没有合适的资源?快使用搜索试试~ 我知道了~
ISO IEC 18000-3-2010.pdf
需积分: 34 11 下载量 200 浏览量
2022-07-07
15:17:04
上传
评论
收藏 1.84MB PDF 举报
温馨提示
试读
176页
iso iec 18000-3-2010协议文本 1,provide a framework to define common communications protocols for Internationally useable frequencies for radio frequency identification (RFID), and, where possible, to determine the use of the same protocols for all frequencies such that the problems of migrating from one to another are diminished; 2,minimize software and implementation costs; 3,enable system management and control and information exchange to be common as far as is possible.
资源详情
资源评论
资源推荐
Please see the administrative notes on page iii
RECIPIENTS OF THIS DRAFT ARE INVITED TO
SUBMIT, WITH THEIR COMMENTS, NOTIFICATION
OF ANY RELEVANT PATENT RIGHTS OF WHICH
THEY ARE AWARE AND TO PROVIDE SUPPORT-
ING DOCUMENTATION.
IN ADDITION TO THEIR EVALUATION AS
BEING ACCEPTABLE FOR INDUSTRIAL, TECHNO-
LOGICAL, COMMERCIAL
A
ND USER PURPOSES,
DRAFT INTERNATIONAL STANDARDS MAY ON
OCCASION HAVE TO BE CONSIDERED IN THE
LIGHT OF THEIR POTENTIAL TO BECOME STAN-
DARDS TO WHICH REFERENCE MAY BE MADE IN
NATIONAL REGULATIONS.
Reference number
ISO/IEC FDIS 18000-3:2010(E)
©
ISO/IEC 2010
FINAL
DRAFT
ISO/IEC JTC 1
Secretariat: ANSI
Voting begins on:
2010-08-24
Voting terminates on:
2010-10-24
INTERNATIONAL
STANDARD
ISO/IEC
FDIS
18000-3
Information technology — Radio
frequency identification for item
management —
Part 3:
Parameters for air interface
communications at 13,56 MHz
Technologies de l'information — Identification par radiofréquence
(RFID) pour la gestion d'objets —
Partie 3: Paramètres de communications d'une interface d'air à
13,56 MHz
ISO/IEC FDIS 18000-3:2010(E)
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
Copyright notice
This ISO document is a Draft International Standard and is copyright-protected by ISO. Except as permitted
under the applicable laws of the user's country, neither this ISO draft nor any extract from it may be
reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic,
photocopying, recording or otherwise, without prior written permission being secured.
Requests for permission to reproduce should be addressed to either ISO at the address below or ISO's
member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Reproduction may be subject to royalty payments or a licensing agreement.
Violators may be prosecuted.
ii
© ISO/IEC 2010 – All rights reserved
ISO/IEC FDIS 18000-3:2010(E)
© ISO/IEC 2010 – All rights reserved iii
In accordance with the provisions of Council Resolution 21/1986, this document is circulated in the
English language only.
ISO/IEC FDIS 18000-3:2010(E)
iv © ISO/IEC 2010 – All rights reserved
Contents Page
Foreword........................................................................................................................................................... vii
Introduction ..................................................................................................................................................... viii
1 Scope ......................................................................................................................................................1
2 Conformance..........................................................................................................................................1
3 Normative references ............................................................................................................................1
4 Terms and definitions ...........................................................................................................................2
5 Symbols and abbreviated terms ..........................................................................................................3
5.1 Symbols ..................................................................................................................................................3
5.2 Abbreviated terms .................................................................................................................................4
5.3 Notation ..................................................................................................................................................5
6 Requirements: Physical layer, collision management system and protocol values for
13,56 MHz systems ................................................................................................................................6
6.0 General and applicable to All Modes...................................................................................................6
6.0.1 Presentation as determined in ISO/IEC 18000-1.................................................................................6
6.0.2 ISO/IEC 18000-3 Interoperability ..........................................................................................................6
6.0.3 ISO/IEC 18000-3 interrogator conformance/compliance ...................................................................6
6.0.4 ISO/IEC 18000-3 tag compliance ..........................................................................................................6
6.0.5 Command structure and extensibility .................................................................................................6
6.0.6 Mandatory commands...........................................................................................................................6
6.0.7 Optional commands ..............................................................................................................................7
6.0.8 Custom commands................................................................................................................................7
6.0.9 Proprietary commands..........................................................................................................................7
6.1 Physical layer, collision management system and protocols for MODE 1......................................7
6.1.1 Read/Write system.................................................................................................................................7
6.1.2 Normative Aspects ................................................................................................................................7
6.1.3 Conformance and performance measurement aspects ....................................................................7
6.1.4 Physical Layer........................................................................................................................................7
6.1.5 Protocol and collision management operating method ....................................................................7
6.1.6 Commands .............................................................................................................................................8
6.1.7 Parameter tables for interrogator to tag link ......................................................................................8
6.1.8 Parameter tables for tag to interrogator link ....................................................................................11
6.2 MODE 2: Physical layer, collision management system and protocols for MODE 2....................14
6.2.1 Normative aspects: physical and media access control (MAC) parameters: interrogator to
tag link ..................................................................................................................................................15
6.2.2 Tag to interrogator link .......................................................................................................................17
6.2.3 Description of operating method .......................................................................................................20
6.2.4 Protocol parameters ............................................................................................................................25
6.2.5 Description of protocol operating method........................................................................................25
6.2.6 Collision management parameters ....................................................................................................41
6.2.7 Description of collision management parameters operating method (informative).....................41
6.2.8 Tag order sequencing .........................................................................................................................49
