BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
• Select: This is a command used by the Reader to select a user specified group of<br />
Tags from the population. Which is same as selecting records from a database.<br />
• Inventory: The inventory consists of multiple commands. The reader begins<br />
the inventory round by the Query command. This inventory is the core that<br />
identify the tags and request the information from the tag like PC, OID, and<br />
CRC-16.<br />
• Access: The Access also consists of multiple commands. As the name specifies<br />
access consists of set of commands that are used by the reader to access core<br />
information from the tag. Usually it comprises of identifying the tag first and<br />
then the access operation is done.<br />
4.3 Reader Protocol Parameters<br />
In this section we will discuss about the different signal parameters. The de-<br />
tailed discussion of the physical layer in the sections of signaling interface. Which<br />
defines frequencies, modulation, data coding, RF envelope, data rates and the pa-<br />
rameters required for RF communication.<br />
4.3.1 Operational Frequencies<br />
A Reader choses to operate at particular frequency range from 860MHz to<br />
960MHz determined by the local radio regulations and by the local radio regulations<br />
and by the local radio-frequency environment.<br />
29