09.03.2013 Views

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 4.5. Commands [3]<br />

Command Code Length(bits) Required? Protection<br />

QueryRep 00 4 Yes Unique command length<br />

ACK 01 18 Yes Unique command length<br />

Query 1000 22 Yes Unique command length and CRC<br />

QueryAdjust 1001 9 Yes Unique command length<br />

Select 1010 >43 Yes CRC-16<br />

NAK 11000000 8 Yes Unique command length<br />

Table 4.6. Select command [3]<br />

Command Target Action MemBank Pointer Length Mask Truncate CRC-16<br />

# of bits 4 3 2 2 EBV 8 variable 1 16<br />

Description 1010 000:S0 See 00:RFU Starting Mask Mask value 0:Disable<br />

001:S1 Table 4.7 01:OID Mask Length<br />

1:enable<br />

010:S2<br />

10:TID Address (bits)<br />

011:S3<br />

100:SL<br />

101:RFU<br />

110:RFU<br />

111:RFU<br />

11:User<br />

4.3.5.1 Select (Mandatory)<br />

P olynomial = X 5 + X 3 + 1 (4.2)<br />

The Select command implemented by the Reader/Tag selects a particular Tag<br />

population. The Select command comprises of the following bits as shown in Ta-<br />

ble 4.6. Based on the Target, Acton, MemBank, Pointer, Length and Mask fields<br />

the Tag matching and non-matching criteria is specified. The response to the Action<br />

parameters is as shown in Table 4.7.<br />

39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!