Ensyc Technologies RF24BLK UHF (900 MHz) RFID Reader User Manual RF2400 Spec rev1 0 071128

Ensyc Technologies UHF (900 MHz) RFID Reader RF2400 Spec rev1 0 071128

User Manual

 ________________________________________________________________________  - CONFIDENTIAL - 3/30/2008     RFID UHF Short Range Controller  RF2400 Product Specification        Revision 1.0           Prepared by: Synergy Technology, Inc. & Synaptec Enterprises, Inc. Author: Richard L. Hicksted & Michael A. Spahr
 ________________________________________________________________________  - CONFIDENTIAL - 3/30/2008 LEGAL NOTICES Copyright © 2007 Ensyc Technologies.  All rights reserved. Ensyc  Technologies  maintains  intellectual  property  rights  pertaining  to  technology incorporated  in the product(s) described in this document; including without limitation certain patent rights or patent pending applications in the U.S. and other countries This  document  and  related  product(s)  are  distributed  under  licenses  restricting  use, copying,  distribution,  and  decompilation.    No  part  of  this  documentation  may  be reproduced without prior written consent of Ensyc Technologies  FCC COMPLIANCE Every effort has been made to design and manufacture this product in accordance with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules.  These limits are  designed  to  limit  interference  when  the  equipment  is  used  in  a  commercial environment.  The related equipment generates, uses, and radiates radio frequency energy and  if  not  installed  and  used  in  accordance  with  this  specification  may cause  harmful interference with radio communications.  Operation in a residential area is likely to result in interference in which case the user will be required to correct the interference at his expense. It  is  the  responsibility  on  an  OEM  to  obtain  certification  to  operate  per  FCC  Part  15 Subpart  A  Section  15.21  regulations  for  the  entire  system  into  which  this  product  is installed.  FCC RF RADIATION EXPOSURE STATEMENT: The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.  End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance.
 ________________________________________________________________________  - CONFIDENTIAL - 3/30/2008  NOTE   Part 15.21 Changes  or  modifications  not  expressly  approved  by  the party  responsible  for  compliance  could  void  the  user’s authority to operate the equipment.   NOTE:    The  manufacturer  is  not  responsible  for  any  radio or TV interference caused by unauthorized modifications to this  equipment.    Such  modifications  could  void  the  user’s authority to operate the equipment.
 ________________________________________________________________________    PRODUCT SPECIFICATION     i   Table of Contents  1 Scope...................................................................................................................................................1 2 Revision History..................................................................................................................................3 3 Reference Documents .........................................................................................................................5 3.1 Specifications & Requirements .........................................................................................5 3.2 Reference Material ............................................................................................................5 4 Overview.............................................................................................................................................7 4.1 DSP Processor...................................................................................................................8 4.2 Transmitter Circuitry.........................................................................................................8 4.3 Receiver Circuitry .............................................................................................................9 4.4 User Interface ....................................................................................................................9 4.5 Power Regulation ..............................................................................................................9 4.6 Battery Operation ..............................................................................................................9 5 Functional Description........................................................................................................................11 5.1 Host Protocol.....................................................................................................................11 5.1.1 Message Format...............................................................................................11 5.1.1.1 Message Packet Format.................................................................12 5.1.1.2 Host-to-Reader Payload.................................................................12 5.1.1.3 Reader-to-Host Payload.................................................................13 5.1.1.4 Response Data Formats .................................................................15 5.1.1.4.1 Simple Command Response ........................................15 5.1.1.4.2 Low-Level Command Response..................................15 5.1.1.4.3 Error Response.............................................................15 5.1.2 Reader Commands...........................................................................................16 5.1.2.1 Get Firmware Version (0x00)........................................................16 5.1.2.2 Set Baud Rate (0x03).....................................................................17 5.1.2.3 Set IO Port Value (0x05)...............................................................17 5.1.2.4 Get IO Port Value (0x06) ..............................................................18 5.1.2.5 Get Reader Status (0x0F) ..............................................................18 5.1.2.6 Get Reader Hardware Information (0x11).....................................19 5.1.2.7 Set Reader Hardware Information (0x13) .....................................20 5.1.2.7.1 Paper Sensor Triggered Read ......................................21 5.1.2.8 Set Bi-Directional I/O DDR (0x16)...............................................22 5.1.2.9 Get Bi-Directional I/O DDR (0x17)..............................................22 5.1.3 Tag Commands................................................................................................23 5.1.3.1 Sleep Tag (0x21) ...........................................................................23 5.1.3.2 Get Tag ID (0x24) .........................................................................23 5.1.3.3 Auto Get Tag ID (0x26) ................................................................24 5.1.3.4 Dump ID Data (0x28)....................................................................25 5.1.3.5 Get Raw Tag ID (0x3E).................................................................26 5.1.3.6 Program Tag (0x50).......................................................................27 5.1.3.7 Erase Tag (0x51) ...........................................................................28 5.1.3.8 Kill Tag (0x52) ..............................................................................29 5.1.3.9 Lock Tag (0x53)............................................................................30 5.1.3.10 Program Tag Init (0x54)................................................................31 5.1.3.11 LockG2 (0x55) ..............................................................................32 5.1.3.12 Access G2 (0x56) ..........................................................................34 5.1.3.13 Read Tag Memory (0x57) .............................................................35 5.1.3.14 Write Tag Memory (0x58).............................................................36 5.2 Service Port Commands ....................................................................................................37 5.2.1 Standard Commands........................................................................................37 5.2.1.1 Baud Rate (baud) command ..........................................................37
 ________________________________________________________________________    PRODUCT SPECIFICATION     ii   5.2.1.2 Transmit Power Step (Txp[0-3]) command...................................37 5.2.1.3 Receive Threshold (rxt) command ................................................38 5.2.1.4 Phase (phs) command....................................................................38 5.2.1.5 Tag Class (tc) command ................................................................39 5.2.1.6 Read Retry (rrty) command...........................................................39 5.2.1.7 Read Tag (rt) command.................................................................39 5.2.1.8 Read Loop (rl) command...............................................................39 5.2.1.9 Sequential Loop (sl) command......................................................40 5.2.1.10 Write Tag (wt) command...............................................................40 5.2.1.11 Lock Tag (lt) command .................................................................40 5.2.1.12 Lock Tag G2 (l2) command...........................................................41 5.2.1.13 Access (apw)..................................................................................41 5.2.1.14 Kill Tag (kt) command...................................................................41 5.2.1.15 Quiet Tag (qt) command................................................................41 5.2.1.16 Erase Tag (et) command................................................................42 5.2.1.17 Paper Sensor Triggered Read (pstr) command..............................42 5.2.1.18 Paper Sensor (ps) command ..........................................................42 5.2.1.19 Paper Sensor Threshold (pst) command........................................43 5.2.1.20 Auto Read Tag (art) command......................................................43 5.2.1.21 Dump ID Data (did) command......................................................44 5.2.1.22 Program Flash (pf) command ........................................................44 5.2.1.23 Speaker Test (st) command............................................................44 5.2.1.24 Beep (beep) command ...................................................................45 5.2.1.25 Set EEPROM Defaults (eedef) command......................................45 5.2.1.26 Read EEPROM (ree) command.....................................................45 5.2.1.27 No initial message (noim) command .............................................45 5.2.1.28 Diagnostic (di) command ..............................................................46 5.2.1.29 Ignore CRC (icrc) command .........................................................48 5.2.1.30 Exit (exit) command.......................................................................48 5.2.1.31 Display menu (??) command.........................................................48 5.2.1.32 Standard command summary.........................................................49 5.2.2 Protected Commands.......................................................................................50 5.2.2.1 Password (pw) command...............................................................50 5.2.2.2 Transmit power (txp) command.....................................................50 5.2.2.3 Maximum transmit power (txpmax) command..............................50 5.2.2.4 Minimum transmit power (txpmin) command ...............................50 5.2.2.5 Channel select (chan) command....................................................51 5.2.2.6 Hop (hop) command......................................................................52 5.2.2.7 Gen2 Read (g2r) command ...........................................................52 5.2.2.8 Gen2 Write (g2w) command .........................................................52 5.2.2.9 Transmit zeros (t0) command........................................................52 5.2.2.10 Transmit ones (t1) command .........................................................53 5.2.2.11 Transmit alternating (ta) command ...............................................53 5.2.2.12 Transmit random (tr) command.....................................................53 5.2.2.13 Transmit data (td) command..........................................................53 5.2.2.14 Carrier on (con) command.............................................................54 5.2.2.15 Carrier off (coff) command............................................................54 5.2.2.16 Localization (local) command.......................................................54 5.2.2.17 Chipcon register read (ccr) command............................................54 5.2.2.18 Chipcon register write (ccw) command .........................................54 5.2.2.19 Protected command summary........................................................55 5.2.3 Service port error codes...................................................................................56 5.3 Radio Frequency Interface ................................................................................................57
 ________________________________________________________________________    PRODUCT SPECIFICATION     iii   5.3.1 Auto-ID Class 1...............................................................................................57 5.3.1.1 Class 1 Reader-Tag RF communications.......................................57 5.3.1.2 Class 1 Tag-Reader RF communications.......................................58 5.3.2 Class 1 – Gen 2................................................................................................59 5.3.2.1 Gen 2 Reader-Tag RF communications.........................................59 5.3.2.2 Gen 2 Tag-Reader RF communications.........................................60 5.4 Logical Structures and Data content..................................................................................62 5.4.1 Gen 2 Tag Structures and Data content...........................................................62 5.5 Autonomous Operation .....................................................................................................63 6 Hardware Description .........................................................................................................................65 6.1 Host Communication Interface..........................................................................................66 6.2 DSP Processor...................................................................................................................67 6.3 EEPROM...........................................................................................................................67 6.4 Transmitter/VCO...............................................................................................................68 6.5 Power Splitter....................................................................................................................68 6.6 Power Amplifier................................................................................................................68 6.7 PA Modulation ..................................................................................................................68 6.8 Directional Coupler/RF FIlter ...........................................................................................69 6.9 Selectable LC Phase Delay/Mixer.....................................................................................69 6.10 Base-band Amplifier .........................................................................................................69 6.11 General Purpose Digital I/O Port ......................................................................................70 6.12 Digital I/O Interface ..........................................................................................................71 6.13 Buzzer Circuit....................................................................................................................72 6.14 Optical Sensor Interface....................................................................................................72 6.15 Power Regulators ..............................................................................................................73 7 Specifications ......................................................................................................................................75 7.1 Electrical Specifications....................................................................................................75 7.1.1 RF Interface.....................................................................................................75 7.1.2 Communications Interface...............................................................................75 7.1.3 Power Supply ..................................................................................................75 7.1.4 Battery (optional).............................................................................................76 7.2 Environmental Specifications............................................................................................76 7.3 Mechanical Specifications.................................................................................................76 7.4 I/O Connectors ..................................................................................................................77
 ________________________________________________________________________    PRODUCT SPECIFICATION     iv   Figures Figure 4-1 RF2400 Block Diagram __________________________________________________ 7 Figure 5-1 Message Packet Format _________________________________________________ 12 Figure 5-2 Host to Reader Payload Format___________________________________________ 12 Figure 5-3 Reader to Host Payload Format___________________________________________ 13 Figure 5-4 Low-Level Command Response ___________________________________________ 15 Figure 5-5  Class 1 Reader Modulation Timing for Binary 0______________________________ 58 Figure 5-6 Class 1 Reader Modulation Timing for Binary 1 ______________________________ 58 Figure 5-7 Class 1 Tag to Reader Encoding __________________________________________ 59 Figure 5-8 Gen 2 Reader to Tag PIE Encoding ________________________________________ 60 Figure 5-9 Gen2 Tag to Reader Encoding ____________________________________________ 61 Figure 6-1 Host Interface _________________________________________________________ 66 Figure 6-2 Digital I/O Port________________________________________________________ 70 Figure 6-3 Digital I/O Interface ____________________________________________________ 71 Figure 6-4 Buzzer Circuit_________________________________________________________ 72 Figure 6-5 Optical Sensor Interface_________________________________________________ 72 Figure 6-6 Main Power 4.2V Regulator______________________________________________ 73 Figure 6-7 +3.3V and +1.8V Regulator______________________________________________ 73 Figure 7-1 RF2400 Mechanical Assembly ____________________________________________ 78
 ________________________________________________________________________    PRODUCT SPECIFICATION     v   Tables Table 5-1  Message Encapsulation Characters ________________________________________ 12 Table 5-2  Command/Response Payload Fields _______________________________________ 13 Table 5-3  Communication Codes __________________________________________________ 14 Table 5-4  Low-Level Response Fields ______________________________________________ 15 Table 5-5  Get Firmware Version __________________________________________________ 16 Table 5-6  Set Baud Rate _________________________________________________________ 17 Table 5-7  Set IO Port Value ______________________________________________________ 17 Table 5-8  Get IO Port Value______________________________________________________ 18 Table 5-9  Get Reader Status ______________________________________________________ 18 Table 5-10  Get Reader Hardware Information_________________________________________ 19 Table 5-11  Set Reader Hardware Information _________________________________________ 20 Table 5-12  Set Bi-Directional I/O DDR ______________________________________________ 22 Table 5-13  Get Bi-Directional I/O DDR______________________________________________ 22 Table 5-14  Sleep Tag ____________________________________________________________ 23 Table 5-15  Get Tag ID ___________________________________________________________ 23 Table 5-16  Auto Get Tag ID _______________________________________________________ 24 Table 5-17  Dump ID Data Command________________________________________________ 25 Table 5-18  Get Raw Tag ID _______________________________________________________ 26 Table 5-19  Program Tag__________________________________________________________ 27 Table 5-20  Erase Tag ____________________________________________________________ 28 Table 5-21  Kill Tag______________________________________________________________ 29 Table 5-22  Lock Tag _____________________________________________________________ 30 Table 5-23  Program Tag Init ______________________________________________________ 31 Table 5-24  LockG2 ______________________________________________________________ 32 Table 5-25  Lock bit usage_________________________________________________________ 33 Table 5-26  Lock action field functionality ____________________________________________ 33 Table 5-27  AccessG2_____________________________________________________________ 34 Table 5-28  Read Tag Memory______________________________________________________ 35 Table 5-29  Write Tag Memory _____________________________________________________ 36 Table 5-30  Service Port Lead-in sequence ____________________________________________ 37 Table 5-31  Transmit Power Level___________________________________________________ 38 Table 5-32  Service Port Commands - Standard ________________________________________ 49 Table 5-33  RF2400 USA Hopping Table _____________________________________________ 51 Table 5-34  RF2400 E.U. Hopping Table TBD _________________________________________ 51 Table 5-35  RF2400 Japan Hopping Table TBD________________________________________ 51 Table 5-36  Service Port Commands - Protected________________________________________ 55 Table 5-37  Service Port Error Codes ________________________________________________ 56 Table 5-38  Class 1 Reader-Tag Modulation Parameters _________________________________ 57 Table 5-39  Class 1 Tag-Reader Communication Parameters _____________________________ 58 Table 5-40  Gen 2 Reader-Tag Modulation Parameters __________________________________ 60 Table 5-41  Gen 2Tag-Reader Communication Parameters _______________________________ 61 Table 5-42  Class 1 Gen 2 Memory Map______________________________________________ 62
 ________________________________________________________________________    PRODUCT SPECIFICATION     vi
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 1  11:56:13 AM 1 SCOPE This  document  is  a  detailed  technical  specification  for  the  RFID  UHF  Short  Range Controller  (RF2400).    It  provides  a  comprehensive  description  of  the  hardware  with detailed  design  notes  and  a  complete  functional  description  of  the  product.    This document is contains proprietary and confidential information and is not intended to be used as an end user’s manual.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 3  11:56:13 AM 2 REVISION HISTORY   1.0  11/28/07 Initial Release
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 5  11:56:13 AM 3 REFERENCE DOCUMENTS The following documents form part of this specification to the extent specified herein.  In the event of a conflict between the requirements of this specification and the associated product drawings, referenced documents or firmware listings, the drawings, documents and listings shall take precedence.  3.1 SPECIFICATIONS & REQUIREMENTS MIT Auto-ID Center – Operational Specification for a UHF Radio Frequency Identification (RFID) System – Part I. Class 1 UHF Devices  - May 29, 2002 MIT Auto-ID Center – Technical Report - 860MHz–930MHz Class 1 Radio Frequency Identification Tag Radio Frequency & Logical Communication Interface Specification Candidate Recommendation, Version 1.0.1 – November 14, 2002 EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz – 960 MHz Version 1.0.9 – January 31, 2005 FCC - Title 47 Part 15.247 – Operation within the bands 902-928MHz, 2400-2483.5 MHz, and 5725-5850 MHz.  3.2 REFERENCE MATERIAL Texas Instrument – TMS320F2808 Data Manual – SPRS230H – October 2003-Revised June 2006 Chipcon AS / Texas Instrument – CC1070 Single Chip Low Power RF Transmitter for Narrowband Systems – SWRS043 - Rev 1.3 Chipcon AS – AN014 Frequency Hopping Systems (Rev 1.0) – 2002-03-20 Hittite Microwave Corporation – HMC545 GaAs MMIC SPDT Switch, DC-3 GHz – V00.0905 Triquint Semiconductor – TQM7M4006 - 3V Quad-Band GSM850/GSM900/DCS/PCS Power Amplifier Module Data Sheet-Revision E – February 22, 2006 Mini-Circuits – ADE-2 – Surface Mount Frequency Mixer Level 7 (LO Power +7dBm) 5 to 1000MHz REV. D. – M102713, RVN/TD/CP/AM 070412 Linear Technology – LT6231 – 215MHz, Rail-to-Rail Output, 1.1nV/Hz1/2, 3.5mA Op Amp Family – sn623012 623012fs Analog Devices – ADG723 – CMOS, Low Voltage, 4Ω Dual SPST Switch – Rev B - C00045-0-2/07(B) Analog Devices – ADG823 - <1 Ω 1.8V to 5.5V, Dual SPST Switch – REV.0 – C02851-0-8/02(0)
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 7  11:56:13 AM 4 OVERVIEW  The  RF2400  RFID  Controller  is  a  low  cost  implementation  of  a  UHF  RFID  reader designed specifically for short range applications.  The Controller has been designed to read, write, and verify EPC Class 1 and Generation 2 tags, is implemented as a single electronics module and requires a separate antenna. (Refer to Figure 4-1)    Figure 4-1  RF2400 Block Diagram
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 8  11:56:13 AM 4.1  DSP PROCESSOR The  heart  of  the  RF  controller  is  a  100  MIPS  DSP  processor.    The  processor communicates with the host over an RS232 interface using a media independent protocol.  Message packets from the host direct all RF2400 reader operations and upon completion the processor sends a response packet.  The processor is interfaced to a highly integrated single chip UHF transmitter/VCO over an  SPI  bus  which  provides  the  RF  carrier  and  Frequency  Hopping  Spread  Spectrum (FHSS) signaling. Using a PWM the processor establishes the gain of a RF amplifier and amplitude shift keys (ASK) modulates the carrier by switching this signal on/off.   The processor demodulates the backscatter signal from a tag using a high-pass filter and a FET switch to remove the DC component from the signal and samples the output of the base-band amplifier using a 12-bit A/D input.  The processor phase locks to the signal, synchronizes to clock edges, and follows the average signal level/gain to properly decode the data. Additionally, the processor controls an optical sensor to identify the presence of a tag to implement auto interrogation.  A scheme involving modulation of the sensor emitter and demodulation  of the reflected  signal  is used as a  means to suppress  ambient light and improve  the  reliability  of the sensor.   The sensor input can be configured  as a switch input and used to manually trigger reads. Finally,  the  processor  drives  several  LEDs  to  indicate  power,  activity  and  error conditions as well as a speaker to attract user attention. 4.2 TRANSMITTER CIRCUITRY An  integrated  single  chip  transmitter  is  used  and  controlled  by  the  DSP  processor  to produce the RF carrier required to  communicate with a UHF RFID tag.  Additionally, this  component  incorporates  the  necessary  circuitry  to  implement  Frequency  Hopping Spread Spectrum (FHSS) signaling for noisy environments and to meet agency spectral requirements.  To enhance speed of operation, the Transmitter/VCO includes dual sets of frequency control registers to allow overlapped frequency configuration during operation.  UHF  frequency  is  synthesized  from  an  inexpensive  crystal  using  a  programmable fractional divider to achieve high resolution and is ideal for narrow band applications. An external loop filter is provided to meet the stabilization requirements imposed by FHSS. A power splitter is used to divide the VCO output for use as both a local oscillator and RF carrier.  An LC phase shifter between the splitter and mixer is used to select the in-phase  and  90 degree  phase  components  providing  a  mechanism to compensate for the phase of the received signal A 2-watt GSM Power Amplifier is used to boost the RF carrier and is adjustable from 0dBm (1mW) to 24dBm (250mW).  The amplifier is designed for low cost cellular phone applications and requires only a few external power filtering components.  Output power is adjusted using a voltage control input from the DSP processor.  A PWM output sets the voltage which is filtered by a 2-pole Sallen-Key low-pass filter.  The filtered voltage is
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 9  11:56:13 AM switched to the power amplifier through two independent time constants.  This shaping meets EPCTM and FCC requirements reducing transmit spurs by controlling the on and off rate of the power amplifier.  The output of the amplifier is connected to the antenna using  a  PCB  implemented  directional  coupler  with  8dB  coupling  loss  and  directivity between 25dB and 30dB.  A LC PI filter couples the output of the filter to the antenna filtering any harmonic components. 4.3 RECEIVER CIRCUITRY Tag backscatter is coupled to a precision mixer from the directional coupler.  The output of the mixer is coupled to the receiver circuitry using an impedance matching amplifier.  An acquisition switched high-pass filter removes the DC component before applying the signal to the 34dB base-band amplifier/800KHz filter.  The amplified signal is sampled by the DSP using a 12-bit A/D input.  The DSP processor tracks the average value of the signal; phase locks to the signal, and synchronizes to the clock edges in order to decode the data. 4.4 USER INTERFACE  The  RF2400  reader  is  interfaced  to  the  host  using  an  RS232  serial  connection.  Commands  and  responses  are  communicated  using  packets.    The  protocol  includes commands to configure and status the reader as well as commands to program and read tags.  Several LED outputs and an integrated speaker provide user feedback of power, activity and error conditions.  A separate optical sensor interface allows to processor to sense presence of a tag providing a means to auto interrogate the tag 4.5 POWER REGULATION  The RF2400 reader is powered from a single 5volt power source and requires only 900 mA to provide 24dBm(250mW) of RF power.  Main 5 volt power is converted to 4.2 volts  by  a  Li-Ion  battery  charger.    This  can  charge  an  optional  battery  for  portable operations.  The 4.2V power is used directly by the RF power amplifier but also feeds the 3.3volt low noise RF power and 1.8 volt processor core voltage LDO regulators. 4.6 BATTERY OPERATION  An optional 3.7V 3200mA/hr Li-Ion battery can be used for remote operation.  A battery charging circuit maintains the battery voltage between 4.0 and 4.1V.  In order to extend battery life and prevent overheating and the possibility of explosion, both the battery and charging circuit include protection circuitry.  Additionally, firmware monitors the charge state and shuts down the charger when the battery is fully charged. While operating on battery, steps have been taken to reduce the operating current in order to  extend  the  operational  time  between  charges.    Normally  the  processor  runs  at 100MHz,  which  is  required  while  accessing  tags.    When  idle,  the  processor  clock  is decreased to 20 MHz, greatly reducing the required current.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 11  11:56:13 AM 5 FUNCTIONAL DESCRIPTION  The RF2400 reader is a radio frequency identification (RFID) communication interface designed  specifically  for  short  range  applications.    The  reader  interfaces  to  a  host processor  with  an  industry  standard  RS232  or  optional  USB  interface  adapter  using  a media  independent  protocol.    The  RF2400  reader  supports  the  reader  commanded functionality required for both the Auto-ID Center Class1 and Gen 2 Tags operating in the frequency range of 860MHz-960MHz.  5.1 HOST PROTOCOL This  section  describes  the  format  and  commands  for  the  bi-directional  communication between  the  RF2400  reader  and  the  host  including  command  codes,  parameters,  and response data.  Commands are divided into several code groups:   00 – 1F  setting and retrieving RF2400 reader parameters  20 – 3F  reader-to-tag modulation commands that return a single response message  40 – 4F  reader-to-tag modulation commands that result in a tag-list response  50 – 5F  tag programming commands  60…6F  setting and retrieving RF2400 reader configuration data D0 – DF  loading RF2400 firmware code F0 – FF  reserved for managing a tag list   The  following  section  describes  the binary protocol  for  serial  communication  between the  host  and  the  RF2400  Module.    This  protocol  is  media  independent  and  can  be implemented using RS232, USB, or other serial interfaces 5.1.1 Message Format  Messages encapsulate commands from the host and responses from the RF2400 reader that are sent as packets over the serial interface between the host and the RF2400 reader.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 12  11:56:13 AM 5.1.1.1 Message Packet Format Messages between the host and reader are binary data packets, consisting of a message payload encapsulated with two bytes preceding any message ([DLE][SOM]) and two bytes completing  any  message  ([DLE][EOM]).    All  communications  are  initiated  by  the  host. (Refer to Figure 5-1 and Table 5-1) Note: ITEMS IN PARENTHESIS (…) ARE NOT REQUIRED FOR ALL MESSAGES.   [DLE]  [SOM]  [Payload]  [DLE]  [EOM] Figure 5-1  Message Packet Format  Token  Description [DLE] Data Link Escape token; 0x10 [SOM] Start of Message token; 0x01 [EOM] End of Message token; 0x02 Table 5-1   Message Encapsulation Characters  In order to avoid ambiguities, if a data value in the payload is a DLE (0x10) character, the DLE (0x10) is repeated as the message packet is formed.   5.1.1.2 Host-to-Reader Payload  The host to reader payload includes a session identification [SessionID], a target reader number [Reader#],  a  command  to  execute [Command],  optional  command  data (CommandData),  followed  by  a  two  byte  CRC [CRC-CCITT16].  (Refer  to  Figure  5-2  and Table 5-2)  [SessionID]  [Reader#]  [Command]  (CommandData)  [CRC-CCITT-16] Figure 5-2  Host to Reader Payload Format
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 13  11:56:13 AM 5.1.1.3 Reader-to-Host Payload  The reader to host  payload includes a session identification [SessionID], a target reader number [Reader#],  the  command  executed [CommandEcho], type  of  communication [CommCode], optional response data (ResponseData), followed by a two byte CRC [CRC-CCITT16]. (Refer to Figure 5-3, Table 5-2 and Table 5-3)  [SessionID]  [Reader#]  [CommandEcho]  [CommCode]  (ResponseData)  [CRC-CCITT16] Figure 5-3  Reader to Host Payload Format   Payload Field  Description [SessionID]  Single-byte value. Every command gets a new number defined by the host. Every response matches the session ID of the initiating command. Normal session IDs can range from 0x01 to 0xFF. A SessionID of 0x00 in a command message forces the reader to repeat the previous response. This feature allows the Host to request the previous response in case of a communication error. [Reader # ]  Single-byte value. In a Host command, a Reader # of 0x00 indicates that the command is addressed to all readers. A Reader will reply to commands only if its internal RDRNUM matches or if a command is addressed to all readers The factory default reader number is 0xFF. [Command]  [CommandEcho]  Single-byte value. Defines the command to be executed or has been executed (refer to section 5.1.2 for details). (CommandData)  Variable length value specifying command parameters (refer to the section 5.1.2 for details) [CommCode]  Single-byte value. Indicates the type of message or error. CommType < 0x80 indicates that a valid command was received. CommType >= 0x80 indicates that an error occurred, either in the command format, parameters, or in the execution of the command. (refer to Table 5-3 for details) (ResponseData)  Contains a variable number of bytes (including none) (refer to section 5.1.1.4 for details). [CRC-CCITT16]  Two bytes of CRC-CCITT16 polynomial (X^16+X^12+X^5+1) seed 0xFFFF. The CRC is calculated over all data from Session ID to Response Data inclusive. DLE packetization is not included into the CRC. The CRC is sent MSB first, LSB last. Table 5-2   Command/Response Payload Fields
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 14  11:56:13 AM  CommCode  Description 0x00  MSGOK    Success 0x01  STARTINV  Starting inventory message 0x02  TAGINV    Tag Data inventory message 0x03  ENDINV    Ending inventory message 0x04  STARTLIST  Starting list dump 0x05  RECLIST    List dump data record 0x06  ENDLIST    End of list dump 0x07  STARTDIAG    Starting diagnostic message 0x08  DIAGDATA    Diagnostic data message 0x09  ENDDIAG    End of diagnostic message 0x0A  UPLOADOK    Upload line success 0x0B  UPLOADEND    Upload complete 0x0C  SUSPEND    Reader entering suspend state 0x0D  RESUME    Reader resuming from suspend state 0x40  NO PASSW  Kill password is locked, can’t be read 0x41  LOCKNPW  EPC locked but Kill password not set because locked 0x81  UNKLEN    Unknown message length 0x82  UNKVAL    Unknown value 0x83  UNKCMD    Unknown command 0x84  UNKTAGCMD    Unknown or disabled tag command 0x85  OVRERR    Overflow error on directed list entry 0x86  NOTAG    No tag to read or program 0x87  ERASEFAIL    Erase failure 0x88  PROGFAIL    Program data verification error 0x89  TAGLOCK    Tag is locked, cannot program error 0x8A  KILLFAIL    Kill failure 0x8B  LOCKFAIL    Lock attempt failure 0x8C  DATASIZE    Tag data memory size mismatch 0x8D  HWERR    Hardware error 0x8E  LISTFULL    List for directed inventory is full 0x8F  UPLOADERR    Upload line contained an error 0x90  UPLOADINV    Command invalid for bootloader 0x91  UPLOADCRC     Upload Program Memory CRC Error 0x92  NVFAIL  EEPROM error 0x93  RESV     Reserved 0x94  RESV     Reserved 0x95  UNKIDLEN   Unknown ID Length 0x96  TAGLOST   Tag lost after earlier communication 0x97  TAGNXM  Addressed word doesn’t exist 0x98  LOGFULL  EEPROM ID storage is full Table 5-3   Communication Codes CommCode < 0x80 indicates a successful operation, CommCode >= 0x80 indicates an error condition of some kind.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 15  11:56:13 AM 5.1.1.4 Response Data Formats The following sub-sections detail specific response data formats 5.1.1.4.1 Simple Command Response The  RF2400  reader  responds  to  a  simple  command  (for  example  getting  a  reader parameter) with the specified number of bytes.  5.1.1.4.2 Low-Level Command Response  In response to a tag-related low-level command such as Get Tag ID.  The Response Data is sent to the Host in the following format (Refer to Figure 5-4 and Table 5-4)  [TagDecodeStatus]   [Antenna#]  (TagDataLength)  (TagData) Figure 5-4  Low-Level Command Response  Low-Level Field  Description [TagDecodeStatus]  Single-byte value indicating status of data acquisition by a low-level command 0x00 – Good ID  0x01 – No tag 0x02 – Collision  0x03 – CRC Error (returned for Get Tag ID only) Bit4 – Kill password is locked Bit5 – Access password is locked [Antenna # ]  Single-byte value indicating the Antenna number used for the current air interface transaction. The only valid value for the RF2400 is 0x00 (TagDataLength) Length of Tag Data in bytes  Included for TagDecodeStatus of 0x00 "GoodID and 0x03 "CRC Error" only (TagData)  Variable length defined by TagDataLength. Data is sent MSB first ending with the LSB of the last byte. Included for TagDecodeStatus of 0x00 "GoodID and 0x03 "CRC Error" only Table 5-4   Low-Level Response Fields  5.1.1.4.3 Error Response  The RF2400 reader responds to every host command except when a communication error is  detected.    If  a  reader  detects  a  CRC  Error  in  a  host  payload,  the  message  will  be ignored. However, if the host detects a CRC Error, it may request the previous response by sending a packet with a [SessionID] of zero.  If  the  host  payload  is  less  than  four  bytes  long  including  the  two  bytes  of  CRC  (no Reader# or Command) the reader will ignore the message.  If the payload is four bytes
