没有合适的资源?快使用搜索试试~ 我知道了~
EPC-C1G2(18000-6C)协议
3星 · 超过75%的资源 需积分: 32 70 下载量 104 浏览量
2010-04-09
11:00:44
上传
评论 2
收藏 2.51MB PDF 举报
温馨提示
试读
100页
EPC-C1G2(18000-6C)协议完整版,需要的朋友就下吧,这个在网上买要175美金呢
资源推荐
资源详情
资源评论
Specification for RFID Air Interface
EPC™ Radio-Frequency Identity Protocols
Class-1 Generation-2 UHF RFID
Protocol for Communications at 860 MHz – 960 MHz
Version 1.1.0
right notice Copy
© 2004, 2005, 2006, EPCglobal Inc.
Unauthorized reproduction, modification and/or use of this Specification is prohibited. Any reproduction, modifi-
cation and/or use of this Specification is subject to the licensing obligations of the EPCglobal Intellectual Prop-
erty Policy and enforcement of the terms thereof.
Requests for permission to reproduce should be addressed to epcglobal@epcglobalinc.org.
Violators may be prosecuted.
© 2004, 2005, 2006, EPCglobal Inc. Page 1 of 100 17 December 2005
Contents
INDEX OF FIGURES .................................................................................................................................................5
INDEX OF TABLES...................................................................................................................................................6
FOREWORD..............................................................................................................................................................8
INTRODUCTION........................................................................................................................................................9
1. SCOPE..............................................................................................................................................................10
2. CONFORMANCE .............................................................................................................................................10
2.1 CLAIMING CONFORMANCE .............................................................................................................................10
2.2 GENERAL CONFORMANCE REQUIREMENTS.....................................................................................................10
2.2.1 Interrogators .......................................................................................................................................10
2.2.2 Tags....................................................................................................................................................10
2.3 COMMAND STRUCTURE AND EXTENSIBILITY....................................................................................................11
2.3.1 Mandatory commands ........................................................................................................................11
2.3.2 Optional commands............................................................................................................................11
2.3.3 Proprietary commands .......................................................................................................................11
2.3.4 Custom commands.............................................................................................................................11
3. NORMATIVE REFERENCES...........................................................................................................................11
4. TERMS AND DEFINITIONS.............................................................................................................................13
4.1 ADDITIONAL TERMS AND DEFINITIONS ............................................................................................................13
5. SYMBOLS, ABBREVIATED TERMS, AND NOTATION.................................................................................15
5.1 SYMBOLS.....................................................................................................................................................15
5.2 ABBREVIATED TERMS ...................................................................................................................................15
5.3 NOTATION....................................................................................................................................................16
6. PROTOCOL REQUIREMENTS........................................................................................................................17
6.1 PROTOCOL OVERVIEW ..................................................................................................................................17
6.1.1 Physical layer......................................................................................................................................17
6.1.2 Tag-identification layer .......................................................................................................................17
6.2 PROTOCOL PARAMETERS..............................................................................................................................17
6.2.1 Signaling – Physical and media access control (MAC) parameters...................................................17
6.2.2 Logical – Operating procedure parameters........................................................................................21
6.3 DESCRIPTION OF OPERATING PROCEDURE.....................................................................................................22
6.3.1 Signaling .............................................................................................................................................22
6.3.1.1 Operational frequencies ..............................................................................................................22
6.3.1.2 Interrogator-to-Tag (R=>T) communications...............................................................................22
6.3.1.2.1 Interrogator frequency accuracy...............................................................................................22
6.3.1.2.2 Modulation ................................................................................................................................22
6.3.1.2.3 Data encoding...........................................................................................................................22
6.3.1.2.4 Tari values ................................................................................................................................23
6.3.1.2.5 R=>T RF envelope....................................................................................................................23
6.3.1.2.6 Interrogator power-up waveform...............................................................................................23
6.3.1.2.7 Interrogator power-down waveform..........................................................................................23
6.3.1.2.8 R=>T preamble and frame-sync ...............................................................................................24
6.3.1.2.9 Frequency-hopping spread-spectrum waveform......................................................................25
6.3.1.2.10 Frequency-hopping spread-spectrum channelization...............................................................25
6.3.1.2.11 Transmit mask ..........................................................................................................................25
