Execution Time Analysis of a Gen-2 Remote Computer  

Execution Time Analysis of a Gen-2 Remote Computer

在线阅读下载全文

作  者:Ajay Ogirala Archana Murari Peter Hawrylak Marlin Mickle 

机构地区:[1]Department of Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA 15261, USA

出  处:《Computer Technology and Application》2011年第2期94-101,共8页计算机技术与应用(英文版)

摘  要:The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program.

关 键 词:Radio Frequency Identification (RFID) Gen 2 Gen 2 simulator Gen 2 parameter configuration Gen 2 commandconfiguration. 

分 类 号:TP393[自动化与计算机技术—计算机应用技术] TP311[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象