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 16  11:56:13 AM long including the two bytes of CRC (no Command), the reader will respond with a 0x81 UNKLEN “unknown message length” [CommCode].  5.1.2 Reader Commands The  RF2400  controller  responds  to  numerous  commands using the  media independent format described in paragraph 5.1.  These commands provide a mechanism to configure (Set) the reader as well as retrieve (Get) reader status.  The reader will respond to all Set commands  with  an  echo  of [SessionID], [Reader#], [CommandEcho],  and [CommCode] followed by a two byte CRC [CRC-CCITT16] as described in paragraph 5.1.1.3.  The reader will respond to all Get commands with an echo of [SessionID], [Reader#], [CommandEcho], [CommCode] and a variable length (ResponseData) field followed by a two byte CRC [CRC-CCITT16] as described in paragraphs 5.1.1.3 and 5.1.1.4.  Any command may result in a [CommCode] of one of the following: MSGOK, UNKLEN, UNKVAL, and UNKCMD as defined in Table 5-1.  Other possible codes are identified in the  description  of  the  specific  command.    If  the  RF2400  has  been  initialized  into  its integral bootloader firmware, there will be no response to host reader commands 5.1.2.1 Get Firmware Version (0x00) The Reader  will reply with five (5)  bytes  specifying  Localization Code, Reader Type, and Firmware Version Number.  Response data is in binary hex format.  The  localization  code  and  the  reader  type  are  stored  in  non-volatile  memory  and automatically  configured  for  USA  (0x01)  operation  on  the  initial  firmware  upload.  Subsequent firmware updates preserve the existing configuration in non-volatile memory.   Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x00  0 Bytes  --  5 Byte  1st Byte  --  Localization Code      0x01  --  USA      0x02  --  Japan      0x03  --  E.U.  2nd Byte -- Reader Type       0x09 – RF1200 Reader       0x0A – RF2400 Reader 3rd Byte  --  0x00 4th Byte  --  Major Revision # 5th Byte  --  Minor Revision # Table 5-5   Get Firmware Version  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  CRCH  CRCL  DLE  EOM   10  01  01  FF  00  54  0C  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  Local  Rtype  Nused  FverH  FverL  CRCH  CRCL  DLE  EOM  10  01  01  FF  00  00  01  09  00  00  0A  75  A8  10  02     Get Firmware Version Example  Note:  this example reflects firmware version V0.10
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 17  11:56:13 AM 5.1.2.2 Set Baud Rate (0x03) This command will only accept 0 thru 5 as valid data fields. The reader will respond to the command at the old baud rate before changing to the new rate.  The updated baud rate will be stored in non-volatile memory replacing the previous value.  The factory default setting is 19,200 baud using 8 data bits, no parity, and one stop bit.  If the user inadvertently sets the baud rate to one not supported by the host, a hardware reset is provided.  Disconnect power from the board, connect pins 1 to 2 of the 11 pin connector, re-connect power.  The EEPROM will be reset to defaults (19,200 baud).  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x03  1 Bytes  Baud Rate     0x00     9,600     0x01    19,200 (default)     0x02    38,400     0x03    57,600     0x04  115,200 0 Byte  -- Table 5-6   Set Baud Rate 5.1.2.3 Set IO Port Value (0x05) Sets or clears specified output port pins. Ports start at LSB corresponding to physical port 0 and are bitmapped toward the MSB. The RF 2400 has two bi- directional IO ports.  Bits in the send data with no corresponding physical port will be ignored.  Additionally, since the  RF2400  IO  ports  are  bi-directional,  the  value  will  be  ignored  in  the  case  of  the corresponding port pin defined as input.  A bit value of 1 in the send data will cause the corresponding port to be driven high.  A bit value of 0 will cause the corresponding port pin to be pulled low. A Get  Reader  Hardware  Information  command can  be  issued  to determine  the  number  and  type  of  output  ports  available.  The  Set  Bi-Directional  I/O DDR and Get Bi-Directional I/O DDR commands may be used to setup and determine the I/O port configuration.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x05  1 Bytes  0x00  --  0xFF  0 Byte  -- Table 5-7   Set IO Port Value  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Data  CRCH  CRCL  DLE  EOM   10  01  01  FF  05  01  F8  26  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  CRCH  CRCL  DLE  EOM  10  01  01  FF  05  00  E8  07  10  02     Set IO Port Value Example
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 18  11:56:13 AM 5.1.2.4 Get IO Port Value (0x06) This command returns the current state of the input port pins.  Response data is a bitmap with  the  LSB  corresponding  to  physical  port  0.    The  RF2400  reader  has  two  bi-directional  ports  and  will  return  a  0  bit  value  for  all  remaining  bit  positions.  Additionally, since the RF2400 IO ports are bi-directional, any port defined as an output will  return  the  current  level  of  the  IO  port.    A  Get  Reader  Hardware  Information command can be issued to request the hardware configuration.  The Set Bi-Directional I/O  DDR  and  Get  Bi-Directional  I/O  DDR  commands  may  be  used  to  setup  and determine the I/O port configuration.   Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x06  0 Bytes  --  1 Byte  0x00  --  0xFF Table 5-8   Get IO Port Value  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  CRCH  CRCL  DLE  EOM   10  01  01  FF  06  34  CA  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  Data  CRCH  CRCL  DLE  EOM  10  01  01  FF  06  00  01  17  0F  10  02     Get IO Port Value Example  Note:  this example assumes that the SET IO Port and Set Bi-Directional I/O DDR examples have been executed first  5.1.2.5 Get Reader Status (0x0F) This command returns operating status information from the reader.  The sensor status returns  the  state  of  the  optical  sensor  indicating  the  presence  of  a  tag  for  subsequent RFID interrogation.    Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x0F  1 Bytes  0x00    General Status 0x10    Get Sensor Status  1 Byte  0x01    Tag Present (Reflection) Table 5-9   Get Reader Status Note:  When getting general status, if the EEPROM log is full, the Mtype returned will be 0x98 (LOGFULL). COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Sub  Rpt   CRCH  CRCL  DLE  EOM   10  01  01  FF  0F  10  10  3D  F7  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  Data  CRCH  CRCL  DLE  EOM  10  01  01  FF  0F  00  01  BF  73  10  02     Get Sensor Status Example (with reflection)
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 19  11:56:13 AM 5.1.2.6 Get Reader Hardware Information (0x11) The Get Reader Hardware Information command provides a mechanism for the host to identify  various  aspects  of  the  hardware.    Command  Data  values  are  used  to  select specific parameters. Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 1 Byte  0x01 – Get Bidirectional ports (1)  1 Byte  Bitmap:     bit 0 -- port 0     bit 1 -- port 1     bit N – port N 0= not-existent  --  1= exists 1 Byte  0x02 – Get Flags  1 Byte  Bitmap Bit 0 = ignore host command CRC 1 Byte  0x05 – Get Reader Type (1)  1 Byte  Reader Type 0x09  -- Single RFID Reader 1 Byte  0x06 – Localization Code (1)  1 Byte    Localization Code      0x01  --  USA      0x02  --  Japan      0x03  --  E.U. 1 Byte  0x07 – Radio Type (1)  1 Byte  Upper Nibble -- # of Antennas     0x0X  -- One Antenna Lower Nibble – Frequency Band     0xX1  --  868MHz     0xX2  --  915MHz     0xX3  --  950MHz 1 Byte  0x11  -- Tag Class 1 Byte  Bitmap:    bit 0 – Class1    bit 1 – Gen2 1 Byte  0x17 – Paper Sensor Trigger 1 Byte  Bitmap:    bit 0 – enabled    bit 1 – 0=reflection, 1=no reflection    bit 3 – persistent    Bit 4 – use switch instead of sensor    Bit 5 – store ID in EEPROM 1 Byte  0x18 – Get TagID & Raw ID Retries 1 Byte  TagID & Raw ID -- # of Retries  0x00 – 0xFF 1 Byte  0x20 – Get Tx power step 0  2 Bytes  Tx power 1 Byte  0x21 – Get Tx power step 1 2 Bytes  Tx power 1 Byte  0x22 – Get Tx power step 2 2 Bytes  Tx power 1 Byte  0x23 – Get Tx power step 3 2 Bytes  Tx power 0x11 1 Byte  0x24 – Get Receive threshold 1 Byte  Receive threshold Table 5-10   Get Reader Hardware Information  (1) These commands are not currently implemented (unknown value Message Type returned)
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 20  11:56:13 AM 5.1.2.7 Set Reader Hardware Information (0x13)  The Set Reader Hardware Information command provides a mechanism for the host to establish  various  aspects  of  the  hardware.    Command  Data  values  are  used  to  select specific parameters. Command Data  Response Date Command Code  Size  Byte  Valid Values  Size  Valid Values 2 Byte  1st 2nd 0x02 – Set Flags Bitmap    Bit 0 – set to ignore host cmd CRC 0 Bytes   1 Byte  1st  0x06 – Localization Code (2)  1 Byte  Reader Type 0x09  -- Single RFID Reader 1 Byte  1st  0x07 – Radio Type (2) 1 Byte  Upper Nibble -- # of Antennas     0x0X  -- One Antenna Lower Nibble – Frequency Band     0xX1  --  868MHz     0xX2  --  915MHz     0xX3  --  950MHz 2 Bytes  1st 2nd 0x11 – Tag Class Bitmap:    bit 0 – Class1    bit 1 – Gen2 Both set = auto detect 0 Bytes  -- 2 Bytes  1st 2nd 0x17 – Paper Sensor Trigger Pstrs Bitmap:    bit 0 – enable     bit 1 – 0= reflection, 1= no reflection    bit 2 – is ignored    bit 3 – persistent    bit 4 – use switch instead of sensor    bit 5 – Store ID in EEPROM 0 Bytes  -- 2 Bytes  1st 2nd 0x18 – Set TagID & Raw ID Retries             # Retries 0 Bytes  Def = 7-- 3 Bytes  1st 2,3 0x20 – Set Tx power step 0 Tx power 0 Bytes   3 Bytes  1st 2,3 0x21 – Set Tx power step 1 Tx power 0 Bytes   3 Bytes  1st 2,3 0x22 – Set Tx power step 2 Tx power 0 Bytes   3 Bytes  1st 2,3 0x23 – Set Tx power step 3 Tx power 0 Bytes   0x13 2 Bytes  1st 2nd 0x24 – Set Receive Threshold Threshold [102 (0x66) = 75mV] 0 Bytes   Table 5-11   Set Reader Hardware Information (2) These commands are not yet implemented (unknown value Message Type returned)  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Sub  Data  CRCH  CRCL  DLE  EOM   10  01  01  FF  13  02  01  5E  62  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  CRCH  CRCL  DLE  EOM  10  01  01  FF  13  00  xx  xx  10  02     Set Reader Hardware Example (Ignore CRC)
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 21  11:56:13 AM 5.1.2.7.1 Paper Sensor Triggered Read The paper sensor triggered read (PSTR) mode can be set-up and enabled using the “Set Hardware  Information”  command,  sub-command  0x17.    This  mode  is  used  to  enable automatic  tag  reading  based  on  the  state  of  the  optical  reflection  sensor.    Using  this command, triggered reading can be enabled or disabled, set to operate in host or service port mode, based on reflection or no reflection and set to persist over power cycling.  The triggered read state (pstrs) is set using the data byte following the sub-command.  The bit definitions for pstrs follow: Bit 0   enables  or  disables  triggered  reads  where  a  one  (1)  indicates  triggered  read  is enabled and a zero (0) indicates disabled. Bit 1   indicates which optical state is used to trigger a read where one (1) triggers the read on a no reflection and a zero (0) triggers the read on reflection.  This bit is ignored when a switch is used in place of the optical sensor(bit 4 is set to a 1) Bit 2   is reserved and is ignored. (used internally to indicate host vs SP mode) Bit 3   establishes  if  the state persists  over  power cycles where  a  one  (1)  indicates the state persists over a power cycle and a zero (0) indicates that the state does not persist. Bit 4   set to one (1) indicates a switch is used instead of the sensor for triggering.  When the switch contacts are closed the state is triggered. Bit 5   determines  whether  the  ID data  are  returned  or  stored.    A  zero  (0)  indicates  to return  the  ID data  immediately, while a one  (1) causes  the  data  to be  stored  in EEPROM  for  future  retrieval.    Refer  to  the  “Dump  ID  Data”  command.    Bad reads are not stored in EEPROM. When the PSTR mode is enabled using this host command, the triggered read tag data are sent as a Binary packet in host mode or saved in EEPROM. When storing to EEPROM, only good reads are stored.  When the EEPROM log is full (496 records), the PSTR function is terminated.  An error message is sent to the host with the Mtype set to 0x98 (LOGFULL). Note: To use a switch in place of the paper sensor, wire between J3 pins 1 and 2.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 22  11:56:13 AM 5.1.2.8 Set Bi-Directional I/O DDR (0x16) The  data  byte  of this  command defines  the  two bi-directional ports  on the RF2400 as either  inputs  or  outputs.    The  command  data  is  saved  in  non-volatile  memory  and preserves  the  port  definition  through  power  interruptions.    The  LSB  of  the  data  byte controls port 0 and bit 1 controls port 1.  A logic one defines a port as an input while a logic zero defines a port as an output.  The factory default for the control byte is 0xFF setting both IO pins as inputs  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x16  1 Byte  Bitmap:     0 = output     1 = input 0 Bytes  -- Table 5-12   Set Bi-Directional I/O DDR  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Data  CRCH  CRCL  DLE  EOM   10  01  01  FF  16  02  D2  76  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  CRCH  CRCL  DLE  EOM  10  01  01  FF  16  00  F2  34  10  02     Set Bi-Directional I/O DDR Example  Note:  Set Bi-Directional I/O DDR must be executed for the IO pin to be valid. This example Sets port 0 as an input and port 1 as an output  5.1.2.9 Get Bi-Directional I/O DDR (0x17) This command returns the data byte defining the bi-directional IO ports  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x17  0 Bytes  --  1 Byte  Bitmap:     0 = output     1 = input Table 5-13   Get Bi-Directional I/O DDR  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  CRCH  CRCL  DLE  EOM   10  01  01  FF  17  36  DA  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  Data  CRCH  CRCL  DLE  EOM  10  01  01  FF  17  00  02  89  67  10  02     Get Bi-Directional I/O DDR Example  Note:  this example assumes that the Set Bi-Directional I/O DDR has been executed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 23  11:56:13 AM 5.1.3 Tag Commands Tag  type  commands  result  in  the  RF2400  reader  sending  commands  to  a  tag  by modulating the RF carrier.  Tags may respond by modulating the RF backscatter.  5.1.3.1 Sleep Tag (0x21)  This command issues an air interface SLEEP command…..(3)  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x21  0 Bytes  --  0 Bytes  -- Table 5-14   Sleep Tag (3) This command is not yet implemented (unknown value Message Type returned)  5.1.3.2 Get Tag ID (0x24) This low-level command issues the required air interface commands to acquire one tag ID.  CRC checking is enforced and a Good ID Tag Decode Status is only available if the CRC is validated.  An ID response is only returned for a  Good ID Decode status and begins with two bytes of CRC followed by either eight or twelve bytes of ID data.  The LOCK and KILL fields are not included in the tag response data. Class 1 tags are interrogated for both 64-bit and 96-bit standards.  The CRC is initially calculated over the first eight bytes and over twelve bytes if the eight byte calculation fails.  The Tag Data Length indicator identifies which CRC evaluated correctly  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x24  0 Bytes  --  N Bytes  Tag Type Specific Table 5-15   Get Tag ID  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  CRCH  CRCL  DLE  EOM   10  01  01  FF  24  30  EA  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  Tsts  Ant#  Len  tCRCH  tCRCL  10  01  01  FF  24  00  00  00  0E  89  7C  TAG ID                       CRCH  CRCL  DLE  EOM   01  02  03  04  05  06  07  08  09  0A  0B  0C  E6  16  10  02     Get Tag ID Example  Note:  this example assumes that the Program Tag example has been executed and both commands execute with success.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 24  11:56:13 AM 5.1.3.3 Auto Get Tag ID (0x26) This low-level command issues the required air interface commands to repeatedly acquire tag IDs.  A response message is sent for each read, the format of which is identical to the Get Tag ID command.  A delay may be introduced between reads in 10ms increments.  The  Dly  byte  follows  the  Cmd  byte.    Each  read  with  the  delay  of  0  consumes approximately  43mS.    The  operation  repeats  indefinitely  until  any  other  command  is executed. A flag byte (Flg) allows setting options as follows: Bit 0 = 1 Enables retries. Bit 1 = 1 Store ID in EEPROM vs. send to host. The retry count is set with the “Set Reader Hardware Information” command, Set Tag ID & Raw ID retries with a default value of 7.  With retries enabled and a count of 7 and no tag present, a total of 16 reads are done which includes 8 for each of the two RF phases.  This consumes 688 mS plus any delay count.  If auto class detect is enabled, this time is doubled.  Auto Class Detect should be disabled, set TC=2 for Gen2. When storing to EEPROM, only good reads are stored.  When the EEPROM log is full (496 records), the Auto Get Tag ID function is terminated.  A message is sent to the host with the Mtype set to 0x98 (LOGFULL). CRC checking is enforced and a Good ID Tag Decode Status is only available if the CRC is validated.  An ID response is only returned for a Good ID Decode status and begins with two bytes of CRC followed by either eight or twelve bytes of ID data.  The LOCK and KILL fields are not included in the tag response data. Class 1 tags are interrogated for both 64-bit and 96-bit standards.  The CRC is initially calculated over the first eight bytes and over twelve bytes if the eight byte calculation fails.  The Tag Data Length indicator identifies which CRC evaluated correctly Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x26  2 Bytes 1st Byte--Delay in 10mS 0x00 to 0xFF-2nd Byte—Flags .....Bit 0 = 1 enable retries …..Bit 1 = 1 store IDs in EEPROM N Bytes  Tag Type Specific Table 5-16   Auto Get Tag ID  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Dly  Flg  CRCH  CRCL  DLE  EOM   10  01  01  FF  26  25  01  72  8D  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  Tsts  Ant#  Len  tCRCH  tCRCL  10  01  01  FF  26  00  00  00  0E  89  7C  TAG ID                       CRCH  CRCL  DLE  EOM   01  02  03  04  05  06  07  08  09  0A  0B  0C  1E  A1  10  02     Auto Get Tag ID Example  Note:  this example assumes that the Program Tag example has been executed and both commands execute with success.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 25  11:56:13 AM 5.1.3.4 Dump ID Data (0x28)  This command returns ID data that has been stored in EEPROM. The Length byte indicates the number of records to return (max 16).  An internal pointer tracks records sent so that a repeat of this command can fetch the next group of records.  The data dump will stop when a zeroed record is encountered (end of stored data).  A response is sent with the length indicating the number of records that were returned. The imbedded EEPROM (8Kx8) can store 496 entries.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x28  2 Bytes 1st Byte—Subcmd      0x01 Dump after reset pointer      0x02 Dump using current pointer      0x03 Get number of records stored      0x04 Clear all records 2nd Byte— Length in records 0x00 to 0x10 2 Bytes  Number of records H/L byte Table 5-17   Dump ID Data Command  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Sub  Len  CRCH  CRCL  DLE  EOM   10  01  01  FF  28  01  01  E7  23  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  SeqH  SeqL#  Len  tCRCH  tCRCL  10  01  01  FF  02  00  00  00  0E  89  7C   TAG ID                       CRCH  CRCL  DLE  EOM   01  02  03  04  05  06  07  08  09  0A  0B  0C  85  71  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  LenH  LenL  CRCH  RPT  CRCL  DLE  EOM  10  01  01  FF  28  00  00  01  10  10  64  10  02     Dump ID Data Example (Single Record) Note: at least one record must have been previously stored in memory using SP mode Paper Sensor Triggered Read  The Dump Record indicates the stored record number in SeqH/SeqL.  The Echo byte indicates which command stored this record as follows:   0x01  SP_ART  SP mode Auto Read Tag   0x02  SP_PSTR  SP mode Paper Sensor Triggered Read   0x11  H_PSTR  Host mode Paper Sensor Triggered Read   0x26  H_AUTO  Host mode Auto Get Tag ID