6.3.1.3 Tag-to-Interrogator (T=>R) communications...............................................................................27
6.3.1.3.1 Modulation ................................................................................................................................27
6.3.1.3.2 Data encoding...........................................................................................................................27
6.3.1.3.2.1 FM0 baseband....................................................................................................................28
6.3.1.3.2.2 FM0 preamble ....................................................................................................................28
6.3.1.3.2.3 Miller-modulated subcarrier................................................................................................29
6.3.1.3.2.4 Miller subcarrier preamble..................................................................................................30
6.3.1.3.3 Tag supported Tari values and backscatter link rates..............................................................32
6.3.1.3.4 Tag power-up timing .................................................................................................................32
© 2004, 2005, 2006, EPCglobal Inc. Page 2 of 100 17 December 2005
6.3.1.3.5 Minimum operating field strength and backscatter strength.....................................................32
6.3.1.4 Transmission order......................................................................................................................33
6.3.1.5 Cyclic-redundancy check (CRC) .................................................................................................33
6.3.1.6 Link timing ...................................................................................................................................33
6.3.2 Tag selection, inventory, and access .................................................................................................35
6.3.2.1 Tag memory ................................................................................................................................35
6.3.2.1.1 Reserved Memory.....................................................................................................................36
6.3.2.1.1.1 Kill password ......................................................................................................................36
6.3.2.1.1.2 Access password................................................................................................................36
6.3.2.1.2 EPC Memory.............................................................................................................................36
6.3.2.1.2.1 CRC-16...............................................................................................................................36
6.3.2.1.2.2 Protocol-control (PC) bits ...................................................................................................36
6.3.2.1.2.3 EPC for an EPCglobal™ Application..................................................................................37
6.3.2.1.2.4 EPC for a non-EPCglobal™ Application ............................................................................37
6.3.2.1.3 TID Memory ..............................................................................................................................37
6.3.2.1.4 User Memory ............................................................................................................................37
6.3.2.1.4.1 User memory for an EPCglobal™ Application ...................................................................37
6.3.2.1.4.2 User memory for a non-EPCglobal™ Application ..............................................................37
6.3.2.2 Sessions and inventoried flags....................................................................................................38
6.3.2.3 Selected flag................................................................................................................................38
6.3.2.4 Tag states and slot counter.........................................................................................................39
6.3.2.4.1 Ready state...............................................................................................................................39
6.3.2.4.2 Arbitrate state............................................................................................................................40
6.3.2.4.3 Reply state ................................................................................................................................40
6.3.2.4.4 Acknowledged state..................................................................................................................40
6.3.2.4.5 Open state ................................................................................................................................40
6.3.2.4.6 Secured state............................................................................................................................40
6.3.2.4.7 Killed state ................................................................................................................................40
6.3.2.4.8 Slot counter...............................................................................................................................41
6.3.2.5 Tag random or pseudo-random number generator.....................................................................41
6.3.2.6 Managing Tag populations ..........................................................................................................43
6.3.2.7 Selecting Tag populations...........................................................................................................43
6.3.2.8 Inventorying Tag populations ......................................................................................................43
6.3.2.9 Accessing individual Tags...........................................................................................................45
6.3.2.10 Interrogator commands and Tag replies .....................................................................................47
6.3.2.10.1 Select commands .....................................................................................................................49
6.3.2.10.1.1 Select (mandatory) .............................................................................................................49
6.3.2.10.2 Inventory commands ................................................................................................................51
6.3.2.10.2.1 Query (mandatory) .............................................................................................................51
6.3.2.10.2.2 QueryAdjust (mandatory) ...................................................................................................52
6.3.2.10.2.3 QueryRep (mandatory).......................................................................................................53
6.3.2.10.2.4 ACK (mandatory)................................................................................................................54
