09.03.2013 Views

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.1 Introduction<br />

CHAPTER 4<br />

ISO 180006-C GENERATION-2 PROTOCOL<br />

A protocol is a language that a machine understands. Protocols are needed in<br />

hardware to achieve coordinated action in the presence of complicating factors such<br />

as communication channels that impose long and possibly varying delays or deliver<br />

messages unreliably or out-of-order, bounded buffers or other scarce resources that<br />

may cause deadlocks, and components that have unpredictable delays and other non-<br />

deterministic behavior [14]. The protocol used in the design is ISO 180006-C class 1<br />

Gen 2 protocol. This was developed at the Auto-ID center at MIT [3]. This standard-<br />

ized for passive UHF RFID systems for communication at 860MHz-960MHz [3]. The<br />

protocol has commands that are used to establish communications between reader<br />

and tag. The interrogator modulates the carrier wave 902MHz-928MHz and the fol-<br />

lowing commands are sent. Based on the commands sent the passive RFID tag will<br />

backscatter and sends commands by further modulating. The UHF band is separated<br />

into various regions around the world. In Europe it is from 865MHz-868MHz with<br />

200 KHz channels, whereas in United States and Canada it is 902MHz-928MHz with<br />

500 KHz channel. [46]<br />

4.2 Reader Protocol Layers<br />

The thesis implements a passive UHF RFID Reader, which reads Class-1 iden-<br />

tity tags. The Class-1 tags are a passive backscatter tags with the following minimum<br />

features:<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!