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 26  11:56:13 AM 5.1.3.5 Get Raw Tag ID (0x3E) This low-level command issues the required air interface commands to acquire one tag ID without CRC checking.  Response data varies in length and is specific to tag class.   Class 1 tags return a tag data length of 12 or 16.  The response begins with two bytes of CRC followed by either eight or twelve bytes of ID, a one byte kill code and ends with a one byte lock code. Gen  2  returns  a  tag  ID  length  of  22.    The  response  begins  with  two  bytes  of  CRC followed  by  twelve  bytes  of  ID,  a  four  byte  kill  password,  and  a  four  byte  access password.   Although the Gen2 specification  defines  long EPC codes the RF2400 only supports a 96-bit EPC.  IF the kill password is read/write locked the password will be returned as zeros (note: an all zero kill password is illegal). The Tag Decode Status provides success or failure status for the command in addition to other status indicators.  If the command was successful bits 0-3 will all be zero.  A binary code of three in these bits indicates a CRC error.  For a Class 1 tag, if Bits 4 & 5 are both set, the tag is locked.  For a Gen 2 tag, if Bit 4 in the Tag Decode status is set, the Kill Password is locked and if Bit 5 in the Tag Decode status is set, the Access Password is locked.   Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x3E  0 Bytes  -- 12/16 Bytes      22 Bytes Class 1 Tag     CRC  (2-bytes) ….ID   (8 or 12 bytes)     Kill Code    (1-byte)     Lock Code  (1-byte)  Class 2 Tag     CRC  (2-bytes)     ID  (12-bytes)     Kill Password  (4-bytes)     Access Password  (4-bytes)  Table 5-18   Get Raw Tag ID COMMAND  DLE  SOM  SesID  Rdr#  Cmd  CRCH  CRCL  DLE  EOM   10  01  01  FF  3E  83  91  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  Tsts  Ant#  Len  tCRCH  tCRCL  10  01  01  FF  3E  00  00  00  16  89  7C  TAG ID               01  02  03  04  05  06  07  08  09  0A  0B  0C     Kill Password      Access Password     CRCH  CRCL  DLE  EOM   00  00  00  00  00  00  00  00  86  21  10  02     Get Raw Tag ID (Gen2) Example  Note:  this example assumes that the Program Tag example has been executed and both commands execute with success.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 27  11:56:13 AM 5.1.3.6 Program Tag (0x50)  The  Program  Tag  command  writes  data  to  the  tag  ID.    The  command  includes:  four control parameters and the  ID data.  The first  three parameters (find tag retries, erase retries, and program retries) establish retry counters for detecting the presence of a tag, erasing the tag and finally programming the tag.  The RF2400 only supports tags written in 96 bit format.  Correspondingly, the only valid ID length is twelve (0x0C) and must match the number of ID data bytes in the command.  If the Tag is Class 1, A CRC (CRC-CCITT-16) is generated for the 96-bits of ID data and programmed into the first two bytes in tag memory followed by the ID data.  This  command does not write the LOCK  or KILL bytes. If successful, a MSGOK will be returned otherwise an error code indicating the failure will  be  returned.    Error  codes  (CommCode)  include  HWERR,  UNKTAGCMD, UNKIDLEN NOTAG, ERASEFAIL, PROGFAIL, TAGLOST, and TAGLOCK.  If the Mtype  field  in  the  response  is  non-zero,  an  error  has  occurred,  and  the  tag  must  be considered invalid.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x50  16 Bytes  1st Byte—Find Tag retries  0x00-0xFF 2nd Byte--Erase retries  0x00-0xFF 3rd Byte--Program retries 0x00-0xFF 4th Byte—ID Length  0x0C 5th -16th Bytes—ID Data (12 Bytes) 0 Bytes  -- Table 5-19   Program Tag  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Xrty  Erty  Wrty  Len     10  01  01  FF  50  7  7  7  0C    Tag ID            CRCH  CRCL  DLE  EOM   01  02  03  04  05  06  07  08  09  0A  0B  0C   84  33  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  CRCH  CRCL  DLE  EOM  10  01  01  FF  50  00  5D  39  10  02     Program Tag Example   Note:  this example assumes that the command executes successfully.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 28  11:56:13 AM 5.1.3.7 Erase Tag (0x51) The Erase Tag command erases and verifies the tag was properly erased.  The command begins with a tag search which repeats up to the given number of find tag retries or until a valid tag is found.  Subsequently, the Erase command is iterated up to the number of times defined by erase retries or until the erase is verified.  A Class 1 tag is written with both the CRC and ID data set to zero.  A Gen2 tag is written with only the ID data set to zero since the CRC is calculated by the tag.  A successful operation is determined if the tag ID is erased to all zeros for both Class 1 and Gen2 tags and in addition the CRC is set to zero for a Class 1 tag. If successful a MSGOK will be returned otherwise an error code indicating the failure will be returned.  Error codes (CommCode) include HWERR, UNKTAGCMD, NOTAG, ERASEFAIL, TAGLOST, and TAGLOCK.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x51  2 Bytes  1st Byte—Find Tag Retries  0x00-0xFF 2nd Byte--Erase retries  0x00-0xFF 0 Bytes  -- Table 5-20   Erase Tag
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 29  11:56:13 AM 5.1.3.8 Kill Tag (0x52) This command permanently erases or deactivates and verifies that all tag data has been erased or will no longer respond to or execute reader commands. The command begins with a tag search which repeats up to the given number of find tag retries or until a valid tag is found.  Subsequently, the Kill function is iterated up to the number of times defined by kill retries or until the Kill is verified.  The RF2400 only supports tags written in 96 bit format thus the only valid ID length is twelve (0x0C).  For Class 1 tags the calculated CRC (CRC-CCITT-16) along with the provided,  ID  data,  and  kill  code  must match the corresponding tag data for the kill operation to complete.  For a Gen2 tag the 4-byte kill password mush match the tags kill password.  A successful operation is determined if all tag data has been erased or the tag will no longer responds to reader commands. If successful a MSGOK will be returned otherwise an error code indicating the failure will be returned.  Error codes (CommCode) include HWERR, UNKTAGCMD, NOTAG, DATASIZE, TAGLOST, TAGLOCK and KILLFAIL.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x50  19 Bytes  1st Byte—FindTag Retries  0x00-0xFF 2nd Byte--Kill retries  0x00-0xFF 3rd  Byte—ID Length  0x0C 4th -15th Bytes     Class 1 --  12-bytes ID Data     Gen2    --   Ignored 16th -19th  Bytes      Class 1  (first byte only)               KILL code                  0x00-0xFF      Gen2     (all four bytes)               kill password                0x00000000 – 0xFFFFFFFF 0 Bytes  -- Table 5-21   Kill Tag
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 30  11:56:13 AM 5.1.3.9 Lock Tag (0x53) The LOCK command sets and verifies the tag kill code.  For Class 1 tags the lock code [0xA5] is also verified (Gen 2 has no lock code).  This establishes the tag kill code and locks the tag preventing any further modification of the tag ID, or CRC.  The command begins with a tag search which repeats up to the given number of find tag retries or until a valid tag is found.  Subsequently, the Lock command is iterated up the number of lock retries or for Class 1 until the tag read response consists of only the CRC followed by the 12 bytes of Tag ID data indicating LOCK is verified.  Note the kill code and lock code are not backscattered on locked Class 1 tags.  For Gen 2 tags after the kill password is written both the EPC and kill password are locked and the tag response indicates success or failure which verifies the LOCK. Note the kill password is not backscattered on locked Gen2 tags.   Since The RF2400 only supports tags written in 96 bit format, the only valid ID length is twelve (0x0C).  Additionally, the lock command will only function on tags previously  written  in  a  96-bit  format  having  an  IDLEN  of  12  bytes.    A  successful operation is determined if LOCK is verified. If successful a MSGOK will be returned otherwise an error code indicating the failure will be returned.  Error codes (CommCode) include HWERR, UNKTAGCMD, NOTAG, DATASIZE, TAGLOST, TAGLOCK, and LOCKFAIL.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x50  7 Bytes  1st Byte—Tag Retries  0x00-0xFF 2nd Byte--Lock attempts  0x01-0xFF 3rd Byte-- ID Length  0x0C  4th – 7th   Bytes     Class 1  (first byte only)               KILL code                  0x00-0xFF      Gen2     (all four bytes)               kill password                0x00000000 – 0xFFFFFFFF 0 Bytes  -- Table 5-22   Lock Tag
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 31  11:56:13 AM 5.1.3.10 Program Tag Init (0x54)  This variant of the Program Tag command writes 0x3000 to the PC (protocol control) field, and then continues to write data to the tag ID.  This sets up an un-initialized tag for a 96 bit EPC.  The command includes: four control parameters and the ID data.  The first three  parameters  (find tag  retries,  erase  retries,  and  program  retries)  establish  retry counters for detecting the presence of a tag, erasing the tag and finally programming the tag.  The RF2400 only supports tags written in 96 bit format.  Correspondingly, the only valid  ID  length  is  twelve  (0x0C)  and  must  match  the  number  of  ID  data  bytes  in  the command.  If the Tag is Class 1, A CRC (CRC-CCITT-16) is generated for the 96-bits of ID data and programmed into the first two bytes in tag memory followed by the ID data.  This command does not write the LOCK or KILL bytes. If successful a MSGOK will be returned otherwise an error code indicating the failure will  be  returned.    Error  codes  (CommCode)  include  HWERR,  UNKTAGCMD, UNKIDLEN NOTAG, ERASEFAIL, PROGFAIL, TAGLOST, and TAGLOCK.  If the Mtype  field  in  the  response  is  non-zero,  an  error  has  occurred,  and  the  tag  must  be considered invalid.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x54  16 Bytes  1st Byte—Find Tag retries  0x00-0xFF 2nd Byte--Erase retries  0x00-0xFF 3rd Byte--Program retries 0x00-0xFF 4th Byte—ID Length  0x0C 5th -16th Bytes—ID Data (12 Bytes) 0 Bytes  -- Table 5-23   Program Tag Init  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Xrty  Erty  Wrty  Len     10  01  01  FF  54  7  7  7  0C    Tag ID            CRCH  CRCL  DLE  EOM   01  02  03  04  05  06  07  08  09  0A  0B  0C   2D  84  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  CRCH  CRCL  DLE  EOM  10  01  01  FF  54  00  81  F9  10  02     Program Tag Init Example   Note:  this example assumes that the command executes successfully.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 32  11:56:13 AM 5.1.3.11 LockG2 (0x55)  The  LOCKG2  command  is  specifically  used  with  Gen  2  tags.    It  allows  locking  of individual passwords and memory banks. The lock status for a password or memory bank can be Perma-locked (making it permanently unchangeable).  The command begins with a tag search which repeats up to the given number of find tag retries or until a valid tag is found.  Subsequently, the Lock command is iterated up the number of lock retries.  The Data Length of 8 indicates that following are 4 byte Access Password, 2 byte Mask and 2 byte Action field.  The Access Password supplied must match that of the tag’s otherwise the command will fail with a TAGLOST response.  If an Access Password has not been written to the tag, it defaults to 00000000. Note:  If the access password is not zero, tag writes will be done from the OPEN state, not the SECURED state.  There are 2 methods that can be used to write.  First: a locked tag  may  be  unlocked  by  clearing  the  PWD  bit  using  the  LOCKG2  command  before attempting  to  write,  Second:    Enter  the  access  password with the Access command to cause  transition  from  OPEN  to  SECURED  state  for  reads  and  writes.    The  LOCKG2 command does transition from OPEN to SECURED using the supplied password. If the tag’s access password is zero, the tag never enters the OPEN state, but goes directly to the SECURED state. Use the  Write Tag Memory command to write passwords to the tag.  Refer to section 5.4.1. If successful a MSGOK will be returned otherwise an error code indicating the failure will be returned.  Error codes (CommCode) include HWERR, UNKTAGCMD, NOTAG, DATASIZE, TAGLOST, TAGLOCK, and LOCKFAIL.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x55  11 Bytes  1st Byte—Tag Retries  0x00-0xFF 2nd Byte--Lock attempts  0x01-0xFF 3rd Byte-- Data Length  0x08  4th – 7th   Bytes—Access Password 8th – 9th  Bytes—10 bit Mask 10th – 11th Bytes—10 bit Action  0 Bytes  -- Table 5-24   LockG2  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Xrty  Erty  Len     10  01  01  FF  55  07  07  08     Access Password      MaskH  MaskL  ActionH ActionL  CRCH  CRCL  DLE  EOM   01  02  03  04  00  20  00  20   2F  4E  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  CRCH  CRCL  DLE  EOM  10  01  01  FF  55  00  B6  C9  10  02     LockG2 Example (Lock EPC)   Note:  this example assumes that the command executes successfully.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 33  11:56:13 AM Lock contains two 10 bit fields, a mask and action, each sent as two bytes with the upper 6 bits of the high byte not used.  The high byte (bits 15-8) is sent first.  Field  Not used  Kill password  Access password  EPC memory  TID memory  User memory bit  15 - 10  9  8  7  6  5  4  3  2  1  0 mask    Skip/ write  Skip/ write  Skip/ write  Skip/ write  Skip/ write  Skip/ write  Skip/ write  Skip/ write  Skip/ write  Skip/ write action    Pwd Read/ write Perma lock  Pwd Read/ write Perma lock  Pwd write  Perma lock  Pwd write  Perma lock  Pwd write  Perma lock Table 5-25   Lock bit usage  Bit function is as follows:   Mask = 0: Ignore the associated action field and retain the current lock setting..   Mask = 1: Implement the associated action field and overwrite the current lock setting.   Action = 0: Deassert lock for the associated field.   Action = 1: Assert lock or perma-lock for associated field.  Note: Perma-lock bits, once asserted, cannot be deasserted.  Pwd-write  Perma-lock  Description 0  0  Bank is writable from either the OPEN or SECURED state. 0  1  Bank is permanently writable from either the OPEN or SECURED state. 1  0  Bank is writeable from the SECURED state but not from the OPEN state. 1  1  Bank is not writable from any state. Pwd-read/write  Perma-lock  Description 0  0  Password is readable and writeable from either the OPEN state or the SECURED state. 0  1  Password is permanently readable and writeable from either the OPEN or  the SECURED state. 1  0  Password is writeable from the SECURED state but not from the OPEN state. 1  1  Password is not readable or writable from any state. Table 5-26   Lock action field functionality
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 34  11:56:13 AM 5.1.3.12 Access G2 (0x56)  The Access command allows entry of an Access password for communication with GEN 2 Tags.  This command does not communicate with the tag. If the tag’s access password is zero, the tag never enters the OPEN state, but goes directly to the SECURED state and this command is not needed. If the tag’s access password is non-zero, the tag enters the OPEN state.  The password entered  with  this  command  is  used  to  bring  the  tag  to  the  SECURED  state,  allowing writes to an area that is non-perma locked.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x56  5 Bytes  1st Byte—Data Length  0x04 2nd – 5th Byts-- Access Password   0 Bytes  -- Table 5-27   AccessG2   COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Len     10  01  01  FF  56  04   Access Password      CRCH  CRCL  DLE  EOM   01  02  03  04  67  6C  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  CRCH  CRCL  DLE  EOM  10  01  01  FF  56  00  EF  99  10  02     AccessG2 Example
