Execution Time Analysis of a Gen-2 Remote Computer

Ogirala, Ajay; Murari, Archana; Hawrylak, Peter; Mickle, Marlin
February 2011
Computer Technology & Application;2011, Vol. 2 Issue 2, p94
Academic Journal
The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the Gen 2 protocol. The selection of the parameter and command configuration within the protocol limitations is critical especially if the time available for the memory operations in a passive RFID system is limited. An effort is made to map the operation of the tag not in its states of operation as elaborately explained in the protocol but rather in its elementary format. The research reported in this article identifies all the parameters that affect the dynamic operation of the tag. The operation is further divided into singulation, read and write; identifying the significant parameters in each case. The choices of the different commands that can be adopted to perform identical operations on the tag are analyzed. The elements to consider in selecting the optimum command configuration are described. The impact of the different parameter and command configuration on the singulation, read and write time is calculated and recorded using a tested Gen 2 simulator program.


Related Articles

  • Getting Around the Technical Issues with Battery-Assisted UHF RFID Tags. Müller, Simon // Wireless Design & Development;Feb2008, Vol. 16 Issue 2, p28 

    The article focuses on the technical issues with battery-assisted ultra-high frequency radio-frequency identification tags. According to the author, battery-assisted passive (BAP) tags replete the gap between purely passive tags and the more costly active tags. Since BAP tags do not actively...


    The article focuses on the expansion of the global market for radio frequency identification (RFID) which provide real benefits across multiple application areas at lower cost in the U.S. According to the author, the benefit of short-range wireless communication is driving the growth of near...

  • X-CleLo: intelligent deterministic RFID data and event transformer. Darcy, Peter; Stantic, Bela; Sattar, Abdul // Personal & Ubiquitous Computing;Mar2012, Vol. 16 Issue 3, p259 

    Recently, passive Radio Frequency Identification (RFID) systems have received an increased amount of attention as researchers have worked to implement a stable and reliable system. Unfortunately, despite vast improvements in the quality of RFID technology, a significant amount of erroneous data...

  • Radio frequency identification: technologies, applications, and research issues. Xiao, Yang; Yu, Senhua; Wu, Kui; Ni, Qiang; Janecek, Christopher; Nordstad, Julia // Wireless Communications & Mobile Computing;May2007, Vol. 7 Issue 4, p457 

    A radio frequency identification (RFID) system is a special kind of sensor network to identify an object or a person using radio frequency transmission. A typical RFID system includes transponders (tags) and interrogators (readers): tags are attached to objects/persons, and readers communicate...

  • The Five Stage RFID. Blanchard, David // Industry Week/IW;Jan2009, Vol. 258 Issue 1, p50 

    The article focuses on the concept of radio frequency identification (RFID). These were synonymous with retail giant Wal-Mart's RFID initiatives. RFID has the notoriety of being both a mature technology and an emerging technology (most of the current interest among manufacturers dates back only...

  • Curved RFID tags for metallic gas cylinders. Ziai, M. A.; Batchelor, J. C. // Electronics Letters;8/13/2009, Vol. 45 Issue 17, p867 

    Presented is a radio frequency identification (RFID) tag antenna designed to fit around the neck of a small gas cylinder and capable of operation at the European and American UHF RFID bands. The design is readable from all directions in the plane of the cylinder neck and is mounted on cheap...

  • Tag Content Access Control with Identity-based Key Exchange. Liang Yan; Rong, Chunming // AIP Conference Proceedings;9/30/2010, Vol. 1281 Issue 1, p297 

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol...

  • Improve Mobile and Ubiquitous Learning with a Self-Propelled Toy Car Based Learning System. Li-Der Chou; Tzu-Chien Liu; Chunhu Li, David; Chen-Ming Lin; Yi-Chun Lin // International Journal of Computer Theory & Engineering;Aug2012, Vol. 4 Issue 4, p651 

    How to improve mobile and ubiquitous learning with an innovative approach is a challenge task. To achieve this objective, we designed and implemented a self-propelled toy car based learning system. Our new learning system integrated various advanced technologies such as the Radio Frequency...

  • Realization of Low Frequency Wakeup in Tire Encoded Radio Frequency Identification System. Weidong Yang; Li Li; Kai Peng // Applied Mechanics & Materials;2014, Issue 556-562, p2895 

    In car tires coded identification system, radio frequency technology plays a vital role, the key to radio frequency signals transmitted process is waveform modulation. The key of adjusting the waveform is how to match its resistor and capacitor easily. In the paper their resistance and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics