139037 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2013. All rights reserved.
Product data sheet
COMPANY PUBLIC
Rev. 3.8 — 11 November 2013
139038 16 of 48
NXP Semiconductors
SL3ICS1002/1202
UCODE G2XM and G2XL
13. Physical layer and signaling
13.1 Reader to G2X communication
13.1.1 Physical layer
For interrogator-to-G2X link modulation refer to Section 17, Ref. 1, annex H.1 Baseband
waveforms, modulated RF, and detected waveforms.
13.1.2 Modulation
An interrogator sends information to one or more G2X by modulating an RF carrier using
double-sideband amplitude shift keying (DSB-ASK), single-sideband amplitude shift
keying (SSB-ASK) or phase-reversal amplitude shift keying (PR-ASK) using a
pulse-interval encoding (PIE) format. The G2X receives the operating energy from this
same modulated RF carrier.
Section 17
, Ref. 1: Annex H, as well as chapter 6.3.1.2.2.
The G2X is capable of demodulating all three modulation types.
13.1.3 Data encoding
The R=>T link is using PIE. For the definition of the therefore relevant reference time
interval for interrogator-to-chip signaling (Tari) refer to Section 17
, Ref. 1, chapter
6.3.1.2.3. The Tari is specified as the duration of a data-0.
13.1.4 Data rates
Interrogators shall communicate using Tari values between 6.25 s and 25 s, inclusive.
For interrogator compliance evaluation the preferred Tari values of 6.25 s, 12.5 s or
25 s should be used. For further details refer to Section 17
, Ref. 1, chapter 6.3.1.2.4.
13.1.5 RF envelope for R=>T
A specification of the relevant RF envelope parameters can be found in Section 17,
Ref. 1
, chapter 6.3.1.2.5.
13.1.6 Interrogator power-up/down waveform
For a specification of the interrogator power-up and power-down RF envelope and
waveform parameters refer to Section 17
, Ref. 1, chapters 6.3.1.2.6 and 6.3.1.2.7.
13.1.7 Preamble and frame-sync
An interrogator shall begin all R=>T signaling with either a preamble or a frame-sync. A
preamble shall precede a Query command and denotes the start of an inventory round.
For a definition and explanation of the relevant R=>T preamble and frame-sync refer to
Section 17
, Ref. 1, chapter 6.3.1.2.8.
139037 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2013. All rights reserved.
Product data sheet
COMPANY PUBLIC
Rev. 3.8 — 11 November 2013
139038 17 of 48
NXP Semiconductors
SL3ICS1002/1202
UCODE G2XM and G2XL
13.2 G2X to reader communication
An interrogator receives information from a G2X by transmitting an unmodulated RF
carrier and listening for a backscattered reply. The G2X backscatters by switching the
reflection coefficient of its antenna between two states in accordance with the data being
sent. For further details refer to Section 17
, Ref. 1, chapter 6.3.1.3.
13.2.1 Modulation
The UCODE G2X communicates information by backscatter-modulating the amplitude
and/or phase of the RF carrier. Interrogators shall be capable of demodulating either
demodulation type.
13.2.2 Data encoding
The encoding format, selected in response to interrogator commands, is either FM0
baseband or Miller-modulated subaltern. The interrogator commands the encoding choice
13.2.2.1 FM0 baseband
FM0 inverts the baseband phase at every symbol boundary; a data-0 has an additional
mid-symbol phase inversion. For details on FM0 and generator state diagram, FM0
symbols and sequences and how FM0 transmissions should be terminated refer to
Section 17
, Ref. 1, chapter 6.3.1.3.
13.2.2.2 FM0 Preamble
T=>R FM0 signaling begin with one of two defined preambles, depending on the value of
the TRext bit specified in the Query command that initiated the inventory round. For
further details refer to Section 17
, Ref. 1, chapter 6.3.1.3.
13.2.2.3 Miller-modulated sub carrier
Baseband Miller inverts its phase between two data-0s in sequence. Baseband Miller also
places a phase inversion in the middle of a data-1 symbol. For details on Miller-modulated
sub carrier, generator state diagram, sub carrier sequences and terminating sub carrier
transmissions refer to Section 17
, Ref. 1, chapter 6.3.1.3.
13.2.2.4 Miller sub carrier preamble
T=>R sub carrier signaling begins with one of the two defined preambles. The choice
depends on the value of the TRext bit specified in the Query command that initiated the
inventory round. For further details refer to Section 17
, Ref. 1, chapter 6.3.1.3.
13.2.3 Data rates
The G2X IC supports tag to interrogator data rates and link frequencies as specified in
Section 17
, Ref. 1, chapter 6.3.1.3.
139037 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2013. All rights reserved.
Product data sheet
COMPANY PUBLIC
Rev. 3.8 — 11 November 2013
139038 18 of 48
NXP Semiconductors
SL3ICS1002/1202
UCODE G2XM and G2XL
13.3 Link timing
For the interrogator interacting with a UCODE G2X equipped tag population exact link and
response timing requirements must be fulfilled, which can be found in Section 17
, Ref. 1,
chapter 6.3.1.6.
13.3.1 Regeneration time
The regeneration time is the time required if a G2X is to demodulate the interrogator
signal, measured from the last falling edge of the last bit of the G2X response to the first
falling edge of the interrogator transmission. This time is referred to as T2 and can vary
between 3.0 Tpri and 20 Tpri. For a more detailed description refer to Section 17
, Ref. 1,
chapter 6.3.1.6.
13.3.2 Start-up time
For a detailed description refer to Section 17, Ref. 1, chapter 6.3.1.3.4.
13.3.3 Persistence time
An interrogator chooses one of four sessions and inventories tags within that session
(denoted S0, S1, S2, and S3). The interrogator and associated UCODE G2X population
operate in one and only one session for the duration of an inventory round (defined
above). For each session, a corresponding inventoried flag is maintained. Sessions allow
tags to keep track of their inventoried status separately for each of four possible
time-interleaved inventory processes, using an independent inventoried flag for each
process. Two or more interrogators can use sessions to independently inventory a
common UCODE G2X chip population.
A session flag indicates whether a G2X may respond to an interrogator. G2X chips
maintain a separate inventoried flag for each of four sessions; each flag has symmetric A
and B values. Within any given session, interrogators typically inventory tags from A to B
followed by a re-inventory of tags from B back to A (or vice versa).
Additionally, the G2X has implemented a selected flag, SL, which an interrogator may
assert or deassert using a Select command.
For a description of Inventoried flags S0 – S3 refer to Section 17
, Ref. 1 chapter 6.3.2.2
and for a description of the Selected flag refer to Section 17
, Ref. 1, chapter 6.3.2.3. For
tag flags and respective persistence time refer to Section 17
, Ref. 1, table 6.14.
13.4 Bit and byte ordering
The transmission order for all R=>T and T=>R communications respects the following
conventions:
within each message, the most-significant word is transmitted first, and
within each word, the most-significant bit (MSB) is transmitted first,
whereas one word is composed of 16 bits.
To represent memory addresses and mask lengths EBV-8 values are used. An extensible
bit vector (EBV) is a data structure with an extensible data range. For a more detailed
explanation refer to Section 17
, Ref. 1, Annex A.

SL3S1002FTB1,115

Mfr. #:
Manufacturer:
NXP Semiconductors
Description:
RFID Transponders SMART LABEL/TAG IC UCODE G2XM AND G2XL
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union

Products related to this Datasheet