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 35  11:56:13 AM 5.1.3.13 Read Tag Memory (0x57)  The Read Tag Memory command allows an interrogator to read from 1 to 16 words from a  Tag’s  Reserved,  EPC,  TID  or  User  memory.    Read  Tag  Memory  has  the  following fields: • Bank - Bits 7,6 of Extent select Reserve, EPC, TID, or User memory. • Length - Bits 5-0 of Extent indicates the number of bytes to write. • Address - Indicates the word offset within the bank.  For Tag memory layout information please see Table 5-42 Although  the  length  is  specified  in  bytes  (counts  bytes  transferred  across  the  serial interface), the Tag memory is accessed in words.  The length supplied must be even or else an error is returned.  The maximum length supported is 16 bytes (8 words).  If a larger number is requested, an error will be returned.  The maximum address supported is 16383 (14 bits).  If a write is attempted to an area not supported by the Tag, an error is returned.  The Read Tag Memory command is only supported for Gen2 tags. If successful, a MSGOK response is returned, otherwise an error response is given with the  Message  Type  (CommCode)  indicating  the  failure.    Possible  CommCodes  include NOTAG, TAGLOST, TAGLOCK, TAGNXM, UNKCMD, and UNKVAL.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x57  3 Bytes  1st Byte—Extent (bank/length) 2nd/3rd Byte—Word Address H/L 0-16 Bytes  Read Data-- Table 5-28   Read Tag Memory  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Extent  AdrH  AdrL  CRCH  CRCL  DLE  EOM   10  01  01  FF  57  04  00  02  A7  89  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  Tsts  Ant#  Len    10  01  01  FF  57  00  00  00  04    TAG data      CRCH  CRCL  DLE  EOM   01  02  03  04  FE  75  10  02     Read Tag Memory Example (read access password)
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 36  11:56:13 AM 5.1.3.14 Write Tag Memory (0x58)  The Write Tag Memory command allows an interrogator to write from 1 to 8 words to a Tag’s  Reserved,  EPC,  TID  or  User  memory.    Write  Tag  Memory  has  the  following fields: • Bank - Bits 7,6 of Extent select Reserve, EPC, TID, or User memory. • Length - Bits 5-0 of Extent indicates the number of bytes to write. • Address - Indicates the word offset within the bank. • Data - Up to 16 bytes (8 words) to be written.  For Tag memory layout information please see Table 5-42 Although  the  length  is  specified  in  bytes  (counts  bytes  transferred  across  the  serial interface), the Tag memory is accessed in words.  The length supplied must be even or else an error is returned.  The maximum length supported is 16 bytes (8 words).  If a larger number is requested, an error will be returned.  The maximum address supported is 16383 (14 bits).  If a write is attempted to an area not supported by the Tag, an error is returned.  The Write Tag Memory command is only supported for Gen2 tags. If successful, a MSGOK response is returned, otherwise an error response is given with the  Message  Type  (CommCode)  indicating  the  failure.    Possible  CommCodes  include NOTAG, TAGLOST, TAGLOCK, TAGNXM, UNKCMD, and UNKVAL.  Command Data  Response Date Command Code  Size  Valid Values  Size  Valid Values 0x58  4-19 Bytes  1st Byte—Extent (bank/length) 2nd/3rd   Byte—Word Address H/L 3rd – 19th   Bytes—Data 0 Bytes  -- Table 5-29   Write Tag Memory  COMMAND  DLE  SOM  SesID  Rdr#  Cmd  Extent  AdrH  AdrL  Data        CRCH  CRCL  DLE  EOM   10  01  01  FF  58  04  00  02  01  02  03  04  7B  20  10  02  RESPONSE  DLE  SOM  SesID  Rdr#  Echo  Mtype  CRCH  CRCL  DLE  EOM  10  01  01  FF  58  00  F4  98  10  02     Write Tag Memory Example (write access password)
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 37  11:56:13 AM 5.2 SERVICE PORT COMMANDS In addition to the binary message format, the RF2400 supports an ASCII communication mode providing a service menu using the existing RS232 interface.  The RF2400 powers up accepting binary messages as described in section 5.1 above and posts a single line message containing the current version of the firmware.  To activate the service menu, it is necessary  to  send  the  proper  token  lead-in  sequence  ([DLE][SMR]) as shown in Table 5-30.    Two  sets  of  commands  are  available;  standard  and  protected  provide  user  and factory/service personnel associated command and configuration menus.  Token  Description [DLE] Data Link Escape token; 0x10   (^p) [SMR] Service mode token; 0x04   (^d) Table 5-30   Service Port Lead-in sequence 5.2.1 Standard Commands Standard commands are available to all users and are documented in this specification. These  commands  provide  a  means  to  test  the  basic  operation  of  the  reader  and  to configure several operating parameters.  Note all operating parameters can be returned to the factory defaults by installing the jumper JX and powering cycling the board.  5.2.1.1 Baud Rate (baud) command The baud rate (baud) command allows the user to reconfigure the RS232 interface baud rate.  There are six baud rates available ranging from 9,600 baud to 115200 baud.  Baud rates are represented using a single decimal parameter from 0 to 5: baud 0 = 9600, baud 1 = 19200, baud 2 = 38400, baud 3 =57600, and baud 4 = 115200,.  The default RS232 configuration is 19,200 baud using 8 data bits, 1 stop bit, and no parity.  The current baud rate is read using the baud <CR> and is displayed as a 0-4.  A new baud rate is selected using baud=n<CR> where n represents the rate selected from 0-4.  The current baud rate remains in effect until the new rate has been entered and the command line displays the command prompt. 5.2.1.2 Transmit Power Step (Txp[0-3]) command The transmit power step (txp[0-3]) command is used to set the four transmit power steps used  to access a  tag.    The  RF2400  reader  always  starts  at  the  lowest  power  and successively increases the power level until a valid tag is found.  Each transmit power step is represented using a single decimal parameter from 0 to 3.  The power level at a particular  power step is read using the txp[0-3]<CR> command.  The associated power levels are represented by a decimal number from 0 to 600 and represent the approximate power  levels  shown  in  Table  5-31.    A  new  transmit  level  is  established  using txp[0-3]=n<CR> where  n  is  a  decimal  number  from  0  to  600.    Upon  completion  the command prompt is displayed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 38  11:56:13 AM Note  the  power  level  settings  are  limited  by  factory  minimum  and  maximum  transmit power configuration.  Power Level  Transmit Power (dBm)  DC Current (mA) 180  -10.1  249 190  -4.7  261 200  -1.0  271 220  3.9  289 250  8.3  320 300  13.1  384 350  16.5  459 400  19.1  533 450  21.2  618 500  23.0  700 550  24.6  795 600  25.8  872 Table 5-31   Transmit Power Level Note: average current input to the RF2400 is limited to 550mA for the USB version.  A super capacitor is used to provide more current for a short period of time.  Selecting a power level greater then 350 for USB configurations or 600 for the standard board with the RF Carrier on continuous will exceed power limits and reset the board. During normal operation capacitance in the power supply meets short term current requirements  5.2.1.3 Receive Threshold (rxt) command The Receive  Threshold  (rxt)  command allows the receive threshold  to be adjusted  for testing.  A decimal parameter represents an A/D count with a scale factor of 0.732 mV per count.  A value of 6 represents 4.4mV at the A/D converter or -68dBm at the antenna input.  This command affects two separate thresholds.  The parameter is used directly to set  the  signal  detect  threshold  which  by  default  is  15  or  10.98mV  or  -60dBm  at  the antenna input.  The receive threshold parameter is scaled by a factor of 5 to set the data high/low detection levels which by default is 3 or 2.196 mV above or below the average signal level.  The rxt is executed using rxt=n<CR> where n is a decimal value from 4 to 64.  Upon completion the command prompt is displayed. 5.2.1.4 Phase (phs) command The Phase (phs) command is used to configure receiver phase of the RF2400.  Because of the controller architecture, signal nulls exist based carrier frequency and tag to antenna spacing.  Selecting the opposite phase will move this null, allowing this tag to be read.  By  default,  automatic  phase  control  is  selected.    In  the  retry  scheme,  if  an  error  is encountered  in  selecting a tag, the opposite  phase  is  tried  first  before  stepping the Tx power or hopping.  If a successful read is accomplished following the phase switch, this phase  setting  is  saved  on  a  per-channel  basis.    On  commands  that  have  a  “Find  Tag Retries”,  this  must be  set  to  at  least  one.    However,  the  phase  retries are not counted toward the command’s retry count. The phs command is executed by typing phs =n<CR> where n is a decimal setting.  A value  for  n  equal  to  0  or  1  forces  either  of  the  two  phases  while  a  2  toggles  to  the opposite phase.  Any of these three settings disables auto phase switching and are used
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 39  11:56:13 AM mainly for debug.  Uning n equal to 10 sets auto phase switching on retries and is the default.   Using N equal to 20 initializes the phase per channel table to all 0’s while n equal  to  21  initializes  the  phase  per  channel  table  to  all  1’s.    Executing  the  eedef command initializes the phase per channel table to all 0’s (as well as setting all of the EEPROM  variables  to  factory  defaults).    Both  the  phase  setting  and  phase  table  are stored  in  EEPROM  and  restored  on  power-up.    By  starting  with  the  phase  that  last resulted in a good read for a channel, many retries will be eliminated, providing the tag distance is constant.  Upon completion the command prompt is displayed. 5.2.1.5 Tag Class (tc) command The tag class (tc) command is used to configure the reader for either a Class 1 tags, Gen 2 tags or optionally to automatically identify the tag class.  When auto is selected the reader attempts to initially read a Gen2 class tag and after the retry scheme has been exhausted will  attempt  to  read a  Class  1  tag.  This  option will  extend  the  time to read a tag and should be used with an understanding of this limitation.  The current tag class can be read using the tc<CR> command or set using tc=n<CR>, where n is a number from 0x1 to 0x3.  The value 0x1 indicates Class 1, a 0x2 represents Gen2 and a 0x3 represents Auto class.  Upon completion the command prompt is displayed. 5.2.1.6 Read Retry (rrty) command The read retry (rrty) command is used to establish the number of retries used for either the Get ID or Get Raw ID host commands.  A retry consists of a read attempt at the next power level defined by the transmit power step command (refer to 5.2.1.2).  Every fourth retry includes a hop to a channel at least 8 channels away and lowers to power level back to the level defined by the txp0<CR> command.  The value is persistent and is maintained when the board is power cycled.  The default value is 4.  The rrty command is executed using rrty=nnn<CR> where nnn is a value from 0-255 decimal representing the number of retries.  Upon completion the command prompt is displayed. 5.2.1.7 Read Tag (rt) command The read tag (rt) command is used to initiate a single tag read attempt at the current txp power level without retries.  Each execution of the rt command first selects a different random channel from the configured frequency table, then attempts to read the tag.  If hopping has been disabled (Protected Command) the rt command will not select a new channel  and  will  always  use  the  same  channel.    The  rt  command  is  executed  using rt<CR>.  Results of a successful read attempt for a Class 1 or GEN2 tag are displayed on the command line as fourteen bytes of tag data:  (12-bytes EPC) followed by the ID length (64 or 96), the CRC (CRC nnnn) and channel number (Chnn) . Unsuccessful read attempts result with an error code detailing the nature of the read failure as shown in Table 5-37.  Upon completion, the command prompt is displayed. 5.2.1.8 Read Loop (rl) command The read loop (rl) command is used to initiate an iterative rt command.  Each iteration of the rt command operates at a different random channel, from the configured frequency
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 40  11:56:13 AM table.  If hopping has been disabled (Protected Command) all tag reads will use the same channel.  The rl command is executed using rl<CR> using a default loop interval of ½ second  or  rl=nn<CR>  where  nn  represents  the  loop  time  interval  in  10ths  of  a  second.  Results  of  a  successful  read  attempt  for  a  Class  1  or  GEN2  tag  are  displayed  on  the command line as fourteen bytes of tag data:  (12-bytes EPC) followed by the ID length (64 or  96),  the  CRC  (CRC  nnnn)  and  channel  number  (Chnn).    Unsuccessful  read  attempts result with an error code detailing the nature of the read failure as shown in Table 5-37.  Entering a <CR> will terminate the command.  Upon completion, the command prompt is displayed. 5.2.1.9 Sequential Loop (sl) command The read loop (sl) command is used to initiate an iterative rt command.  Each iteration of the rt command operates at the next sequential channel, from the configured frequency table.  If hopping has been disabled (Protected Command) all tag reads will use the same channel.  The sl command is executed using sl<CR> using a default loop interval of ½ second  or  sl=nn<CR>  where  nn  represents  the  loop  time  interval  in  10ths  of  a  second.  Results  of  a  successful  read  attempt  for  a  Class  1  or  GEN2  tag  are  displayed  on  the command line as fourteen bytes of tag data:  (12-bytes EPC) followed by the ID length (64 or  96),  the  CRC  (CRC  nnnn)  and  channel  number  (Chnn).    Unsuccessful  read  attempts result with an error code detailing the nature of the read failure as shown in Table 5-37.  Entering a <CR> will terminate the command.  Upon completion, the command prompt is displayed. 5.2.1.10 Write Tag (wt) command The write tag (wt) command is used to initiate a single tag write attempt at txp0 level (plus 50) without retries.  Hopping is not used for a write operation thus wt commands will  use  the  same  channel.    The  wt  command  is  executed  using  wt<CR>  to  write  the default  tag  ID  of  0123456789ABCDEF01234567  or  to  write  a  specific  tag  ID  using wt=nnnnnnnnnnnnnnnnnnnnnnnn<CR>  where  n  is  one  of  24  hex  characters representing the tag EPC code (missing characters are zero filled).  For Class 1 tags the CRC is calculated and appended to the data prior to being written to the tag.  For Gen2 tags  CRC  operations  are  handled  by  the  Tag.    Using  Class  1  tags  there  is  no  error checking for the write command and the tag must be read after being written to verify the operation was completed successfully.  Gen2 tags provide a response to a write operation indicating success or failure.  Upon completion, the command prompt is displayed. 5.2.1.11 Lock Tag (lt) command The lock tag (lt) command is used to establish the kill code and lock the tag to prevent further modification of the tag ID, or CRC.  The lt command will only operate on tags written  in  96  bit  format.    The  lt  command  is  executed  using  lt=nn<CR>  or lt=nnnnnnnn<CR> where nn is the hexadecimal representation of the kill code for Class1 tags  and  nnnnnnnn  is  a  hexadecimal  representation  (must  be  non-zero)  of  the  kill password for Gen2 tags.  Class 1 tags provide no response to this command while Gen2
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 41  11:56:13 AM tags respond with a success or failure status which is provided in the host response.  To verify the tag was properly locked the tag should be read to confirm the read response consists of only the CRC followed by the 12 bytes of Tag ID data.  Upon completion, the command prompt is displayed. 5.2.1.12 Lock Tag G2 (l2) command The lock tag G2 (l2) command is specifically used with Gen 2 tags.  It allows locking of individual passwords and memory banks. The lock status for a password or memory bank can be Perma-locked  (making it permanently unchangeable). The command requires 8 bytes of parameters (16 hex character), 4 byte Access Password, 2 byte Mask and 2 byte Action field.  l2=xxxxxxxxyyyyzzzz The Access Password supplied must match that of the  tag’s  otherwise  the  command  will  fail  with  a  NOTAG  response.    If  an  Access Password has not been written to the tag, it defaults to 00000000. Refer to the host LOCKG2 command section 5.1.3.11 for further information. 5.2.1.13 Access (apw)  The Access (apw) command allows entry of an Access password for communication with GEN 2 Tags.  This command does not communicate with the tag. If the tag’s access password is zero, the tag never enters the OPEN state, but goes directly to the SECURED state and this command is not needed. If the tag’s access password is non-zero, the tag enters the OPEN state.  The password entered  with  this  command  is  used  with  tag  reads  and  writes  to  bring  the  tag  to  the SECURED state, allowing writes to an area that is non-perma-locked. 5.2.1.14 Kill Tag (kt) command The kill tag (kt) command permanently erases the tag data or deactivates the tag so it will no longer respond to or execute reader commands.  The kt command attempts to kill the last tag read eliminating the need to enter a tag ID but requires a kill code that matches the tag kill code.  The command will only operate on tags written in 96 bit format  The kt command  is  executed  using  kt=nn<CR> or kt=nnnnnnnn<CR>  where  nn  is  the hexadecimal  representation  of  the  kill  code  for  Class1  tags  and  nnnnnnnn  is  a hexadecimal representation (must be non-zero) of the kill password for Gen2 tags.  Class 1 tags provide no response to this command while Gen2 tags respond with a success or failure  status  which  is  provided  in  the  host  response.    To  verify  the  tag  was  properly killed the tag should be read to confirm the read response consists of all zeros or the tag will no longer responds to reader commands.  Upon completion, the command prompt is displayed.  5.2.1.15 Quiet Tag (qt) command The  quiet  tag  (qt)  command  can  be  used  to  temporarily  prevent  a  Class  1  tag  from responding to tag commands.  The tag enters the sleep state where it no longer responds
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 42  11:56:13 AM reader  commands  except  the  talk  command  or  the  persistence  mode  limit  times  out. Before using this command a read tag rt must be executed to capture the tag ID.  The qt is executed by qt<CR>.  Upon completion, the command prompt is displayed.  5.2.1.16 Erase Tag (et) command The erase tag (et) command is used to erase tag data.  If the tag is not locked, the IDdata is erased to zeros for both Class 1 and Gen2 tags.  Additionally, the CRC, Kill Code, and Lock bytes are erased to zero in Class 1 tags.   Hopping is not used for an erase operation thus et commands will always use the same channel.  The et command is executed using et<CR>.  Upon completion, the command prompt is displayed.  5.2.1.17 Paper Sensor Triggered Read (pstr) command The paper sensor triggered read (pstr) command is used to enable automatic tag reading based on the state of the optical reflection sensor.  Using this command, triggered reading can  be  enabled  or  disabled,  set  to  operate  in  host  or  service  port  mode,  based  on reflection or no reflection and set to persist over power cycling.  The triggered read state (pstrs) can be read using pstr<CR> command or set using pstr=n<CR> where n (pstrs) is a value from 0x0-0x3F.  The bit definitions for pstrs follow: Bit 0   enables  or  disables  triggered  reads  where  a  one  (1)  indicates  triggered  read  is enabled and a zero (0) indicates disabled. Bit 1   indicates which optical state is used to trigger a read where one (1) triggers the read on a no reflection and a zero (0) triggers the read on reflection.  This bit is ignored when a switch is used in place of the optical sensor(bit 4 is set to a 1) Bit 2   is reserved and is ignored. (used internally to indicate host vs SP mode) Bit 3   establishes  if  the  state  persists over  power  cycles  where a one  (1) indicates  the state persists over a power cycle and a zero (0) indicates that the state does not persist. Bit 4   set to one (1) indicates a switch is used instead of the sensor for triggering.  When the switch contacts are closed the state is triggered. Bit 5   determines  whether  the ID  data  are returned  or stored.    A zero  (0)  indicates  to return  the  ID data  immediately, while a one  (1) causes  the  data  to be  stored  in EEPROM  for  future  retrieval.    Refer  to  the  “Dump  ID  Data”  command.    Bad reads are not stored in EEPROM. When enabled using the pstr command, with bit 5 = 0, triggered read tag data are sent as ASCII in service port mode. When storing to EEPROM, only good reads are stored.  When the EEPROM log is full (496 records), the pstr function is terminated.  An error message is sent to the service port (error 43). Note: To use a switch in place of the paper sensor, wire between J3 pins 1 and 2. 5.2.1.18 Paper Sensor (ps) command
