{"id":6933,"date":"2020-02-25T12:19:44","date_gmt":"2020-02-25T12:19:44","guid":{"rendered":"https:\/\/rfid4u.com\/?page_id=6933"},"modified":"2021-03-08T16:21:09","modified_gmt":"2021-03-08T16:21:09","slug":"epc-gen2-reader-commands-and-q-parameter","status":"publish","type":"page","link":"https:\/\/rfid4u.com\/epc-gen2-reader-commands-and-q-parameter\/","title":{"rendered":"EPC Gen2 Reader Commands and Q Parameter"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600488646815{background: #ffffff url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/Rfid4uWebsite-Background-Image-1.jpg?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Explore \/ RFID Basics &amp; Resources&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;RFID Basics &#8211; EPC Gen2 Reader Commands and Q Parameter&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1588942571359{background-color: #ffffff !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221; el_class=&#8221;background-position-right-bottom&#8221;][vc_row][vc_column][vc_column_text]There are several tools Gen2 readers use to manage the tag population. The reader commands such as Select, Inventory and Access as well as Q Parameter are used for tag singulation.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;READER COMMANDS&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Interrogators manage tag populations using the three basic operations shown. Each of these operations comprises one or more commands. The operations are defined as follows:<br \/>\n\u2022 <strong>Select<\/strong>: The process by which an interrogator selects a tag population for inventory and access. Interrogators may use one or more Select commands to select a particular tag population prior to inventory.<br \/>\n\u2022 <strong>Inventory<\/strong>: The process by which an Interrogator identifies tags. An interrogator begins an inventory round by transmitting a Query command in one of four sessions. One or more Tags may reply. The interrogator detects a single tag reply and requests the protocol control (PC), electronic product code (EPC), and cyclical redundancy check (CRC)-16 from the tag. An inventory round operates in only one session at a time.<br \/>\n\u2022 <strong>Access<\/strong>: The process by which an interrogator transacts with (that is, reads from or writes to) individual tags. An individual tag must be uniquely identified prior to access.[\/vc_column_text][vc_column_text]There are several tools Gen2 readers use to manage the tag population. The reader commands such as Select, Inventory and Access as well as Q Parameter are used for tag singulation.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_custom_heading text=&#8221;SELECT COMMAND&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]A reader can select tags in the field before inventorying them by issuing a new command, called Select. It can look for matching bits in the tag identifications, electronic product codes (EPCs), or in the user memory. So, if pallets stacked with tagged cases are coming through a dock door, the reader could issue a Select command to tags with an EPC that indicates they are pallet tags. That way, only the pallet tags respond or the reader could select only case tags. The reader can use several Select commands for more complex operations.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;TAG INVENTORY AND ACCESS&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The graphic below displays the steps by which an interrogator inventories and accesses a single tag.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14116&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_outline&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;SELECT COMMAND&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]EPC Gen2 protocol adopted slotted aloha-based probabilistic algorithm to solve the collision problem. As mentioned above, the reader first issues a Select command to pick particular portion of the tag population. Next, the reader issues a Query command, which contains a Q-parameter (value ranging from 0 \u2013 15) to specify the frame size (equal to 2Q-1), then each selected tag will pick a random number between 0 and 2Q-1 and put it into its slot counter.<br \/>\nIf the reader often gets back no response to its queries, it automatically decreases the Q value. If it gets more than one tag responding, it increases the Q value, thereby increasing the range of numbers that can be generated by the tags.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;EXAMPLE:&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23000000&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The reader might issue a query with a parameter of Q=4. The tags generate two random numbers, the first one ranging from zero and 65,535, and the second ranging from zero and 2 to the power of Q, minus 1. If Q is 4, then 2 to the fourth power is 16, minus 1 equals 15. So all tags choose a second random number ranging from zero and 15.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>The reader asks any tag that chooses zero for their second random number to respond. If one tag has zero, then it responds with the first random number, between zero and 65,535, and the reader acknowledges it. Since the tag has been singulated, the reader could simply count the tag as present. \u201cI know a tag with a random number of 45,101 is in the field.\u201d It could write an electronic product code (EPC) to the tag, if it doesn\u2019t have one, or it could ask tag 45,101 for its EPC if it does have one.<cite><\/cite><\/blockquote><\/div>[vc_column_text]Then, the reader asks the remaining tags to subtract one from their second random number and singulates the next tag that has a zero. It keeps doing that until all the tags are singulated.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>If no tags choose zero for their first random number, then the reader asks all the tags to decrement their random number by one. It keeps doing that until a tag with zero responds.<cite><\/cite><\/blockquote><\/div>[vc_column_text]If two tags respond, the reader can\u2019t read either tag. So, it issues a negative acknowledge which tells the tags to wait for another query until they respond again.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;EPC Gen2 Memory&#8221; style=&#8221;outline&#8221; shape=&#8221;square&#8221; color=&#8221;warning&#8221; align=&#8221;left&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-left&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Frfid4u.com%2Frfid-epc-gen2-memory%2F|title:EPC%20Gen2%20Memory||&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;RFID Reader Interrogation Zone&#8221; style=&#8221;outline&#8221; shape=&#8221;square&#8221; color=&#8221;warning&#8221; align=&#8221;right&#8221; i_align=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-right&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Frfid4u.com%2Frfid-reader-interrogation-zone%2F|title:RFID%20Reader%20Interrogation%20Zone||&#8221;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600488646815{background: #ffffff url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/Rfid4uWebsite-Background-Image-1.jpg?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Explore \/ RFID Basics &amp; Resources&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;RFID Basics &#8211; EPC Gen2 Reader Commands and Q Parameter&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1588942571359{background-color: #ffffff !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221; el_class=&#8221;background-position-right-bottom&#8221;][vc_row][vc_column][vc_column_text]There are several tools Gen2 readers use to manage the tag population. The reader [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-6933","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/6933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/comments?post=6933"}],"version-history":[{"count":0,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/6933\/revisions"}],"wp:attachment":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/media?parent=6933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}