V740 RFID READER ANTENNA
NOTE. SPECIFICATIONS SUBJECT TO CHANGE WITHOUT NOTICE. REV. 1.1
OPERATION MANUAL
15 of 27
© OMRON CORPORATION 2004
Client Software
Requests/Functionality
The client software is able to make the following
requests of a Reader:
•
Read IDs of all tags within range of all
antennas.
•
Read IDs of all tags within range of a given
antenna.
•
Read IDs of all tags within a certain subset of
tag IDs within range of all antennas.
•
Read IDs of all tags within a certain subset of
tag IDs within range of a specific antenna.
•
Read Individual tag IDs within range of a
certain antenna or all antennas.
•
Read only the Ids of tags communicating a
given RF communication protocol.
•
Return the number of times a given tag was
read per query.
•
Read IDs from a variety of tag protocols
•
Write IDs to a tag from a variety protocols as
they are supported.
•
Read data from a tag from a variety of
protocols as they are supported.
General Observations,
Commands, and Syntax
We note that a Reader behaves very much like
database wherein each individual tag represents
an entry in the database with a given set of
attributes. Due to memory constraints of the
Reader, the system will remove entries from the
database as they are queried. The syntax for
querying against this database is derived from SQL
syntax.
In the simplest case, the client software explicitly
requests data by polling the Readers. The request
protocol is implemented in such a way that the
client software specifies:
What information it needs.
•
What subset of tags the Reader should
consider.
•
Which read constraints should be applied.
Example commands:
•
SELECT id FROM tag_id WHERE
id=0xF00D123456789ABCB0DE
AND
antenna_id=1;
Would return a tag only if its tag ID was
0xF00D123456789ABCB0DE
.
•
SELECT
id FROM tag_id WHERE antenna_id=3
OR antenna_id=4 SET time_out=1000;
Would return a tag only if the antenna ID was 3
or 4 and will search for at least 1000ms.
Extended RQL Command
Structure supported by the V740
Extended Command Set for Data and
Write, and Lock operations
ID Read:
Identify tags, including anti-collision.
ID Write/Lock
: Initialize tag ID, prevent further
changes
Kill, Password:
Disable tag, control access to
disable function
Data Read/Write/Lock:
Access tag data
(See Table RQL-1 below)