 2004 – 2008 EPCglobal Inc. Page 5 of 108 23 October 2008
Index of Figures FIGURE 6.1 – PIE SYMBOLS ........................................................................................................................................24 FIGURE 6.2 – INTERROGATOR-TO-TAG RF ENVELOPE ..................................................................................................25 FIGURE 6.3 – INTERROGATOR POWER-UP AND POWER-DOWN RF ENVELOPE .................................................................26 FIGURE 6.4 – R=>T PREAMBLE AND FRAME-SYNC ........................................................................................................27 FIGURE 6.5 – FHSS INTERROGATOR RF ENVELOPE.....................................................................................................28 FIGURE 6.6 – TRANSMIT MASK FOR MULTIPLE-INTERROGATOR ENVIRONMENTS..............................................................29 FIGURE 6.7 – TRANSMIT MASK FOR DENSE-INTERROGATOR ENVIRONMENTS..................................................................29 FIGURE 6.8 – FM0 BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM........................................................................30 FIGURE 6.9 – FM0 SYMBOLS AND SEQUENCES.............................................................................................................30 FIGURE 6.10 – TERMINATING FM0 TRANSMISSIONS......................................................................................................31 FIGURE 6.11 – FM0 T=>R PREAMBLE .........................................................................................................................31 FIGURE 6.12 – MILLER BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM ..................................................................31 FIGURE 6.13 – SUBCARRIER SEQUENCES ....................................................................................................................32 FIGURE 6.14 – TERMINATING SUBCARRIER TRANSMISSIONS..........................................................................................33 FIGURE 6.15 – SUBCARRIER T=>R PREAMBLE.............................................................................................................33 FIGURE 6.16 – LINK TIMING.........................................................................................................................................36 FIGURE 6.17 – LOGICAL MEMORY MAP.........................................................................................................................37 FIGURE 6.18 – SESSION DIAGRAM ...............................................................................................................................44 FIGURE 6.19 – TAG STATE DIAGRAM............................................................................................................................47 FIGURE 6.20 – INTERROGATOR/TAG OPERATIONS AND TAG STATE................................................................................48 FIGURE 6.21 – ONE TAG REPLY ..................................................................................................................................50 FIGURE 6.22 – SUCCESSFUL WRITE SEQUENCE...........................................................................................................66 FIGURE 6.23 – KILL PROCEDURE .................................................................................................................................69 FIGURE 6.24 – LOCK PAYLOAD AND USAGE ..................................................................................................................71 FIGURE 6.25 – ACCESS PROCEDURE ...........................................................................................................................73 FIGURE D.1 – EXAMPLE ALGORITHM FOR CHOOSING THE SLOT-COUNT PARAMETER Q....................................................96 FIGURE E.1 – EXAMPLE OF TAG INVENTORY AND ACCESS.............................................................................................97 FIGURE F.1 – EXAMPLE CRC-5 CIRCUIT......................................................................................................................98 FIGURE F.2 – EXAMPLE CRC-16 CIRCUIT....................................................................................................................99 FIGURE G.1 – EXAMPLES OF DENSE-INTERROGATOR-MODE OPERATION......................................................................101 FIGURE H.1 – INTERROGATOR-TO-TAG MODULATION..................................................................................................102 FIGURE J.1 – SLOT-COUNTER STATE DIAGRAM...........................................................................................................104 © 2004 – 2008 EPCglobal Inc. Page 6 of 108 23 October 2008
Index of Tables TABLE 6.1 – INTERROGATOR-TO-TAG (R=>T) COMMUNICATIONS ..................................................................................20 TABLE 6.2 – TAG-TO-INTERROGATOR (T=>R) COMMUNICATIONS ..................................................................................21 TABLE 6.3 – TAG INVENTORY AND ACCESS PARAMETERS ..............................................................................................23 TABLE 6.4 – COLLISION MANAGEMENT PARAMETERS ....................................................................................................23 TABLE 6.5 – RF ENVELOPE PARAMETERS ....................................................................................................................25 TABLE 6.6 – INTERROGATOR POWER-UP WAVEFORM PARAMETERS ...............................................................................26 TABLE 6.7 – INTERROGATOR POWER-DOWN WAVEFORM PARAMETERS ..........................................................................26 TABLE 6.8 – FHSS WAVEFORM PARAMETERS ..............................................................................................................28 TABLE 6.9 – TAG-TO-INTERROGATOR LINK FREQUENCIES .............................................................................................34 TABLE 6.10 – TAG-TO-INTERROGATOR DATA RATES .....................................................................................................34 TABLE 6.11 – CRC-16 PRECURSOR ............................................................................................................................35 TABLE 6.12 – CRC-5 DEFINITION. SEE ALSO ANNEX F .................................................................................................35 TABLE 6.13 – LINK TIMING PARAMETERS......................................................................................................................36 TABLE 6.14 – TAG DATA AND CRC-16 BACKSCATTERED IN RESPONSE TO AN ACK COMMAND........................................39 TABLE 6.15 – XPC_W1 LSBS AND A TAG’S RECOMMISSIONED STATUS ........................................................................42 TABLE 6.16 – TAG FLAGS AND PERSISTENCE VALUES ...................................................................................................45 TABLE 6.17 – ACCESS COMMANDS AND TAG STATES IN WHICH THEY ARE PERMITTED.....................................................51 TABLE 6.18 – COMMANDS...........................................................................................................................................54 TABLE 6.19 – SELECT COMMAND.................................................................................................................................56 TABLE 6.20 – TAG RESPONSE TO ACTION PARAMETER .................................................................................................56 TABLE 6.21 – QUERY COMMAND..................................................................................................................................57 TABLE 6.22 – TAG REPLY TO A QUERY COMMAND ........................................................................................................57 TABLE 6.23 – QUERYADJUST COMMAND......................................................................................................................58 TABLE 6.24 – TAG REPLY TO A QUERYADJUST COMMAND.............................................................................................58 TABLE 6.25 – QUERYREP COMMAND ...........................................................................................................................59 TABLE 6.26 – TAG REPLY TO A QUERYREP COMMAND ..................................................................................................59 TABLE 6.27 – ACK COMMAND.....................................................................................................................................60 TABLE 6.28 – TAG REPLY TO A SUCCESSFUL ACK COMMAND........................................................................................60 TABLE 6.29 – NAK COMMAND.....................................................................................................................................61 TABLE 6.30 – REQ_RN COMMAND ..............................................................................................................................63 TABLE 6.31 – TAG REPLY TO A REQ_RN COMMAND .....................................................................................................63 TABLE 6.32 – TAG BACKSCATTER WHEN WORDCOUNT=00H AND MEMBANK=012 ..........................................................64 TABLE 6.33 – READ COMMAND....................................................................................................................................65 TABLE 6.34 – TAG REPLY TO A SUCCESSFUL READ COMMAND ......................................................................................65 TABLE 6.35 – WRITE COMMAND ..................................................................................................................................66 TABLE 6.36 – TAG REPLY TO A SUCCESSFUL WRITE COMMAND .....................................................................................66 TABLE 6.37 – FIRST KILL COMMAND ............................................................................................................................68 TABLE 6.38 – SECOND KILL COMMAND ........................................................................................................................68 TABLE 6.39 – TAG REPLY TO THE FIRST KILL COMMAND................................................................................................68 TABLE 6.40 – TAG REPLY TO A SUCCESSFUL KILL PROCEDURE .....................................................................................68 TABLE 6.41 – LOCK COMMAND ....................................................................................................................................71 TABLE 6.42 – TAG REPLY TO A LOCK COMMAND ...........................................................................................................71 TABLE 6.43 – LOCK ACTION-FIELD FUNCTIONALITY.......................................................................................................71 TABLE 6.44 – ACCESS COMMAND ................................................................................................................................72 TABLE 6.45 – TAG REPLY TO AN ACCESS COMMAND.....................................................................................................72 TABLE 6.46 – BLOCKWRITE COMMAND ........................................................................................................................74 TABLE 6.47 – TAG REPLY TO A SUCCESSFUL BLOCKWRITE COMMAND...........................................................................74 TABLE 6.48 – BLOCKERASE