6.2.9 Commands ...........................................................................................................................................49
6.2.10 Air interface application layer ............................................................................................................49
6.2.11 Optional Functionality.........................................................................................................................49
6.3 MODE 3: Physical layer, collision management system and protocols for MODE 3....................52
6.3.1 Protocol overview ................................................................................................................................52
6.3.2 General..................................................................................................................................................52
6.3.3 Physical layer, collision management system and protocols ........................................................53
ISO/IEC FDIS 18000-3:2010(E)
© ISO/IEC 2010 – All rights reserved
v
7 Marking of equipment .......................................................................................................................124
Annex A (informative) MODE 1: mandatory and optional commands required to support the
ISO/IEC 15962 data protocol.............................................................................................................125
Annex B (informative) MODE 2 and MODE 3: Phase Jitter Modulation.....................................................126
Annex C (normative) MODE3: State transition tables .................................................................................129
C.1 Present state: Ready .........................................................................................................................129
C.2 Present state: Arbitrate.....................................................................................................................130
C.3 Present state: Reply ..........................................................................................................................131
C.4 Present state: Acknowledged ..........................................................................................................132
C.5 Present state: Open...........................................................................................................................133
C.6 Present state: Secured......................................................................................................................134
C.7 Present state: Killed (optional) ........................................................................................................136
Annex D (normative) MODE 3: Command Response Tables .......................................................................137
D.1 Command response: Power-up .......................................................................................................137
D.2 Command response: BeginRound ...............................................................................................137
D.3 Command response: NextSlot.......................................................................................................138
D.4 Command response: ResizeRound..............................................................................................138
D.5 Command response: ACK................................................................................................................138
D.6 Command response: NAK................................................................................................................139
D.7 Command response: Req_RN........................................................................................................139
D.8 Command response: Select ...........................................................................................................139
D.9 Command response: Read .............................................................................................................140
D.10 Command response: Write...............................................................................................................140
D.11 Command response: Kill ..................................................................................................................141
D.12 Command response: Lock ...............................................................................................................141
D.13 Command response: Access ...........................................................................................................142
D.14 Command response: BlockWrite .....................................................................................................142
D.15 Command response: BlockErase ....................................................................................................142
D.16 Command response: BlockPermalock............................................................................................143
D.17 Command response: T
2
timeout ......................................................................................................143
D.18 Command response: Invalid command ..........................................................................................144
Annex E (normative) MODE 3: Error codes.................................................................................................145
Annex F (normative) MODE 3: Slot counter .................................................................................................146
F.1 Slot-counter operation ......................................................................................................................146
Annex G (informative) MODE 3: Example slot-count (Q) selection algorithm..........................................147
G.1 Example algorithm an interrogator might use to choose Q..........................................................147
Annex H (informative) MODE 3: Example of tag inventory and access ....................................................148
H.1 ASK Method: Example inventory and access of a single tag .......................................................148
H.2 PJM Method: Example inventory and access of a single or multiple tags..................................149
Annex I (informative) MODE 3: Calculation of 5-bit and 16-bit cyclic redundancy checks .....................150
I.1 Example CRC-5 encoder/decoder....................................................................................................150
I.2 Example CRC-16 calculations ..........................................................................................................151
I.3 Example CRC-16c encoder/decoder................................................................................................151
Annex J (informative) MODE 3: ASK Method: Interrogator-to-tag link modulation .................................152
J.1 Baseband waveforms, modulated RF, and detected waveforms .................................................152
Annex K (informative) MODE 3: Example data flow exchange...................................................................153
K.1 Overview of the data-flow exchange ...............................................................................................153
K.2 Tag memory contents and lock-field values...................................................................................153
K.3 Data-flow exchange and command sequence................................................................................154
Annex L (informative) MODE 3: Tag Features..............................................................................................155
L.1 Optional Tag passwords...................................................................................................................155
L.2 Optional Tag memory banks and memory-bank sizes ..................................................................155
L.3 Optional Tag commands...................................................................................................................155
L.4 Optional Tag error-code reporting format ......................................................................................155
剩余175页未读,继续阅读
joy_v
- 粉丝: 89
- 资源: 82
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0