期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Execution Time Analysis of a Gen-2 Remote Computer
1
作者 Ajay Ogirala Archana Murari +1 位作者 peter hawrylak Marlin Mickle 《Computer Technology and Application》 2011年第2期94-101,共8页
The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be cons... The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program. 展开更多
关键词 Radio Frequency Identification (RFID) Gen 2 Gen 2 simulator Gen 2 parameter configuration Gen 2 commandconfiguration.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部