09.03.2013 Views

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Select: This is a command used by the Reader to select a user specified group of<br />

Tags from the population. Which is same as selecting records from a database.<br />

• Inventory: The inventory consists of multiple commands. The reader begins<br />

the inventory round by the Query command. This inventory is the core that<br />

identify the tags and request the information from the tag like PC, OID, and<br />

CRC-16.<br />

• Access: The Access also consists of multiple commands. As the name specifies<br />

access consists of set of commands that are used by the reader to access core<br />

information from the tag. Usually it comprises of identifying the tag first and<br />

then the access operation is done.<br />

4.3 Reader Protocol Parameters<br />

In this section we will discuss about the different signal parameters. The de-<br />

tailed discussion of the physical layer in the sections of signaling interface. Which<br />

defines frequencies, modulation, data coding, RF envelope, data rates and the pa-<br />

rameters required for RF communication.<br />

4.3.1 Operational Frequencies<br />

A Reader choses to operate at particular frequency range from 860MHz to<br />

960MHz determined by the local radio regulations and by the local radio regulations<br />

and by the local radio-frequency environment.<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!