139037 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2013. All rights reserved.
Product data sheet
COMPANY PUBLIC
Rev. 3.8 — 11 November 2013
139038 19 of 48
NXP Semiconductors
SL3ICS1002/1202
UCODE G2XM and G2XL
13.5 Data integrity
The G2X ignores invalid commands. In general, "invalid" means a command that (1) is
incorrect given the current the G2X state, (2) is unsupported by the G2X, (3) has incorrect
parameters, (4) has a CRC error, (5) specifies an incorrect session, or (6) is in any other
way not recognized or not executable by the G2X. The actual definition of "invalid" is
state-specific and defined, for each G2X state, in n Section 17
, Ref. 1 Annex B and
Annex C.
All UCODE G2X backscatter error codes are summarized in Section 17
, Ref. 1 Error
codes, Annex I. For a detailed description of the individual backscatter error situations
which are command specific please refer to the Section 17
, Ref. 1 individual command
description section 6.3.2.10.
13.6 CRC
A CRC-16 is a cyclic-redundancy check that an interrogator uses when protecting certain
R=>T commands, and the G2X uses when protecting certain backscattered T=>R
sequences. To generate a CRC-16 an interrogator or the G2X first generates the CRC-16
precursor shown in Section 17
, Ref. 1 Table 6.11, then take the ones-complement of the
generated precursor to form the CRC-16. For a detailed description of the CRC-16
generation and handling rules refer to Section 17
, Ref. 1, chapter 6.3.2.1.
The CRC-5 is only used to protect the Query command (out of the mandatory command
set). It is calculated out of X5 + X3 + 1. For a more detailed CRC-5 description refer to
Section 17
, Ref. 1, table 6.12.
For exemplary schematic diagrams for CRC-5 and CRC-16 encoder/decoder refer to
Section 17
, Ref. 1, Annex F.
For a CRC calculation example refer to Section 15.1
, Table 27 and Table 28.
139037 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2013. All rights reserved.
Product data sheet
COMPANY PUBLIC
Rev. 3.8 — 11 November 2013
139038 20 of 48
NXP Semiconductors
SL3ICS1002/1202
UCODE G2XM and G2XL
14. TAG selection, inventory and access
This section contains all information including commands by which a reader selects,
inventories, and accesses a G2X population
An interrogator manages UCODE G2X equipped tag populations using three basic
operations. Each of these operations comprises one or more commands. The operations
are defined as follows
Select: The process by which an interrogator selects a tag population for inventory
and access. Interrogators may use one or more Select commands to select a
particular tag population prior to inventory.
Inventory: The process by which an interrogator identifies UCODE G2X equipped tags.
An interrogator begins an inventory round by transmitting a Query command
in one of four sessions. One or more G2X may reply. The interrogator detects
a single G2X reply and requests the PC, EPC, and CRC-16 from the chip. An
inventory round operates in one and only one session at a time. For an
example of an interrogator inventorying and accessing a single G2X refer to
Section 17
, Ref. 1, Annex E.
Access: The process by which an interrogator transacts with (reads from or writes to)
individual G2X. An individual G2X must be uniquely identified prior to access.
Access comprises multiple commands, some of which employ one-time-pad
based cover-coding of the R=>T link.
139037 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2013. All rights reserved.
Product data sheet
COMPANY PUBLIC
Rev. 3.8 — 11 November 2013
139038 21 of 48
NXP Semiconductors
SL3ICS1002/1202
UCODE G2XM and G2XL
14.1 G2X Memory
For the general memory layout according to the standard Section 17, Ref. 1, refer to
Figure 6.17. The tag memory is logically subdivided into four distinct banks.
In accordance to the standard Section 17
, Ref. 1, section 6.3.2.1. The tag memory of the
SL3ICS1002 G2XM is organized in following 4 memory sections:
The logical address of all memory banks begin at zero (00h).
Table 10. G2X memory sections
Name Size Bank
Reserved memory (32 bit ACCESS and 32 bit KILL password) 64 bit 00b
EPC (excluding 16 bit CRC-16 and 16 bit PC) 240 bit 01b
TID (including unique 32 bit serial number) 64 bit 10b
User memory (G2XM only) 512 bit 11b
Fig 4. G2X TID memory structure
Class IdentifierMask-Designer IdentifierModel NumberSerial Number
TID
310 110 11070
00h07h08h13h14h1Fh20h3Fh
60 40
14h1Fh 18h19h
Version Number Sub Version Number
E2h006h00000001h to FFFFFFFFh
Whenever the 32 bit serial
is exceeded the sub version
is incremented by 1
3Fh 00hAddresses
Addresses
Addresses
Bits
Bits
LS Byte
LSBit LSBitMSBit MSBit
MS Byte
LSBit LSBitMSBit MSBit
00000b0000010b
Sub Version Nr Version (Silicon) Nr Model Nr. Mask ID
UCode EPC G2XM 00000b 0000011b 003h 006h
UCode EPC G2XL 00000b 0000100b 004h 006h
002h

SL3S1002FTB1,115

Mfr. #:
Manufacturer:
NXP Semiconductors
Description:
RFID Transponders SMART LABEL/TAG IC UCODE G2XM AND G2XL
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union

Products related to this Datasheet