物联网:从RFID到下一代普及型网络系统(英语)

上传人:lizhe****0001 文档编号:47856206 上传时间:2018-07-05 格式:PDF 页数:332 大小:3.41MB
返回 下载 相关 举报
物联网:从RFID到下一代普及型网络系统(英语)_第1页
第1页 / 共332页
物联网:从RFID到下一代普及型网络系统(英语)_第2页
第2页 / 共332页
物联网:从RFID到下一代普及型网络系统(英语)_第3页
第3页 / 共332页
物联网:从RFID到下一代普及型网络系统(英语)_第4页
第4页 / 共332页
物联网:从RFID到下一代普及型网络系统(英语)_第5页
第5页 / 共332页
点击查看更多>>
资源描述

《物联网:从RFID到下一代普及型网络系统(英语)》由会员分享,可在线阅读,更多相关《物联网:从RFID到下一代普及型网络系统(英语)(332页珍藏版)》请在金锄头文库上搜索。

1、 THE INTERNET OF THINGSAUERBACH PUBLICATIONS? ? ?Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications ? ?Wireless Quality-of-Service: Techniques, Standards and Applications ? ?Broadband Mobile Multimedia: Techniques and Applications ? ?The Internet of T

2、hings: From RFID to the Next-Generation Pervasive Networked Systems ? ?Millimeter Wave Technology in Wireless PAN, LAN, and MAN ? ?Security in Wireless Mesh Networks ? ?Resource, Mobility and Security Management in Wireless Networks and Mobile Communications ? ?Wireless Mesh Networking: Architecture

3、s, Protocols and Standards ? ?Mobile WIMAX: Toward Broadband Wireless Metropolitan Area Networks ? ?Distributed Antenna Systems: Open Architecture for Future Wireless Communications ? ? ? ?WIRELESS NETWORKS AND MOBILE COMMUNICATIONSNew York LondonTHE INTERNET OF THINGSFrom RFID to the Next-Generatio

4、n Pervasive Networked SystemsEdited by Lu Yan s Yan Zhang Laurence T. Yang s Huansheng NingAuerbach Publications Taylor 8) Includes bibliographical references and index. ISBN 978-1-4200-5281-7 (alk. paper) 1. Ubiquitous computing. 2. Radio frequency identification systems. 3. Wireless communication

5、systems. I. Yan, Lu. II. Title. III. Series.QA76.5915.I68 2008 384.5-dc222007047411Visit the Taylor ISO 18000-6C. The EPC Gen-2 protocol is based on a masterslave-style architecture, with the interrogators acting as the masters and the tags acting as the slaves. The inter- rogators initiate all comm

6、unication and actually provide the power for the tags to operate. The Gen-2 protocol is half-duplex. Three major steps are required for an interrogator to access a tag. First, the interrogator must issue a Select command to pick the tag population to which it wishes to communicate. This feature of t

7、he Select command allows the interrogator to divide up a group of tags into smaller subgroups to reduce collisions, and reducing the time required to access one or more tags. Second, the interrogator must take an inventory to determine the EPC numbers of all tags in a given population. The Query (is

8、sued only once at the begin- ning of the inventory) and QueryRep commands are the main commands used to obtain this information. When receiving a Query command, each tag selects a random number for the initial slot value and beings reducing it according to thestandardspecifications.Iftheslotvalueis0

9、,thetagwillrespondtransmittinga16-bitrandom number uniquely identifying a tag within statistical parameters specified by the protocol. The interrogator then issues an ACK (acknowledgment) with the tags 16-bit random number, causing the tag to transmit its protocol control,18?The Internet of ThingsEP

10、C number, and cyclic redunancy check (CRC) values to the interrogator. The CRC value is used to detect errors, possibly from interference, present in a received message. The QueryRep command is a repeated query causing all tags that have not yet responded with their 16-bit random number to decrement

11、 their slot value by 1. If the slot value is 0, the tag will reply with its 16-bit random number and the interrogator will ACK that tag and obtain the protocol control, EPC number, and CRC values. Third, after obtaining the protocol control, EPC number, and CRC values the interrogator can communicat

12、e directly with the tag to perform more complex operations, such as reading or writing memory, locking or unlocking the tag, or killing the tag.The physical link from the interrogator to the tag can function at different bit rates. Bit rates from 26.7 kbps up to 640 kbps are possible. This allows in

13、terrogators to communicate quickly with a tag under more favorable conditions, or slower to accommodate slower tags or in poor conditions. The variable data rate allowed in Gen-2 is an improvement over many Gen-1 systems, which supported only a single data rate preventing Gen-1 systems from adapting

14、 to the current environment 6. Variable data rates are useful in allowing for the worldwide operation of the Gen-2 protocol. For example, the regulations governing RF transmission require that interrogators listen to ensure the channel is clear before transmitting, reduc- ing the maximum data rate between the in

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 学术论文 > 其它学术论文

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号