09/30189756 DC : 0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
BS ISO/IEC 18000-3-2 - INFORMATION TECHNOLOGY - RADIO FREQUENCY IDENTIFICATION FOR ITEM MANAGEMENT - PART 3: PARAMETERS FOR AIR INTERFACE COMMUNICATIONS AT 13,56 MHZ
Hardcopy , PDF
11-30-2010
English
Foreword
Introduction
1 Scope
2 Conformance
2.1 Claiming conformance
3 Normative references
4 Terms and definitions
5 Symbols and abbreviated terms
5.1 Symbols
5.2 Abbreviated terms
5.3 Notation
6 Requirements: Physical layer, collision management system
and protocol values for 13,56 MHz systems
6.0 General and applicable to All Modes of this part
of ISO/IEC 18000
6.0.1 Presentation as determined in ISO/IEC 18000-1
6.0.2 ISO/IEC 18000-3 Interoperability
6.0.3 ISO/IEC 18000-3 reader conformance/compliance
6.0.4 ISO/IEC 18000-3 tag compliance
6.0.5 Command structure and extensibility
6.0.6 Mandatory commands
6.0.7 Optional commands
6.0.8 Custom commands
6.0.9 Proprietary commands
6.1 Physical layer, collision management system and protocols
for MODE 1 of this part of ISO/IEC 18000
6.1.1 Read/Write system
6.1.2 Normative Aspects
6.1.3 Conformance and performance measurement aspects
6.1.4 Physical Layer
6.1.5 Protocol and collision management operating method
6.1.6 Commands
6.1.7 Parameter tables for interrogator to tag link
6.1.8 Parameter tables for tag to interrogator link
6.2 MODE 2: Physical layer, collision management system and
protocols for MODE 2 of this part of ISO/IEC 18000
6.2.1 Normative aspects: physical and media access
control (MAC) parameters: interrogator to tag
link
6.2.2 Tag to interrogator link
6.2.3 Description of operating method
6.2.4 Protocol parameters
6.2.5 Description of protocol operating method
6.2.6 Collision management parameters
6.2.7 Description of collision management parameters
operating method (informative)
6.2.8 Tag order sequencing
6.2.9 Commands
6.2.10 Air interface application layer
6.2.11 Optional Functionality
6.3 MODE 3: Physical layer, collision management system and
protocols for MODE 3 of this part of ISO/IEC 18000
6.3.1 Protocol overview
6.3.2 General
6.3.3 EPCglobal HF Version 2: Physical layer, collision
management system and protocols
7 Marking of equipment
Annex A (normative) - MODE 2: Phase jitter modulation (PJM)
Annex B (normative) - MODE 3 Extensible bit vectors (EBV)
Annex C (normative) - Mode 3: State transition tables
C.1 Present state: Ready
C.2 Present state: Arbitrate
C.3 Present state: Reply
C.4 Present state: Acknowledged
C.5 Present state: Open
C.6 Present state: Secured
C.7 Present state: Killed
Annex D (normative) - MODE 3 Command Response Tables
D.1 Command response: Power-up
D.2 Command response: Query
D.3 Command response: QueryRep
D.4 Command response: QueryAdjust
D.5 Command response: ACK
D.6 Command response: NAK
D.7 Command response: Req_RN
D.8 Command response: Select
D.9 Command response: Read
D.10 Command response: Write
D.11 Command response: Kill
D.12 Command response: Lock
D.13 Command response: Access
D.14 Command response: BlockWrite
D.15 Command response: BlockErase
D.16 Command response: BlockPermalock
D.17 Command response: T[2] timeout
D.18 Command response: Invalid command
Annex E (normative) - MODE 3 Error codes
Annex F (normative) - MODE 3 Slot counter
F.1 Slot-counter operation
Annex G (informative) - Known possible interferences between
the MODES determined in this part of ISO/IEC 18000
Annex H (informative) - MODE 3: PJM modulation
Annex I (informative) - Cyclic Redundancy Check (CRC) (16 bit)
I.1 The CRC error detection method
I.2 CRC calculation example
Annex J (informative) - Cyclic redundancy check (CRC)
mode 2 (32 bit)
J.1 The CRC 32 error detection method
J.2 CRC 32 calculation example
J.3 Practical example of CRC 32 calculation
Annex K (informative) - MODE 3 Example slot-count (Q)
selection algorithm
K.1 Example algorithm an interrogator might use to
choose Q
Annex L (informative) - MODE 3 Example of tag inventory and
access
L.1 ASK Method: Example inventory and access of a single
tag
L.2 PJM Method: Example inventory and access of a single or
multiple tags
Annex M (informative) - MODE 3 Calculation of 5-bit and 16-bit
cyclic redundancy checks
M.1 Example CRC-5 encoder/decoder
M.2 Example CRC-16 calculations
M.3 Example CRC-16c encoder/decoder
Annex N (informative) - MODE 3 ASK Method: Interrogator-to-tag
link modulation
N.1 Baseband waveforms, modulated RF, and detected waveforms
Annex O (informative) - MODE 3 Example data flow exchange
O.1 Overview of the data-flow exchange
O.2 Tag memory contents and lock-field values
O.3 Data-flow exchange and command sequence
Annex P (informative) - MODE 3 Optional Tag Features
P.1 Optional Tag passwords
P.2 Optional Tag memory banks and memory-bank sizes
P.3 Optional Tag commands
P.4 Optional Tag error-code reporting format
P.5 Optional Tag functionality
P.6 Optional Tag Feature
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.