COMMAND........................................................................................................................75 TABLE 6.49 – TAG REPLY TO A SUCCESSFUL BLOCKERASE COMMAND ..........................................................................75 TABLE 6.50 – PRECEDENCE FOR LOCK AND BLOCKPERMALOCK COMMANDS .................................................................76 TABLE 6.51 – BLOCKPERMALOCK COMMAND ...............................................................................................................78 TABLE 6.52 – TAG REPLY TO A SUCCESSFUL BLOCKPERMALOCK COMMAND WITH READ/LOCK = 0 .................................78 TABLE 6.53 – TAG REPLY TO A SUCCESSFUL BLOCKPERMALOCK COMMAND WITH READ/LOCK = 1 .................................78 TABLE A.1 – EBV-8 WORD FORMAT.............................................................................................................................80 TABLE B.1 – READY STATE-TRANSITION TABLE.............................................................................................................81 TABLE B.2 – ARBITRATE STATE-TRANSITION TABLE ......................................................................................................82 © 2004 – 2008 EPCglobal Inc. Page 7 of 108 23 October 2008
TABLE B.3 – REPLY STATE-TRANSITION TABLE .............................................................................................................83 TABLE B.4 – ACKNOWLEDGED STATE-TRANSITION TABLE..............................................................................................84 TABLE B.5 – OPEN STATE-TRANSITION TABLE ..............................................................................................................85 TABLE B.6 – SECURED STATE-TRANSITION TABLE.........................................................................................................86 TABLE B.7 – KILLED STATE-TRANSITION TABLE.............................................................................................................87 TABLE C.1 – POWER-UP COMMAND-RESPONSE TABLE..................................................................................................88 TABLE C.2 – QUERY 1 COMMAND-RESPONSE TABLE......................................................................................................88 TABLE C.3 – QUERYREP COMMAND-RESPONSE TABLE1................................................................................................89 TABLE C.4 – QUERYADJUST 1 COMMAND-RESPONSE TABLE2.........................................................................................89 TABLE C.5 – ACK COMMAND-RESPONSE TABLE ...........................................................................................................90 TABLE C.6 – NAK COMMAND-RESPONSE TABLE ...........................................................................................................90 TABLE C.7 – REQ_RN COMMAND-RESPONSE TABLE.....................................................................................................90 TABLE C.8 – READ COMMAND-RESPONSE TABLE..........................................................................................................91 TABLE C.9 – SELECT COMMAND-RESPONSE TABLE.......................................................................................................91 TABLE C.10 – WRITE COMMAND-RESPONSE TABLE.......................................................................................................91 TABLE C.11 – KILL 1 COMMAND-RESPONSE TABLE ........................................................................................................92 TABLE C.12 – LOCK COMMAND-RESPONSE TABLE ........................................................................................................92 TABLE C.13 – ACCESS 1 COMMAND-RESPONSE TABLE ..................................................................................................93 TABLE C.14 – BLOCKWRITE COMMAND-RESPONSE TABLE ............................................................................................93 TABLE C.15 – BLOCKERASE COMMAND-RESPONSE TABLE............................................................................................94 TABLE C.16 – BLOCKPERMALOCK COMMAND-RESPONSE TABLE....................................................................................94 TABLE C.17 – T2 TIMEOUT COMMAND-RESPONSE TABLE ...............................................................................................94 TABLE C.18 – INVALID COMMAND-RESPONSE TABLE .....................................................................................................95 TABLE F.1 – CRC-5 REGISTER PRELOAD VALUES.........................................................................................................98 TABLE F.2 – EPC MEMORY CONTENTS FOR AN EXAMPLE TAG.......................................................................................99 TABLE I.1 – TAG-ERROR REPLY FORMAT ....................................................................................................................103 TABLE I.2 – TAG ERROR CODES.................................................................................................................................103 TABLE K.1 – TAG MEMORY CONTENTS .......................................................................................................................105 TABLE K.2 – LOCK-FIELD VALUES ..............................................................................................................................105 TABLE K.3 – INTERROGATOR COMMANDS AND TAG REPLIES .......................................................................................106 TABLE M.1 – REVISION HISTORY ...............................................................................................................................108 © 2004 – 2008 EPCglobal Inc. Page 8 of 108 23 October 2008
分享到:
收藏