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 43  11:56:13 AM The paper sensor (ps)  command is used to monitor the output of the optical reflection sensor for debug purposes.  Using the ps command, the sensor is polled and A/D readings are  displayed  as  a  decimal  number  from 0 to 4095.    This  number  is  the  difference  in output  between  the  sensor  LED  driven  and  not.    The  number  is  followed  by  a  zero indicating no reflection or a one to indicate that there is an object in the optical path.  The ps  command  is  executed  using  ps<CR>  and  continues  until  a <CR> is  sent.    Upon completion, the command prompt is displayed.  5.2.1.19 Paper Sensor Threshold (pst) command The Paper Sensor Threshold (pst) command sets the trigger point for sensing reflection.  This number represents the sensor A/D reading difference between the emitter LED on and off.  A Hysteresis of 200 is used, that is, once reflection is triggered, the value must drop 200 before reflection status is reset.  Valid values are from 250 to 4000.  The pst command is  executed using pst=n<CR> where n is a decimal value from 250  to 4000.  Use  the  ps  command  to  monitor  and  determine  the  threshold  required  for  a  particular paper and ink.  Upon completion, the command prompt is displayed.  5.2.1.20 Auto Read Tag (art) command The auto read tag (art) command continuously polls for a tag and when a tag is found and different from the last tag read, the tag data is sent in service port mode to be displayed or stored  in  EEPROM.    Bit  0  of  a  parameter  byte  determines  whether  the  ID  data  are returned or stored.  The art command is executed using art=n<CR> where n represents a hexadecimal  value.    A  zero  indicates  to  return  the  ID  data  immediately,  while  a  one causes the data to be stored in EEPROM for future retrieval (refer to the Dump ID Data command section 5.2.1.21). When storing to EEPROM, only good reads are stored.  When the EEPROM log is full (496 records), the auto read tag function is terminated.  An error message is sent to the service port (error 43). This command is illegal if pstr mode is enabled and an illegal response will be displayed.  Entering  a  <CR>  or  any  other  command  will  terminate  the  art  command.    Upon completion, the command prompt is displayed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 44  11:56:13 AM 5.2.1.21 Dump ID Data (did) command This dump id data (did) command returns ID data that has been stored in EEPROM.  A 16  bit  parameter  is  required.    The  upper  byte  of  the  parameter  indicates  how  many records  to  return  and  the  lower  byte  is  a  sub  command.    An  internal  pointer  can  be optionally  initialized  to  the  first  record  and  is  used  and  tracks  records.    Subsequent commands can fetch the next group  of records.   The data dump will stop whenever a zeroed record is encountered (end of stored data).  The EEPROM (8Kx8) can store up to 496 entries.  The did command is executed using did=nnmm<CR> where nn represents the number of records and mm represents the subcommand in hexadecimal.  The lower parameter byte contains a sub-command as follows:  1  Reset pointer and dump. 2  Dump from pointer. 3  Get number of records stored. 4  Clear all.  5.2.1.22 Program Flash (pf) command The program flash (pf) command invokes the serial port boot loader.  The loader is used to download a firmware upgrade and program the new code into flash memory.  Until the upload  sequence  is  initiated  by  the  host,  no  change  is  made  to  flash  memory  and  the command can be aborted by power cycling the controller.  The host software includes extensive  error  checking  to  confirm  that  the  controller  firmware  is  updated  correctly.  When  the  download  completes  the  controller  is  auto  restarted  with  the  new  firmware.  The pf command is executed using pf<CR>.  A response message FLASH is displayed on the command line.   When the  operation is complete and the  firmware is restarted, the initial power-up message “RF2400 Ver xx” is displayed  5.2.1.23 Speaker Test (st) command The speaker test (st) command beeps the speaker continuously using a one second tone followed by a one second interval.  This command is useful to debug the speaker circuit operation.    The  st  command  is  executed  using  st<CR>  and  continues  until  <CR>  is executed.  Upon completion, the command prompt is displayed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 45  11:56:13 AM 5.2.1.24 Beep (beep) command  The beep (beep) command is used to establish the operation of the speaker.  The speaker can operate as a function of read activity, based on the optical trigger, or be completely disabled.  The (beep) command is executed using beep=n where n is a bit mapped value from 0-7.  A value of 0 disables the speaker. bit 0 selects tag activity beep bit 1 selects the optical trigger beep bit 2 selects error beep. The  current  beep  setting  can  be  read  using  the  beep<CR>  command.    Activity  and triggered read beeps use a frequency of 1500Hz while the error beep uses 750Hz.  Upon completion, the command prompt is displayed.  5.2.1.25 Set EEPROM Defaults (eedef) command  The set EEPROM defaults (eedef) command is used to rewrite the EEPROM to the factor defaults.    The  eedef  command  is  executed  using  eedef<CR>.    Whenever  the  RF2400 firmware is updated it is recommended to execute this command to insure the EEPROM has the appropriate settings.  Upon completion, the command prompt is displayed.  5.2.1.26 Read EEPROM (ree) command The  read  EEPROM  (ree)  command reads and  displays  eight  (8)  consecutive  locations from a user provided starting location.  The ree command is executed using ree=nnnn where nnnn represents the hexadecimal starting address from 0x0000 to 0x1FF8.  This command is provided for debug purposes only.  Upon completion, the command prompt is displayed.  5.2.1.27 No initial message (noim) command The no initial message (noim) command can be used to enable or disable the RF2400 initial  power  up  message.    By  default,  following  power-up,  the  RF2400  sends  an identifying  message out the serial port “RF2400 ver n.nn” where n.nn is  the firmware revision.    This  message  may  confuse  connected  RS232  host  equipment.  The  noim command  is  executed  using  noim=n  where  n  is  a  1  to  disable  or  a  0  to  enable  the message.  This setting is preserved in EEPROM.  Upon completion, the command prompt is displayed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 46  11:56:13 AM 5.2.1.28 Diagnostic (di) command  The diagnostic (di) command is used to verify controller functionality in production.  The diagnostics are executed using di<CR>.  A set of tests are run in order. If any test fails, the failed  test  number  and  an  error  code  are  displayed.    Upon  completion,  the  command prompt is displayed. Diagnostic Test Summary Test 1:  The two I/O ports are tested to insure that they can be individually set and cleared.  If failure, error code 0x80 indicates a problem with port 0, and 0x81 indicates port 1 failed.  Test 2:  Test  the  photo  paper  sensor  circuit.    The  test  fixture  connects  all  4 leads together.  This connects the LED driver to a 75 ohm pull-up resistor and to the amplifier input.  The diagnostic turns the LED driver on and off and checks the output of the amplifier through the A/D converter.  The amplifier output  is checked at less than 0.25V and more than 2.9V.  A failure is indicated by error code 0x83.  Test 3:  The  VCO  (voltage  controlled  oscillator)  is  tested.    First, communication between the microcontroller and the VCO is verified.  If fail, and error code of 0x30 is displayed. The VCO is tested to insure that the PLL can lock at channels 1, 25, and 48.  If lock is not detected, an error code of 0x31 is displayed.  Test 4:  Test the read electronics offset voltage for nominal 1.65V.  A failure with error code of 0x85 indicates that the offset voltage was outside of the range of 1.4V to 1.8V.  Another possible error code that can be encountered here or in the following test is 0x50 , indicating A/D converter time-out.  Test 5:  This test attempts to transmit data while monitoring the receive circuit.  The  received  signal  for  this  test  is  caused  by  a  reflection  from  the  tag  while transmitting a modulated signal.  The tag is placed at a non-ideal distance from the antenna to insure some reflection. The received signal is tested for an average level between 0.5 and 2.5V.  This also insures that the circuitry has not driven to either the ground of 3.3V rail.  A failure here is indicated by error code 0x86. This test also checks for a P-P (peak-to-peak) signal of at least 0.25V with error code of 0x87 used to indicate a failure.  Test 6:  The final test attempts to read the tag.  If successful, the tag ID and CRC are displayed, followed by the word passed.  Possible error codes are 0x20 no tag, or 0x21 tag lost.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 47  11:56:13 AM Diagnostic Error Code Summary  0x20  No Tag detected (read tag fail) 0x21  Tag Lost (read tag fail) 0x30  Chipcon VCO communication fail 0x31  VCO PLL won’t lock. 0x50  A/D converter time-out 0x80  Port 0 fail 0x81  Port 1 fail 0x82  Paper Sensor circuit fail 0x85  Read Offset out-of-range 0x86  Read Average signal out-of-range 0x86  Read signal P-P voltage too low   Additional diagnostic information can be displayed to assist in the diagnosis of problems.  The diagnostic display can be executed using di=d<CR> displaying A/D results from the diagnostics.  ofs=2379  174 min=1935 141 max=2901 212 P-P=966  70 dtxp=250  For the 1st 4 lines, the 1st number following the equal sign is the measured A/D count and the second number is the reading converted to voltage in hundredths of a volt.  Dtxp is a relative Tx power level which defaults to 250.  The acceptable ranges are:  ofs 1912-2459 (1.4-1.8V) aver 683-3415(1.5-2.5V) P-P greater than 966(0.25V)
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 48  11:56:13 AM 5.2.1.29 Ignore CRC (icrc) command The ignore CRC (icrc) command is used for debug and testing.  This command disables CRC checking of host commands and eliminates the need to manually calculate the CRC when  using  a  generic  serial  port  program  for  communication  in  host  mode.    The  icrc command  is  executed  using  icrc<CR>.    Upon  completion,  the  command  prompt  is displayed.  5.2.1.30 Exit (exit) command The  exit  (exit)  command  is  used  to  exit  service  port  mode  and  resume  the  media independent binary command protocol.  The exit command is executed using exit<CR>.  5.2.1.31 Display menu (??) command The display menu (??) command is used to display the standard service port commands for  reference.  The  ??  command  is  executed  using  ??<CR>.    Upon  completion,  the command prompt is displayed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 49  11:56:13 AM 5.2.1.32 Standard command summary The following table summarizes the standard service port commands.  Command  Type  Persistent  Range  Default  Description baud  r/w  Yes  0-4  1  Read or set baud rate (see Table 5-6) txp0  r/w  Yes  0-999  215  Tx power step (limit between min-max) txp1  r/w  Yes  0-999  275  Tx power step (limit between min-max) txp2  r/w  Yes  0-999  335  Tx power step (limit between min-max) txp3  r/w  Yes  0-999  400  Tx power step (limit between min-max) rxt  r/w  Yes  0-255  15 = (11mV)  Read threshold x 0.732mV phs  r/w  Yes  0x20  0x10  0, 1, 2=tgl, 0x10=auto, 0x20=init tc  r/w  Yes  1-3  2  Tag Class (1=Class1, 2=Gen2, 3= Auto) rrty  r/w  Yes  0-255  7  Get ID & Get Raw ID retries rt  e  No  na  na  Read tag ID rl  ep  No  0-255  5  Read loop (Random) (delay in 1/10 sec) sl  ep  No  0-255  5  Sequential loop (delay in 1/10 sec) wt  ep  No  24 hex chars 0123456789ABCDEF01234567 Write tag ID (missing chars are zero filled) lt  e  No  0x00-0xFF  0x00  Lock Tag l2  e  No  8 bytes  na  Lock Tag GEN 2 kt  e  No  0x00-0xFF   0x00  Kill Tag qt  e  No  Na  na  Quiet Class 1Tag, must rt first to get ID et  e  No  na  na  Erase tag pstr  r/w  Programmable  0x0-0x1F  na  Paper Sensor Triggered Read ps  e  No  na  na  Paper sensor displays A/D and 0/1(hit) pst  r/w  Yes  250-4000  400  Paper Sensor threshold art  e  No  flags  0x00  Auto Read Tag (1=store) did  e  No  Len/sub  0x0000  Dump ID data pf  e  No  na  na  Program flash (invokes serial boot mode) st  e  No  na  na  Speaker Test beep  r/w  Yes  0-2  1  Beep Action (bit map) bit 0=Activity, bit 1=Trigger, bit2=Error eedef  e  No  na  na  Set EEPROM to Factory Defaults ree  e  No  na  na  Read EEPROM noim  r/w  Yes  0/1  0  1 = no initial message at power-up di  ep  No  d  na  Diagnostic, =d-display numeric results icrc  w  No  na  off  Ignore host cmd CRC (for debug only) exit  e  No  na  na  Exit SP mode to host mode ??  e  No  na  na  Display menu  Table 5-32   Service Port Commands - Standard
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 50  11:56:13 AM 5.2.2 Protected Commands The protected commands are for test and setup by qualified service technicians.  They allow setting of parameters for transmit power, channel hopping and frequency selection.  Additionally,  the PLL frequency  synthesizer internal registers  can be accessed.  These settings can affect the legal operation of the unit and are only available to manufacturing and  service  personnel.    These  commands  are  hidden  and  only  active  when  the  proper password has been entered using the password command. 5.2.2.1 Password (pw) command The password (pw) command is used to enable the protected service port commands. The pw command is entered using pw=n<CR> where n is a decimal number from 0 to 65535.   If you require  access  to  the  protected  commands,  contact  Ensyc  Technologies or your local service representative for the password.  The board may be power cycled to disable the protected commands or enter an invalid password e.g. pw=0000.  Upon completion, the command prompt is displayed. 5.2.2.2 Transmit power (txp) command The  transmit  power  (txp)  command  is  used  to  set  or  read  the  output  transmit  power.  Using txp<CR> will display the current transmit power level setting as a decimal number from 0 to 600.  Using txp=n<CR> where n is a decimal number from 0 to 600 will set the current transmit power level.  This setting is not limited by the maximum and minimum transmit  power  limits.    Upon  completion,  the  command  prompt  is  displayed.    Power cycling  the  board  or  exiting  the  SP  mode  will  return  the  transmit  power  level  to  the default txp[0] setting.  Upon completion, the command prompt is displayed. 5.2.2.3 Maximum transmit power (txpmax) command The maximum transmit power (txpmax) command is used to set or read the maximum allowed output transmit power.  Using txpmax<CR>  will display the maximum transmit power level setting as a decimal number from 0 to 600.  Using txpmax=n<CR> where n is a  decimal  number  from  0  to  600  will  set  the  maximum transmit power level  (refer  to Table 5-31   Transmit  Power  Level).    Additionally  any  transmit  power  step  setting greater then the maximum limit will be set to the maximum limit and a message “adjust steps” is displayed.  Upon completion, the command prompt is displayed. 5.2.2.4 Minimum transmit power (txpmin) command The  minimum transmit  power  (txpmin)  command is  used  to  set  or  read  the  minimum allowed output transmit power.  Using txpmin<CR> will display the minimum transmit power level setting as a decimal number from 0 to 600.  Using txpmin=n<CR> where n is a  decimal  number  from  0  to  600  will  set  the  minimum  transmit  power  level  (refer  to Table 5-31   Transmit Power Level).  Additionally any transmit power step setting less then the maximum limit will be set to the minimum limit and a message “adjust steps” is displayed.  Upon completion, the command prompt is displayed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 51  11:56:13 AM 5.2.2.5 Channel select (chan) command The channel select (chan) command is used to set or read the active channel number.  The  chan  command  chan<CR>  will  display  the  active  transmit  channel  as  a  decimal number from 0 to 49 and chan=n<CR> where n is a decimal number from 0 to 49 will set the active channel.  Upon completion the command line returns to the command prompt. Refer to Table 5-33 for a complete listing of channels and associated frequencies.  Upon completion, the command prompt is displayed.  Note: with hopping enabled the read command selects  the  next  random  channel  prior  to  the  reading  the  tag.  To  operate  on  a  single  channel  disable hopping (refer to section 5.2.2.6).  Also hidden channels 50 & 51 (password protected) provide a means to select 860MHZ and 960MHz respectively for diagnostic purposes.  Channel  Frequency (MHz)    Channel  Frequency (MHz) 0  902.75    25  915.25 1  903.25    26  915.75 2  903.75    27  916.25 3  904.25    28  916.75 4  904.75    29  917.25 5  905.25    30  917.75 6  905.75    31  918.25 7  906.25    32  918.75 8  906.75    33  919.25 9  907.25    34  919.75 10  907.75    35  920.25 11  908.25    36  920.75 12  908.75    37  921.25 13  909.25    38  921.75 14  909.75    39  922.25 15  910.25    40  922.75 16  910.75    41  923.25 17  911.25    42  923.75 18  911.75    43  924.25 19  912.25    44  924.75 20  912.75    45  925.25 21  913.25    46  925.75 22  913.75    47  926.25 23  914.25    48  926.75 24  914.75    49  927.25 Table 5-33   RF2400 USA Hopping Table  Channel  Frequency (MHz)    Channel  Frequency (MHz)                                                                         Table 5-34   RF2400 E.U. Hopping Table TBD  Channel  Frequency (MHz)    Channel  Frequency (MHz)                                                                Table 5-35   RF2400 Japan Hopping Table TBD
