TAILIEUCHUNG - Sổ tay RFID (P11)

Readers Data Flow in an Application A software application that is designed to read data from a contactless data carrier (transponder) or write data to a contactless data carrier, requires a contactless reader as an interface. From the point of view of the application software, access to the data carrier should be as transparent as possible. In other words, the read and write operations should differ as little as possible from the process of accessing comparable data carriers (smart card with contacts, serial EEPROM). . | RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification Second Edition Klaus Finkenzeller 11 Copyright 2003 John Wiley Sons Ltd. ISBN 0-470-84402-7 Readers Data Flow in an Application A software application that is designed to read data from a contactless data carrier transponder or write data to a contactless data carrier requires a contactless reader as an interface. From the point of view of the application software access to the data carrier should be as transparent as possible. In other words the read and write operations should differ as little as possible from the process of accessing comparable data carriers smart card with contacts serial EEPROM . Write and read operations involving a contactless data carrier are performed on the basis of the master-slave principle Figure . This means that all reader and transponder activities are initiated by the application software. In a hierarchical system structure the application software represents the master while the reader as the slave is only activated when write read commands are received from the application software. To execute a command from the application software the reader first enters into communication with a transponder. The reader now plays the role of the master in relation to the transponder. The transponder therefore only responds to commands from the reader and is never active independently except for the simplest read-only transponders. See Chapter 10 . A simple read command from the application software to the reader can initiate a series of communication steps between the reader and a transponder. In the example in Table a read command first leads to the activation of a transponder followed by the execution of the authentication sequence and finally the transmission of the requested data. The reader s main functions are therefore to activate the data carrier transponder structure the communication sequence with the data carrier and transfer data

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.