BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
4.1 Introduction<br />
CHAPTER 4<br />
ISO 180006-C GENERATION-2 PROTOCOL<br />
A protocol is a language that a machine understands. Protocols are needed in<br />
hardware to achieve coordinated action in the presence of complicating factors such<br />
as communication channels that impose long and possibly varying delays or deliver<br />
messages unreliably or out-of-order, bounded buffers or other scarce resources that<br />
may cause deadlocks, and components that have unpredictable delays and other non-<br />
deterministic behavior [14]. The protocol used in the design is ISO 180006-C class 1<br />
Gen 2 protocol. This was developed at the Auto-ID center at MIT [3]. This standard-<br />
ized for passive UHF RFID systems for communication at 860MHz-960MHz [3]. The<br />
protocol has commands that are used to establish communications between reader<br />
and tag. The interrogator modulates the carrier wave 902MHz-928MHz and the fol-<br />
lowing commands are sent. Based on the commands sent the passive RFID tag will<br />
backscatter and sends commands by further modulating. The UHF band is separated<br />
into various regions around the world. In Europe it is from 865MHz-868MHz with<br />
200 KHz channels, whereas in United States and Canada it is 902MHz-928MHz with<br />
500 KHz channel. [46]<br />
4.2 Reader Protocol Layers<br />
The thesis implements a passive UHF RFID Reader, which reads Class-1 iden-<br />
tity tags. The Class-1 tags are a passive backscatter tags with the following minimum<br />
features:<br />
27