6.3.2.10.2.5 NAK (mandatory)................................................................................................................55
6.3.2.10.3 Access commands....................................................................................................................56
6.3.2.10.3.1 Req_RN (mandatory) .........................................................................................................57
6.3.2.10.3.2 Read (mandatory)...............................................................................................................58
6.3.2.10.3.3 Write (mandatory)...............................................................................................................59
6.3.2.10.3.4 Kill (mandatory) ..................................................................................................................60
6.3.2.10.3.5 Lock (mandatory)................................................................................................................63
6.3.2.10.3.6 Access (optional) ................................................................................................................65
6.3.2.10.3.7 BlockWrite (optional) ..........................................................................................................67
6.3.2.10.3.8 BlockErase (optional) .........................................................................................................68
7. INTELLECTUAL PROPERTY RIGHTS INTRINSIC TO THIS SPECIFICATION............................................69
ANNEX A (NORMATIVE) EXTENSIBLE BIT VECTORS (EBV) ............................................................................70
ANNEX B (NORMATIVE) STATE-TRANSITION TABLES ....................................................................................71
B.1 PRESENT STATE: READY...............................................................................................................................71
B.2 PRESENT STATE: ARBITRATE ........................................................................................................................72
B.3 PRESENT STATE: REPLY ...............................................................................................................................73
© 2004, 2005, 2006, EPCglobal Inc. Page 3 of 100 17 December 2005
B.4 PRESENT STATE: ACKNOWLEDGED................................................................................................................74
B.5 PRESENT STATE: OPEN ................................................................................................................................75
B.6 PRESENT STATE: SECURED ..........................................................................................................................76
B.7 PRESENT STATE: KILLED...............................................................................................................................77
ANNEX C (NORMATIVE) COMMAND-RESPONSE TABLES...............................................................................78
C.1 COMMAND RESPONSE: POWER-UP ................................................................................................................78
C.2 COMMAND RESPONSE: QUERY......................................................................................................................78
C.3 COMMAND RESPONSE: QUERYREP ...............................................................................................................79
C.4 COMMAND RESPONSE: QUERYADJUST ..........................................................................................................79
C.5 COMMAND RESPONSE: ACK .........................................................................................................................79
C.6 COMMAND RESPONSE: NAK .........................................................................................................................80
C.7 COMMAND RESPONSE: REQ_RN...................................................................................................................80
C.8 COMMAND RESPONSE: SELECT.....................................................................................................................80
C.9 COMMAND RESPONSE: READ ........................................................................................................................81
C.10 COMMAND RESPONSE: WRITE ...................................................................................................................81
C.11 COMMAND RESPONSE: KILL.......................................................................................................................82
C.12 COMMAND RESPONSE: LOCK.....................................................................................................................82
C.13 COMMAND RESPONSE: ACCESS.................................................................................................................83
C.14 COMMAND RESPONSE: BLOCKWRITE.........................................................................................................83
C.15 COMMAND RESPONSE: BLOCKERASE ........................................................................................................84
C.16 COMMAND RESPONSE: T
2
TIMEOUT............................................................................................................84
C.17 COMMAND RESPONSE: INVALID COMMAND .................................................................................................85
ANNEX D (INFORMATIVE) EXAMPLE SLOT-COUNT (
Q
) SELECTION ALGORITHM.......................................86
D.1 EXAMPLE ALGORITHM AN INTERROGATOR MIGHT USE TO CHOOSE Q...............................................................86
ANNEX E (INFORMATIVE) EXAMPLE OF TAG INVENTORY AND ACCESS.....................................................87
E.1 EXAMPLE INVENTORY AND ACCESS OF A SINGLE TAG .....................................................................................87
ANNEX F (INFORMATIVE) CALCULATION OF 5-BIT AND 16-BIT CYCLIC REDUNDANCY CHECKS............88
F.1 EXAMPLE CRC-5 ENCODER/DECODER ..........................................................................................................88
F.2 EXAMPLE CRC-16 ENCODER/DECODER ........................................................................................................88
F.3 EXAMPLE CRC-16 CALCULATIONS ................................................................................................................89
ANNEX G (NORMATIVE) MULTIPLE- AND DENSE-INTERROGATOR CHANNELIZED SIGNALING...............90
G.1 DENSE-INTERROGATOR MODE ......................................................................................................................90
G.1.1 EXAMPLES OF DENSE-INTERROGATOR-MODE OPERATION (INFORMATIVE) ....................................................90
G.2 CHANNELIZATION IN MULTIPLE- AND DENSE-INTERROGATOR ENVIRONMENTS ...................................................91
G.2.1 EXAMPLE CHANNELIZATION (INFORMATIVE) ................................................................................................91
ANNEX H (INFORMATIVE) INTERROGATOR-TO-TAG LINK MODULATION ....................................................94
H.1 BASEBAND WAVEFORMS, MODULATED RF, AND DETECTED WAVEFORMS .........................................................94
