11.08.2015 Views

GS1 EPC Tag Data Standard 1.6 - Indicod-Ecr

GS1 EPC Tag Data Standard 1.6 - Indicod-Ecr

GS1 EPC Tag Data Standard 1.6 - Indicod-Ecr

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580An EBV is an array of blocks. Each block contains a single extension bit followed by aspecific number of data bits. If B is the total number of bits in one block, then a blockcontains B The notation EBV-n used in this specification indicates an EBVwith a block size of n; e.g., EBV-8 denotes an EBV with B=8.The data value represented by an EBV is simply the bit string formed by the data bits asread from left to right, ignoring all extension bits. The last block of an EBV has anextension bit of zero, and all blocks of an EBV preceding the last block (if any) have anextension bit of one.The following table illustrates different values represented in EBV-6 format and EBV-8format. Spaces are added to the EBVs for visual clarity.Value EBV-6 EBV-80 000000 000000001 000001 0000000131 (2 5 011111 0001111132 (2 5 ) 100001 000000 0010000033 (2 5 +1) 100001 000001 00100001127 (2 7 100011 011111 01111111128 (2 7 ) 100100 000000 10000001 00000000129 (2 7 +1) 100100 000001 10000001 0000000116384 (2 14 ) 110000 100000 000000 10000001 10000000 00000000The Packed Objects specification in Appendix I makes use of EBV-3, EBV-6, and EBV-8.Appendix E (non-normative) Examples: <strong>EPC</strong>Encoding and DecodingThis section presents two detailed examples showing encoding and decoding between theSerialized Global Identification Number (SGTIN) and the <strong>EPC</strong> memory bank of a Gen 2RFID tag, and summary examples showing various encodings of all <strong>EPC</strong> schemes.As these are merely illustrative examples, in all cases the indicated normative sections ofthis specification should be consulted for the definitive rules for encoding and decoding.The diagrams and accompanying notes in this section are not intended to be a completespecification for encoding or decoding, but instead serve only to illustrate the highlightsof how the normative encoding and decoding procedures function. The procedures forencoding other types of identifiers are different in significant ways, and the appropriatesections of this specification should be consulted.Copyright ©2005- 2011 <strong>GS1</strong> AISBL, All Rights Reserved. Page 142 of 218

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!