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 52  11:56:13 AM 5.2.2.6 Hop (hop) command The hop (hop) command is used to enable or disable frequency hopping.  Using the hop command hop<CR> will display the current hop state where a one indicates hopping is enabled.  The hop command hop=0<CR> will disable frequency hopping and hop=1<CR> will enable frequency hopping.  Upon completion, the command prompt is displayed.  5.2.2.7 Gen2 Read (g2r) command The Gen2 Read (g2r)  command allows reading any memory area of the Gen2 tag.  A required 16 bit parameter defines the area to read.  Bits 15-12 select the bank, bits 11-8 specify the length in words, bits 7-0 select the word address within the bank (refer to the Table 5-42 – Memory Map).  If any part of the requested area is not supported by the tag, an error 26 (TAGNXM) is returned.  If any part of the area is read-locked, an error 25 (TAGLOCKED)  is  returned.    If  the  command  is  successful,  the  requested  data  are displayed.  The g2r is executed using g2r=nnnn<CR> where nnnn is the hexadecimal representation of the 16 bit parameter.  For example, g2r=2200 reads the 1st 2 words of TID memory.  This command is only supported for GEN 2 tags.  Upon completion, the command prompt is displayed.  5.2.2.8 Gen2 Write (g2w) command The Gen2 Write (g2w) command allows up to 8 words to written to any memory area of the Gen2 tag.  The required parameter specifies the data to write in hexadecimal.  The command must be preceded by a g2r command selecting the bank, length and address.  If any part of the  requested area is not supported by the tag, an  error 26 (TAGNXM) is returned.  If any part of the area is write-locked, an error 25 (TAGLOCKED) is returned.    The  g2w  is  executed  using  g2w=n…n<CR>  where  n…n  is  the  hexadecimal representation of the data to be written from 4 to 32 characters.  This command is only supported  for  GEN  2  tags.    Upon  successful  completion,  the  command  prompt  is displayed. 5.2.2.9 Transmit zeros (t0) command The transmit zeros (t0) command is used to enable the transmit carrier and intermittently modulate the carrier with zeros.  The carrier is turned on and modulated with a 50 percent duty  cycle  with  a  modulation  period  of  1ms.    Zeros  are  transmitted  at  a  frequency  of approximately  70KHz where the carrier  is modulated for 1/8  of the cell time.   The t0 command is executed using t0<CR>.  Entering a <CR> will terminate the command.  Upon completion, the command prompt is displayed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 53  11:56:13 AM 5.2.2.10 Transmit ones (t1) command The transmit ones (t1) command is used to enable the transmit carrier and intermittently modulate the carrier with ones.  The carrier is turned on and modulated with a 50 percent duty  cycle  with  a  modulation  period  of  1ms.    Ones  are  transmitted  at  a  frequency  of approximately  70KHz where the carrier  is modulated for 3/8  of the cell time.   The t1 command is executed using t1<CR>.  Entering a <CR> will terminate the command.  Upon completion, the command prompt is displayed.  5.2.2.11 Transmit alternating (ta) command The  transmit  alternating  (ta)  command  is  used  to  enable  the  transmit  carrier  and intermittently modulate the carrier with alternating ones and zeros.  The carrier is turned on and modulated with a 50 percent duty cycle with a modulation period of 1ms.  Ones are transmitted at a frequency of approximately 70KHz where the carrier is modulated for 3/8 of the cell time.  Zeros are transmitted at a frequency of approximately 70KHz where the  carrier  is  modulated  for  1/8  of  the  cell  time.    The  ta  command  is  executed  using ta<CR>.  Entering a <CR> will terminate the command.  Upon completion, the command prompt is displayed.  5.2.2.12 Transmit random (tr) command The  transmit  random  (tr)  command  is  used  to  enable  the  transmit  carrier  and intermittently  modulate  the  carrier  with  random  data.    The  carrier  is  turned  on  and modulated  with  a  50  percent  duty  cycle  with  a  modulation  period  of  1ms.    Data  are transmitted at a frequency of approximately 70KHz where the carrier is modulated for 3/8  of  the  cell  time  for  a  data  one  and  1/8  of  the  cell  time  for  a  data  zero.    The  tr command is executed using tr<CR>.  Entering a <CR> will terminate the command.  Upon completion, the command prompt is displayed.  5.2.2.13 Transmit data (td) command The transmit data (td) command is used to enable the transmit carrier and intermittently modulate the carrier with the data parameter.  The  carrier  is turned on and  modulated with a 50  percent duty cycle with a modulation period of 1ms.   The 16  bit parameter represents 2 transmitted cell times.  The carrier is on for ones, off for zeros.  For example, 80E0h sends a zero (modulated 1/8 of the cell time) and a one (modulated 3/8 of the cell time)  The td command is executed using td=nnnn<CR> where nnnn is the hexadecimal representation  of  the  16  bit  parameter.    Entering  a  <CR>  will  terminate  the  command.  Upon completion, the command prompt is displayed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 54  11:56:13 AM 5.2.2.14 Carrier on (con) command The transmitter on (con) command is used to turn on the un-modulated transmit carrier.  The con command is executed using con <CR>.  Upon completion, the command prompt is displayed.  5.2.2.15 Carrier off (coff) command The  transmitter  off  (coff)  command  is  used  to  turn  off  the  transmit  carrier.    The  coff command  is  executed  using  coff  <CR>.    Upon  completion,  the  command  prompt  is displayed.  5.2.2.16 Localization (local) command  The  localization  (local)  command  is  used  to  configure  the  controller  parameters  for operation  under  various  jurisdictions.  Using  local<CR>  will  display  the  current localization code setting as a decimal number from 1 to ? where 1 = USA, 2 = E.U., and 3 = Japan.    Using  local=n<CR>  where  n  is  a  decimal  number  from  1  to  ?  will  set  the localization code..  Upon completion, the command prompt is displayed. Note currently only the 1= USA Localization is supported 5.2.2.17 Chipcon register read (ccr) command The Chipcon register read (ccr) command is used to display the contents of the addressed Chipcon  register.    The  ccr  command  ccr  AAXX<CR>,  where  AA  is  the  hexadecimal register  address  and  XX  is  hexadecimal  dummy  data,  will  display  the  contents  of  the register on the command line as two hexadecimal digits 0xDD following an equals sign.    Upon completion, the command prompt is displayed. 5.2.2.18 Chipcon register write (ccw) command The Chipcon register write (ccw) command is used to set the contents of the addressed Chipcon  register.    The  ccw  command  ccw  AADD<CR>,  where  AA  is  the  hexadecimal register address and DD is hexadecimal data, will display the contents of the register on the  command  line  as  two  hexadecimal  digits  0xDD  following  an  equals  sign.    Upon completion, the command prompt is displayed.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 55  11:56:13 AM 5.2.2.19 Protected command summary The following table summarizes the protected service port commands   Command  Type Persistent Range  Default  Description pw  w  No  0-65535  na  Password, in decimal txp  r/w  No  0-999  215  Tx power in decimal txpmax  r/w  Yes  0-999  500  Tx power max limit txpmin  r/w  Yes  0-999  180  Tx power min limit chan  r/w  No  0-49  30  Frequency (channel) in decimal hop  r/w  No  0/1  1=hop  Hop flag g2r  ep  No  0-FFFFh  na  Bank(4bits), len (4bits), adr (8bbits) g2w  ep  No  0-FFFFh  Na  Write data word (uses extent from g2r) t0  e  No  na  na  Continuous send 0s (1/8 cell) t1  e  No  na  na  Continuous send 1s (3/8 cell) ta  e  No  na  na  Alternating 1s & 0s tr  e  No  na  na  Random Data ( pattern for FCC testing) td  ep  No  0-FFFFh  Na  Continuous send parameter con  e  No  na    Carrier on, unmodulated coff  e  No  na  off  Carrier disabled local  r/w  Yes  1-3  1  Localization code  ccw  w  No  Adr/data    Write ChipCon regs (AADD) hex adr/data ccr  w  No  Adr/data    Read ChipCon regs (AAXX) hex adr/don’t care  cci  e  No  na  na  ChipCon init (as done at power-up) Table 5-36   Service Port Commands - Protected  For r or e types, enter command with <cr> to read or execute.  For w types enter command followed by “=parameter<cr>” to write.  For r/w or ep types, enter command with <cr> to read or execute , enter command followed by “=parameter<cr>” to write or execute with parameters.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 56  11:56:13 AM 5.2.3 Service port error codes Several  error  codes  are  presented  in  service port  mode.    These  include  errors  that  the firmware  identifies  when  initializing  and  errors  encountered  when  executing  specific service port commands. These errors are listed in Table 5-37.  Error Code  Description 10  Host command invalid 11  Host command CRC error 12  Host command length error 20  No Tag Found – (timeout on sync character) 21  Invalid Tag ID Length – (error during tag read operation) 22  CRC Error –(calculated CRC doesn’t match the tag CRC) 23  Tag response handle mismatch (Gen2 only) 24  Tag returned (Gen2 only) 25  Tag command failed – Tag is locked (Gen2 only) 26  Tag memory address non-existent (Gen2 only) 27  Write verify fail 30  Bad CCRegister Access–(register doesn’t respond or responds with incorrect data) 31  VCO not locked – (The VCO isn’t locked to the requested frequency) 32  No Backscatter – (The receiver didn’t detect any backscatter signal) 40  EEPROM Timeout – (EEPROM bad or missing) 41  EEPROM bad status 42  EEPROM checksum error 43  EEPROM log full 50  ADC timeout 80  Diagnostic Port0 fail 81  Diagnostic Port1 fail 82  Diagnostic read offset out-of-bounds 83  Diagnostic read average out-of-bounds 84  Diagnostic read P-P out-of-bounds Table 5-37   Service Port Error Codes
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 57  11:56:13 AM 5.3 RADIO FREQUENCY INTERFACE The RF2400 controller is designed to communicate with both Auto-ID Class 1 and Class 1 Gen 2 tags operating in the frequency range of 860MHz-960MHz.  The controller can be configured to automatically detect the tag type or fixed to a specific type.  The Fixed configuration  has  the  advantage  of  accelerating  operations  eliminating  retries  to determine  tag  type.    This  dual  functionality  provides  compatibility  with  existing technology while providing support for next generation tags.  The radio frequency (RF) interface  and Reader protocol are based on  a reader “talks” first passive RFID system using half-duplex communication. 5.3.1 Auto-ID Class 1 The  RF2400  reader  incorporates  an  Auto-ID  Class  1  RF communication interface  and Reader  functionality.    Data  symbols  communicated  between  the  reader  and  the  tag include a binary zero (0), a binary one (1), a null, and punctuation.  The encoding and modulation of these symbols and protocols follow the MIT Auto-ID Center – Technical Report  -  860MHz–930MHz  Class  1  Radio  Frequency  Identification  Tag  Radio Frequency  &  Logical  Communication  Interface  Specification  Candidate Recommendation, Version 1.0.1 – November 14, 2002 The RF2400 reader initiates all communications with the Class 1 tags which occur in a half-duplex  manner.    Class  1  tags  communicate  using  backscatter  modulation.    This communication  only  occurs  when  directed  by  a  properly  decoded  and  interpreted command emitted from a Reader. 5.3.1.1 Class 1 Reader-Tag RF communications The RF2400 communicates with the Class 1 tags using amplitude shift keying (ASK). The  modulation  operates  at  90%  nominally.    Shaped  Keying  is  employed  to  control modulation  rise  and  fall  times  in  order  to  more  rapidly  roll  off  sideband  energy. Modulation parameters for North American operation are summarized in Table 5-38  Parameter  Description  Value To  Master Clock Interval  14.25 us Totol  Master Clock Interval Tolerance  <0.1% 1/T0  Data Rate  70.18 Kbps Tfwhmo  Half Width Binary 0 (1/8 T0)  1.78 us Tfwhm1  Half Width Binary 1 (3/8 T0)  5.34 us Mod  Modulation Depth  90% DMod  Modulation Depth Variation  5% Tf  Fall Time  300 ns typ. Tr  Rise Time  300 ns typ. Ripple  Ripple  <10% Table 5-38   Class 1 Reader-Tag Modulation Parameters
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 58  11:56:13 AM The Reader data modulation incorporates a pulse width scheme to represent logical bits 0 and logical bits 1.  A logical 0 is represented by a cell time of 1/8 T0 (see Figure 5-5).A logical 1 is represented by a cell time of 3/8 T0 (see Figure 5-5).   Figure 5-5   Class 1 Reader Modulation Timing for Binary 0  A logical 1 is represented by a cell time of 3/8 T0 (see Figure 5-6).   Figure 5-6  Class 1 Reader Modulation Timing for Binary 1  5.3.1.2 Class 1 Tag-Reader RF communications The Tag communicates to the Reader by backscatter modulation of the continuous wave (CW) carrier supplied by the Reader.  This is an ASK modulation and is typically 10% or less  of  the  signal  amplitude  based  on  nominal  radiation  cross-sections.    The  Tag  to Reader bit cell time is ½ T0 resulting in a nominal data rate twice the data rate from the Reader to the Tag.  However, this rate will vary over the response as much as 25% as the Tag power level changes. Tag the Reader parameters for North America are summarized in Table 5-39.  Parameter  Description  Value To  Master Clock Interval  14.25 us Ttagbitcell  Tag to Reader Bit Cell Interval T0/2  7.13 us Tag Data Rate  Tag to Reader Nominal Data Rate 2/T0  140.35 Kbps Table 5-39   Class 1 Tag-Reader Communication Parameters
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 59  11:56:13 AM Tag  modulation  uses  a  four  interval  bit  cell  encoding  technique.    Two  transitions represent a binary 0 and four transitions represent a binary 1 (see Figure 5-7).  Figure 5-7  Class 1 Tag to Reader Encoding  5.3.2 Class 1 – Gen 2 The RF2400 incorporates a Class1 Gen 2 RF communication interface compatible with the new generation of GEN 2 tags.  Gen 2 support is much more robust then Class 1 tags providing  enhanced  features  and  improvements  with  security  and  the  mechanisms  to handle large populations of tags.  Encoding, modulation and protocols follow the EPC™ Radio-Frequency  Identity  Protocols  Class-1  Generation-2  UHF  RFID  Protocol  for Communications at 860 MHz – 930 MHz Version 1.0.9 – January 31, 2005  5.3.2.1 Gen 2 Reader-Tag RF communications The  RF2400  communicates  with  the  Gen  2  tags  using  amplitude  shift  keying  (ASK).  Modulation  operates  at  90%  nominally  and  shaped  Keying  is  employed  to  control modulation rise and fall times.  Communications between the Reader and Tags is based on a reference time interval defined as a Tari which is the duration of a data 0.  Fixed format  is  used  for  all  communications.  Modulation  parameters  for  North  American operation are summarized in Table 5-40
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 60  11:56:13 AM  Parameter  Description  Value Tari  Reference Time Interval  12.5 us Ttol  Reference Interval Tolerance  <0.1% 1/(2Tari)  Data Rate  40 Kbps PW  RF Pulse Width (Tari/2)  3.125 us Mod  Modulation Depth  90% DMod  Modulation Depth Variation  5% Tf  Fall Time  300 ns typ. Tr  Rise Time  300 ns typ. Ripple  Ripple  <10% Table 5-40   Gen 2 Reader-Tag Modulation Parameters  Data is transmitted using Pulse Interval Modulation PIE encoding.  A fixed pulse width of ½ Tari is used for both logic 0 and logic 1 data bits.  A data zero is represented by positioning this pulse at the last half of the first Tari interval.  A data 1 is represented by positioning the pulse at the last half of the second Tari interval (refer to Figure 5-8).   Figure 5-8  Gen 2 Reader to Tag PIE Encoding  5.3.2.2 Gen 2 Tag-Reader RF communications The Tag communicates to the Reader by backscatter modulation of the continuous wave (CW) carrier supplied by the Reader.  This is an ASK modulation and is typically 10% or less  of  the  signal  amplitude  based  on  nominal  radiation  cross-sections.    The  Tag  to Reader bit cell time is ½ Tari resulting in a nominal data rate twice the data rate from the Reader to the Tag.  However, this rate will vary over the response as much as 25% as the Tag power level changes. Tag the Reader parameters for North America are summarized in Table 5-41
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 61  11:56:13 AM  Parameter  Description  Value Tari  Master Clock Interval  8 us Tag Data Rate  Tag to Reader Nominal Data Rate 1/Tari  125 Kbps Table 5-41   Gen 2Tag-Reader Communication Parameters  The Reader determines the TAG encoding scheme and data rate with a Query command.  The RF2400 always selects FM0 encoding.  Using FM0 a binary 0 is represented by a transition mid bit cell and a binary 1 is represented by no transitions within the cell (refer to Figure 5-9)  Figure 5-9  Gen2 Tag to Reader Encoding
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 62  11:56:13 AM 5.4 LOGICAL STRUCTURES AND DATA CONTENT 5.4.1 Gen 2 Tag Structures and Data content  The Gen 2 tag memory is logically separated into four banks.  Each bank may contain zero or more memory words.  The memory map follows.  Bank  Area  MSB  Content  LSB xxh  User [15:0]    . . .   11  User 00h  User [N:N-15]  0Fh   . . .   10h  TID [15:0]  1Fh 10  TID 00h  TID [31:16]  0Fh xxh  EPC [15:0]     . . .   20h  EPC [N:N-15]  2Fh 10h  PC [15:0]  1Fh 01  EPC 00h  CRC-16 [15:0]  0Fh   . . .   30h  Access Password [15:0]  3Fh 20h  Access Password [31:16]  2Fh 10h  Kill Password [15:0]  1Fh 00  Reserved 00h  Kill Password [31:16]  0Fh  Table 5-42   Class 1 Gen 2 Memory Map  User Memory is for user specific data storage.  This region is Tag vendor specific. TID memory contains an 8 bit allocation class identifier, and information to describe any custom capabilities of the Tag.  The TID may include a Tag mask-designer identified, Tag model number, Tag serial number, etc EPC memory contains a CRC16 to protect the EPC,  a Protocol Control (PC) field  to describe the length of the EPC, and the EPC (Electronic Product Code).  The RF2400 currently supports an EPC of 12 bytes. Reserved  memory  contains  the  kill  and  access  passwords.    The  default  (un-programmed)  value  of  the  both  passwords  is  zero.    An  Interrogator  can  use  the  kill password once to kill a Tag and render it silent thereafter.  The access password, if non-zero  shall  require  the  interrogator  to  issue  this  Password  before  transitioning  to  the secured state. .
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 63  11:56:13 AM  5.5 AUTONOMOUS OPERATION The  RF2400  includes  functionality  to  support  remote  autonomous  operation.    The controller  is  easily  configured  to  read  tags  remotely  (disconnected  from  the  host communication  port)  saving  tag  ID  data  to  EEPROM  while  operating  under  battery power.  Functions supported include: Paper Sensor Triggered Read (Host mode). Refer to section 5.1.2.7.1 Paper Sensor Triggered Read (Service Port mode). Refer to section 5.2.1.17 Auto Get Tag ID (Host mode). Refer to section 5.1.3.3 Auto Read Tag (Service Port mode). Refer to section 5.2.1.20 The onboard EEPROM log is sized to store up to 496 ID records.  Each record stores the complete  EPC  ID  (up  to 96 bits), the tag CRC, the length of the EPC, as well as the function  used  to  store  the  ID.    Once  the  log  is  full  (all  496  locations  written),  the operational  function  will  be terminated  and  a message is immediately sent to the host communication port; however, if the communication port is disconnected at that time the message  will  be  lost.    When  connected  to  the  communication  port,  the  host  can interrogate the reader using the “Get Reader Status” command (refer to section 5.1.2.5) with the data byte set to 0x00.  If the log is full, the response will return a message type of 0x98 (log full).  The host can download the stored ID data and clear the log using the “Dump ID Data” command (refer to section 5.1.3.4). If  operating  in  service  port  mode,  when  the  host  connection  is  established  using  the “^P^D” protocol, and the log is full, a message “Error 43” will be sent.  The ID data can be retrieved and the log cleared using the did command (refer to section 5.2.1.21).