ANNEX I (NORMATIVE) ERROR CODES..............................................................................................................95
I.1 TAG ERROR CODES AND THEIR USAGE ...........................................................................................................95
ANNEX J (NORMATIVE) SLOT COUNTER ...........................................................................................................96
J.1 SLOT-COUNTER OPERATION..........................................................................................................................96
ANNEX K (INFORMATIVE) EXAMPLE DATA-FLOW EXCHANGE......................................................................97
K.1 OVERVIEW OF THE DATA-FLOW EXCHANGE ....................................................................................................97
K.2 TAG MEMORY CONTENTS AND LOCK-FIELD VALUES.........................................................................................97
K.3 DATA-FLOW EXCHANGE AND COMMAND SEQUENCE ........................................................................................98
ANNEX L (INFORMATIVE) OPTIONAL TAG FEATURES ....................................................................................99
L.1 OPTIONAL TAG PASSWORDS .........................................................................................................................99
L.2 OPTIONAL TAG MEMORY BANKS AND MEMORY-BANK SIZES .............................................................................99
L.3 OPTIONAL TAG COMMANDS...........................................................................................................................99
L.4 OPTIONAL TAG ERROR-CODE REPORTING FORMAT.........................................................................................99
L.5 OPTIONAL TAG BACKSCATTER MODULATION FORMAT .....................................................................................99
ANNEX M (INFORMATIVE) REVISION HISTORY ...............................................................................................100
© 2004, 2005, 2006, EPCglobal Inc. Page 4 of 100 17 December 2005
Index of Figures
FIGURE 6.1 – PIE SYMBOLS ........................................................................................................................................22
FIGURE 6.2 – INTERROGATOR-TO-TAG RF ENVELOPE ..................................................................................................23
FIGURE 6.3 – INTERROGATOR POWER-UP AND POWER-DOWN RF ENVELOPE .................................................................24
FIGURE 6.4 – R=>T PREAMBLE AND FRAME-SYNC ........................................................................................................25
FIGURE 6.5 – FHSS INTERROGATOR RF ENVELOPE.....................................................................................................26
FIGURE 6.6 – TRANSMIT MASK FOR MULTIPLE-INTERROGATOR ENVIRONMENTS..............................................................27
FIGURE 6.7 – TRANSMIT MASK FOR DENSE-INTERROGATOR ENVIRONMENTS..................................................................27
FIGURE 6.8 – FM0 BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM ........................................................................28
FIGURE 6.9 – FM0 SYMBOLS AND SEQUENCES.............................................................................................................28
FIGURE 6.10 – TERMINATING FM0 TRANSMISSIONS......................................................................................................29
FIGURE 6.11 – FM0 T=>R PREAMBLE .........................................................................................................................29
FIGURE 6.12 – MILLER BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM ..................................................................29
FIGURE 6.13 – SUBCARRIER SEQUENCES ....................................................................................................................30
FIGURE 6.14 – TERMINATING SUBCARRIER TRANSMISSIONS..........................................................................................31
FIGURE 6.15 – SUBCARRIER T=>R PREAMBLE.............................................................................................................31
FIGURE 6.16 – LINK TIMING .........................................................................................................................................34
FIGURE 6.17 – LOGICAL MEMORY MAP .........................................................................................................................35
FIGURE 6.18 – SESSION DIAGRAM ...............................................................................................................................39
FIGURE 6.19 – TAG STATE DIAGRAM ............................................................................................................................42
FIGURE 6.20 – INTERROGATOR/TAG OPERATIONS AND TAG STATE................................................................................43
FIGURE 6.21 – ONE TAG REPLY ..................................................................................................................................45
FIGURE 6.22 – SUCCESSFUL WRITE SEQUENCE ...........................................................................................................59
FIGURE 6.23 – KILL PROCEDURE .................................................................................................................................62
FIGURE 6.24 – LOCK PAYLOAD AND USAGE ..................................................................................................................64
FIGURE 6.25 – ACCESS PROCEDURE ...........................................................................................................................66
FIGURE D.1 – EXAMPLE ALGORITHM FOR CHOOSING THE SLOT-COUNT PARAMETER Q....................................................86
FIGURE E.1 – EXAMPLE OF TAG INVENTORY AND ACCESS.............................................................................................87
FIGURE F.1 – EXAMPLE CRC-5 CIRCUIT ......................................................................................................................88
FIGURE F.2 – EXAMPLE CRC-16 CIRCUIT ....................................................................................................................89
FIGURE G.1 – ALGORITHM FOR DETERMINING CHANNELIZATION AND DENSE-INTERROGATOR-MODE PARAMETERS ...........91
FIGURE G.2 – EXAMPLES OF DENSE-INTERROGATOR-MODE OPERATION........................................................................92
FIGURE G.3 – CHANNEL NUMBERING FOR EXAMPLE 3 ..................................................................................................93
FIGURE H.1 – INTERROGATOR-TO-TAG MODULATION....................................................................................................94
FIGURE J.1 – SLOT-COUNTER STATE DIAGRAM .............................................................................................................96
© 2004, 2005, 2006, EPCglobal Inc. Page 5 of 100 17 December 2005
剩余99页未读,继续阅读
gaolixing2009
- 粉丝: 5
- 资源: 23
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
- 1
- 2
前往页