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 65  11:56:13 AM 6 HARDWARE DESCRIPTION  The RFID controller (RF2400) is interfaced to a host processor with an industry standard RS232  interface  (or  optional  USB  adapter)  using  a  media  independent  protocol.    The reader  is  designed  around  a  Texas  Instrument  TMS320F2808  low  cost  DSP  used  to communicate with the host and control all RFID transmit and receive operations.  The DSP provides a wide selection of memory including 128 Kbytes of Flash, 2 Kbytes of OTP  ROM,  8  Kbytes  of  Boot  ROM  Peripherals  include  up  to  four  Hardware  PWM outputs, six 32-bit timers, six 16-bit timers, four SPI modules, two SCI communication ports,  two  eCAN  modules,  sixteen  channels  of  12-ADC,  and  35  individually programmable GPIO pins.  To limit cost, the majority of the RFID reader functionality is implemented  in  the  DSP  firmware.    Combined  with  a  128-Bit  security  Key/Lock  this provides a mechanism to deter theft of the RFID intellectual property (IP). A  low  cost  highly  integrated  VCO,  operating  over  the  frequency  range  860MHz-960MHz,  is  used  to  create  the  RF  carrier  signal  and  under  DSP  control  provides  the frequency  hopping  spread  spectrum  (FHSS)  mechanism  in  accordance  with  FCC  part 15.247.  A power splitter divides the VCO output into the RF carrier and a local reference signal used to demodulate the RFID backscatter signal.  A single chip 2-watt GSM Power Amplifier boosts the RF carrier necessary for reliable communication and is adjustable from 0dBm (1mW) to 24dBm (250mW).  The amplifier output is coupled to the antenna with  an  integral  directional  coupler  to  reduce  the  transmitter  signal  coupled  to  the receiver section. The  output  of  the  directional  coupler  applies  the  backscatter  signal  directly  to  an  RF mixer.  Using the local reference signal from the power splitter, a selectable LC phase delay is used to directly convert the in-phase or quadrature components of backscatter signal from the RFID tag to baseband.  A low-pass RF filter removes any high frequency products of the mixer.  This filter output is applied to a high-pass network coupled with a synchronized FET switch to remove any DC components.  Finally a base-band amplifier boosts the signal to a level compatible with the DSP analog input.  The processor phase locks to the signal, synchronizes to the clock edges, tracks the average signal level, and decodes the data stream for presentation to the host.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 66  11:56:13 AM 6.1 HOST COMMUNICATION INTERFACE The RF2400 reader is interfaced to the host using an industry standard RS232 or optional TTL serial interface.  Populating the controller with U14 L10, and C63, C64,C67, C69 interfaces the  DSP  media  independent  serial  protocol  to  industry  standard  RS232  signal  levels.  Optionally,  removing  the  RS232  components  and  populating  components U15  and C71 provides  a  TTL  compatible  signal  level.    The  serial  interface  offers  no  hardware  or software flow control and only communicates using the serial transmit and receive data lines.  Baud rate defaults to 19,200 k-baud using eight data bits and one stop bit.  The baud rate can be reconfigured using host commands.   Figure 6-1  Host Interface  RSRXD3 RSTXD3TN525TN526C71100nF2,3D+3V3HSERTXHSERRXU14LTC2801CDE1RIN 1TOUT 2VCC3VDD4SW 5GND6CAP 7PS8MODE9VL10TIN11ROUT12VEE/PAD 13D+3V3C671uF110VC64220nF116VL10 10uH1TTL Serial InterfaceC691uF110VRS232 Serial InterfaceC631uF110VDU1574LVC2G172,31A1GND22A32Y 4VCC 51Y 6
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 67  11:56:13 AM 6.2 DSP PROCESSOR The heart of the RF controller is a 100 MIPS DSP processor.  The processor includes a crystal  oscillator  which  runs  at  20MHz,  set  by  an  external  crystal.    An  integral  PLL boosts the frequency to 100MHz.  During tag communication, the processor must run at 100MHz to achieve the timing required.  When not communicating with a tag, firmware decreases  the  operating  frequency  to  20MHz  to  conserve  power.    As  the  operating frequency is changed, internal dividers, timers, and the baud rate generator are adjusted to maintain correct operation. The  processor  has  hardware  for  serial  communication  including  UART,  I2C,  and  SPI.  The  UART  is  used  for  host  communication  through  an  external  RS232  translator  or buffered TTL interface.  The I2C controller interfaces to an external EEPROM.  Two SPI interfaces are implemented, one communicates with the Chipcon VCO, the other is used to serialize the transmitted data, it’s clocking is supplied by an integral PWM. An integrated 12 bit A/D converter samples the tag received data after pre-conditioning.  The processor firmware then decodes the data while tracking frequency and amplitude variations.  The A/D also monitors board voltage levels to insure proper operation and to control charging of an optional battery. Several PWMs are used for transmit power level setting, beeper sound generation, and transmit data gating. General purpose I/O ports control various transmit and receive functions, LED indicators, and 2 software controlled external I/O ports. 6.3 EEPROM An EEPROM memory is  used  to  permanently  store required  settings  and  tag  ID data.  The EEPROM interfaces with the processor over an I2C bus.  Parameters stored include such items a Tx power, Rx thresholds, host comm. settings, etc.  A large area is used to store tag IDs for portable data gathering while not connected to a host computer.  The EEPROM currently used is 64kbits or 8Kx8. Following is the EEPROM map:  0-1F  parameters 40-77  phase table, entry per channel 78-79  store pointer for ID storage 80-9F  demo data 100-1FFF  ID storage 16 bytes each for 496 entries
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 68  11:56:13 AM 6.4 TRANSMITTER/VCO The Transmitter/VCO is implemented using a Chipcon CC1070 Single Chip Low Power RF Transmitter.  This component interfaces to the processor using an SPI interface and incorporates the necessary circuitry to implement Frequency Hopping Spread Spectrum (FHSS) signaling for noisy environments and to meet agency spectral requirements.  To enhance speed of operation, the Transmitter/VCO includes dual sets of frequency control registers to allow overlapped frequency configuration during operation.  UHF frequency is synthesized from an inexpensive 14.7456MHz crystal using a programmable fractional divider  to  achieve  high  resolution  which  is  ideal  for  narrow  band  applications.  An external loop filter is provided to meet the stabilization requirements imposed by FHSS.  The VCO circuitry with associated filtering can be configured to operate over the range from  850MHZ  to  960MHz.    Although  the  CC1070  provides  modulation  control,  for purposes of flexibility and to provide more control of various modulation schemes these features  are  not  used.    The  output  power  of  the  VCO  is  adjustable  from  -30dBm  to +7dBm.    The  output  is  coupled  through  an  impedance  matching  which  attenuates harmonic  components  and  matches  the  combined  power  amplifier  and  mixer  circuitry impedance to maximize VCO output power. 6.5 POWER SPLITTER The power splitter is asymmetric dividing the power from the VCO to the RF amplifier and mixer.  The mixer requires ample signal to reduce conversion loss as compared to the minimal input requirements of the RF amplifier.   The circuit is implemented using an inductor and two capacitors. 6.6 POWER AMPLIFIER The  RF  power  amplifier  is  based  on  the  Triquint  TQM7M4006  Quad  Band  Power Amplifier Module.  This device is a low cost amplifier designed for the cellular phone market  providing  and  efficient  low  cost  solution.    The  amplifier  is  controlled  using  a voltage controlled input to both set the output power and provide a versatile means to amplitude modulate the carrier. 6.7 PA MODULATION The  Processor  directly  modulates  the  carrier  with  ASK  modulation  using  the  voltage controlled input of the RF Power Amplifier.  A processor PWM output is filtered using a 2-pole Sallen-Key low pass filter providing the required control voltage.  This voltage is configurable and establishes the output power of the RF2400.  Using two low resistance analog SPST switches the power amplifier control voltage input is switched between zero and  this  reference  voltage  using  shaped  key  drive  to  more  rapidly  roll  off  sideband energy.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 69  11:56:13 AM 6.8 DIRECTIONAL COUPLER/RF FILTER The output of the power amplifier is coupled to the antenna using a PCB implemented directional coupler with 8dB coupling loss and directivity between 25dB and 30dB.  This implementation  provides  a  very  low  cost  alternative  while  providing  the  necessary transmitter/Receiver  isolation.  The  output  of  the  direction  coupler  is  connected  to  the antenna using a simple pi filter to further attenuate harmonic components. 6.9 SELECTABLE LC PHASE DELAY/MIXER The output of the VCO is connected to the mixer using a selectable phase delay with a nominal 90 degree phase difference.  This circuitry also provides additional impedance matching to provide the strong signal required by the mixer to reduce conversion loss.  The selectable delay provides a unique low cost solution to compensate for receiver nulls related to frequency and the tag to antenna spacing. Using a passive mixer the received signal is converter directly to baseband. 6.10 BASE-BAND AMPLIFIER The output of the mixer is coupled with an impedance matching circuit to an acquisition switched high-pass filter to remove the large DC component.  The output of this filter is applied  to  the  34dB  base-band  amplifier  which  incorporates  800  KHz  low-pass  filter limiting the bandwidth of the amplified signal.
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 70  11:56:13 AM 6.11 GENERAL PURPOSE DIGITAL I/O PORT The RF2400 provides two bi-directional IO ports which can be independently configured through  software  as  an  input  or  output  port.    These  ports  are  buffered  and  include  a protection  circuit  allowing  an  input  signal  range  from  0  to  7volts.    A  low  level  is represented  by  any  input  signal  less  then  0.3V  and  high  level  any  signal  greater  then 2.3volts.    A  6.8K  on-board  resistor  is  provided  to  pull  up  the  inputs  to  3.3volts.    An output low level output voltage is 0.36V at 8mA and a high level output voltage is 2.58V at -4mA.  The IO ports are available on the Digital IO Connector (J2)   Figure 6-2  Digital I/O Port  TN517TN516U17C74VHC1251,2,39 810U17D74VHC1251,2,3121113U17B74VHC1251,2,3546U17A74VHC1251,2,32 31147+3V3C73100nF1,2,3DPORTO13PORTEN#03PORTO03PORTI13PORTI03PORTEN#13PORT0DDPORT1R5131,2,36K8R5141,2,36K8+3V3
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 71  11:56:13 AM 6.12 DIGITAL I/O INTERFACE The RF1200 incorporates two LED drivers for power and activity indication.  On board LEDs are in parallel with outputs providing both onboard and remote indicators  Two maintenance jumpers provide a means to independently force a serial boot operation for firmware  update  and  to  reset  the  controller  to  the  factory  defaults.    These  signals  in addition to the two IO ports are available on the Digital IO Connector (J2).  Figure 6-3  Digital I/O Interface  R43 150R1,2,3D3LX0603GW1,2,321 R44 150R1,2,3D+3V3J21,2,31234567891011U1674LVC2G141,2,31A1GND22A32Y 4VCC 51Y 6PORT0PORT1DD2LX0603GW1,2,321TN519TN521TN518TN520TN514TN515+3V3C72100nF1,2,3PowerLEDsActivityACTLED#3PWRLED#3FDEFAULT#3SERBOOT#3 R512 150R1,2,3+3V3
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 72  11:56:13 AM 6.13 BUZZER CIRCUIT A magnetic buzzer is used to provide audible indication of reader or paper sensor trigger activity.  Functionality and settings are configured through the service port.  The sound is generated by the microcontroller using a PWM output amplified by Q2 to directly drive the buzzer.  Figure 6-4  Buzzer Circuit  6.14 OPTICAL SENSOR INTERFACE The RF2400 supports an optional optical sensor which can be configured to trigger read operations on either a presence or absence of the reflected light.  The sensor emitter is modulated  by  the  processor  as  a  means  to  reduce  the  effects  of  ambient  light  and  the difference  in  the  sensor  output  is  a  measure  of  the  coupled  signal.    The  threshold  is adjustable to compensate for different material reflectivity.  Optionally, the circuitry can be configured to use an external mechanical switch where a contact closure from pins 1 & 2 of J3 indicates a triggered state.  The sensor state is also available to host software.  All the necessary signals are available on connector J3  Figure 6-5  Optical Sensor Interface  SOUND3R37 33R3Q2MMBT3904312 3R27330R 3C5439pF3D1 MMBD414831 3+5VTN512+-LS1CSS-J4D2031234D+-V+V-OUTU7BOPA23541,2,365847J31,2,31234R191K01,2,3R45100R01,2,3D+3V3A+4V2ASNSRD 3SNSLED3ZJ287439-0400Molex1234TN524TN504TN522TN523WHTGRNBLKREDZU1OPB732W1,2,31234Paper Sensorfor reference onlyNOT ON BOARDQ3BSS1381,2,3312R4675R01,2,3
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 73  11:56:13 AM 6.15 POWER REGULATORS The 5 volt input power is converted to 4.2 volts by a Li-Ion battery charger circuit U12.  This circuit provides main system power and can charge an optional battery for portable operations.  For the USB option, a super capacitor is available and supplies extra power during transmit operations which is not typically available from the USB interface.  R42 sets  the  current  limit  to  550mA  for  the  USB  version  and  1000mA  for  the  externally powered versions.  The main 4.2 volt source also powers the RF power amplifier. Figure 6-6  Main Power 4.2V Regulator  Two low drop-out (LDO) regulators provide the required power for various digital and analog  circuits.      U13  supplies  +1.8V  power  to  the  processor  core  and  U11  supplies +3.3V power for the processor I/O and additional controller circuitry. Figure 6-7  +3.3V and +1.8V Regulator ++C534200mF3123R42xxx2.21K = 550 mA1.21K = 1000 mAxxx Alternate values for R42R3910K1,2,3C5222uF1,2,36.3VCHRGMON 3C5310nF1,2,3DR40 20K01,2,3TN513+C6622uF10V1,2,3R42-11K211,2Layout:  Place onback of boardC62100pF1,2,3+C51470uF6.3V1,2R42-22K213C601uF1,2,310VC611uF1,2,310VU12LTC4059EDC1,2,3GND 1LI/CC 2BAT 3VCC4PROG5EN6PAD7R381R001,2,3+4V2+5VDR51010K3R51110K3WH1WireHoleWH2WireHole+4.2V Supply550/1000 mAL9 10OHM1,2,3BAT -BAT +CHRGCTL3AC4910nF1,2,3C501uF1,2,310VC472u2F1,2,310VU11LP2985AIM5-3.31,2,3VIN1GND2SDN#3BYPASS 4VOUT 5D+3V3C4622uF1,2,36.3VC48100nF1,2,3+4V2 C51910nF1,2,3U13LP3982ILD-1.81,2,3OUT 1IN2GND3OUT 4SET5CC 6SHDN7FAULT 8PAD9C652u2F1,2,310VC6833nF1,2,3R41 100K1,2,3C592u2F1,2,310VTN2+4V2DTN508TN507+3.3V Supply150mAR506 1R51,2,3C4410uF1,2,36.3V+3V3A+1V8+1.8V Supply300mA
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 75  11:56:13 AM 7 SPECIFICATIONS   7.1 ELECTRICAL SPECIFICATIONS  7.1.1 RF Interface RF output Frequency Range  860Mhz – 960 MHz Transmit Power Range  0.1mW – 500mW Receiver Sensitivity  -68dBm  7.1.2 Communications Interface Serial Interface Baud Rate  9600, 19200, 38400, 57600, 115200 baud Digital I/0  TTL I/O levels  7.1.3 Power Supply Power Supply Voltage  4.5Vdc – 5.5Vdc Supply Current  1.25A max Current Consumption         Average:    350mA         Peak:    750mA  Power Dissipation         Average:    1.75Watts         Peak:    3.75Watts
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 76  11:56:13 AM 7.1.4 Battery (optional) Type  Polymer Lithium-ion Battery Voltage Nominal  3.7Vdc Battery Voltage range  2.7Vdc – 4.2Vdc Capacity  3200mAh  Note: A protection circuit in the battery prevents charging beyond 4.2V and discharging below 2.75.  Additionally, there is short circuit protection at 3A.   7.2 ENVIRONMENTAL SPECIFICATIONS  Operation Temperature Range  -20ºC to 50ºC (-4ºF to -22ºF) Storage Temperature  -40ºC to 80ºC (-40ºF to 176ºF) Relative Humidity  5% to 80% non-condensing   7.3 MECHANICAL SPECIFICATIONS  Size  2.12 x 3.36 x 0.25 in   (53.87 x 85.37 x 6.35mm) Mounting #4-thru hole (4plcs)  1.85 x 3.08 in   (46.86 x 78.36mm) Weight  0.8 oz (23g)
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 77  11:56:13 AM 7.4 I/O CONNECTORS J4 – Power/Serial IO Connector Mating connector – Molex 87439-0500  Pin  Signal  Description 1  +5V  System power +5Vdc ±10%, 1.25A max 2  +5 RTN  +5Vdc Ground 3  Signal GND  Serial I/O Ground Reference 4  Host RX  Serial Host Receiver (RS232 or optional TTL) 5  Host TX  Serial Host Transmitter (RS232 or optional TTL)   Note: Rx/Tx are from the RF2400 perspective.   J3 – Optical Sensor Connector Mating connector – Molex 87439-0400  Pin  Signal  Description 1  SensPwr  4.2V power for Opto transistor (100ohm series resistor) 2  SensSgnl  Optical signal input from Optical Receiver (Emitter) 3  LED Rtn  LED power return (LED Cathode) (Pulsed) 4  LEDpwr  LED Power +4.2V (LED Anode)   J2 – Digital IO Connector   Mating connector – Molex 87439-1100  Pin  Signal  Description 1  Default  Factory Default Jumper Option – (jumper to pin 2) 2  GND  Reference ground for Jumper options 3  SerBoot  Force Serial Boot Jumper Option-  (jumper to pin 2) 4  3.3V  Source power for external LED (Series 150 ohm resistor) 5  Port0  Bi-directional Digital IO Port0 6  GND  Reference ground for Digital IO Ports 7  Port1  Bi-directional Digital IO Port1 8  ActLedPwr  Activity LED power (3.3V with series 150ohm) 9  ActLedRtn  Activity LED return (Buffered Driver) 10  PwrLedPwr  Power LED power (3.3V with series 150ohm) 11  PwrLedRtn  Power LED return (Buffered Driver)
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 78  11:56:13 AM   Figure 7-1  RF2400 Mechanical Assembly
RFID UHF Short Range Controller (RF2400) __________________________________________________________________________  ________________________________________________________________________  Ensyc  - CONFIDENTIAL -  MARCH 30, 2008 Technologies  PAGE 79  11:56:13 AM

Navigation menu