Note: This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses and can radiate radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communication. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by turning the
equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected
Consult the dealer or an experienced radio/TV technician for help
THIS DEVICE COMPLIES WITH PART 15 OF FCC RULES. OPERATION IS SUBJECT TO THE FOLLOWING
WO CONDITIONS:
1) THIS DEVICE MAY NOT CAUSE HARMFUL INTERFERENCE AND
2) THIS DEVICE MUST ACCEPT ANY INTERFERENCE RECEIVED, INCLUDING INTERFERENCE
THAT MAY CAUSE UNDESIRED OPERATION
WARNING: CHANGES OR MODIFICATIONS NOT EXPRESSLY APPROVED BY THE PARTY RESPONSIBLE
FOR COMPLIANCE COULD VOID THE USER’S AUTHORITY TO OPERATE THE
1. Disclaimer
Products sold by ARYGON Technologies AG are covered by the ARYGONSs Term and Conditions of Sale.
ARYGON Technologies AG makes no warranty, express, statutory, implied, or by description regarding the
information set forth herein or regarding the freedom of the described devices from patent infringement.
ARYGON Technologies AG reserves the right to change specifications and prices at any time and without notice.
Therefore, please check with ARYGON Technologies AG for current information.
This product is intended for use in normal commercial applications. Applications requiring extended
temperature range, unusual environmental requirements, or high reliability applications, such as for military,
medical life-support or life-sustaining equipment are specifically not recommended without additional
consultation of ARYGON Technologies AG.
The information provided in this document by ARYGON Technologies AG is believed to be correct and accurate.
However, ARYGON Technologies AG shall not be liable to recipient or any third party for any damages,
including but not limited to personal injury, property damage, loss of profits, loss of use, interruption of
business or indirect, special, incidental or consequential damages, of any kind, in connection with or arising out
of the furnishing, performance or use of the technical data herein. No obligation or liability to recipient or any
third party shall arise or flow out of ARYGON Technologies AG rendering of technical or other services.
This document describes the architecture important functions. For a complete reference of implemented
functions please refer to the Doxygen documentation.
Application Layer
After connecting the reader to the computer the reader is automatically installed as a HID (Human Interface
Device). The USB HID protocol defines different reports. Every report starts with its own report ID defining the
length and if it is an incoming or an outgoing report.
USB Report-Frame
Each report frame starts with a Report ID byte. The second byte defines the length of the frame (the ID and the
length bytes are included in the length).
Table 2 Report Frame
USB Reports
The following table gives an overview of the implemented USB reports. Each USB report causes the device to
reply with a response frame (incoming report).
It is recommended to send the reports always with the maximal report length of 64 bytes. Most reports are
Byte 0 1
2
Content
0x10(ID)
3(length)
Payload
Byte 0 1
2 .. 47
Content
0x11(ID)
length
Zero terminated string
Byte 0 1
2
Content
0x18(ID)
3(length)
Payload
Byte 0 1
2
Content
0x19(ID)
3(length)
0 on success
already defined in the descriptor with the maximal length. The others may change in future. Windows
truncates longer reports and discards shorter reports!
Reader Related USB Reports
These commands are intended to configure the AUDR UHF reader and for obtaining information about the
firmware.
callSendFirmwareHardwareID
This report sends the firmware or the hardware ID to the host computer.
Table 4- callSendFirmwareHardwareID - outgoing
Payload:
0x00…Firmware
0x01…Hardware
Table 5- callSendFirmwareHardwareID - incoming
callAntennaPower
This report enables or disables the RF power on the RF-output ports.
Table 22 – Set frequency hopping parameters - outgoing
Table 23 - Set frequency hopping parameters - incoming
Get frequency hopping related parameters
Table 24 - Get frequency hopping parameters – outgoing
Table 25 - Get frequency hopping parameters – incoming
Continuous modulation test
Starts continuous modulation of the RF field for given duration. If duration is set to 0 continuous modulation is
active until the next report is received from GUI.
Transponder related USB reports force the microcontroller and the AUDR UHF reader to communicate with
UHF RFID tags. The RF- power at the antenna needs to be enabled and at least one tag should be in the RF-field
coverage of the reader.
callInventory
This function performs a gen2 protocol inventory round according to parameters given by configGen2().
Table 35 - callInventory - outgoing
start: 1 -> start a new round, 2 -> deliver next tag
The device reports back all tags in a burst mode.
Table 36 - callInventory - incoming
With byte 2 the controller reports how many tags are found by the inventory command. After issuing the first
inventory report and with start-byte = 2 the controller reports back the count of tags not inventoried yet. This
information is used to inform the host how often he has to call the inventory command in order to inventory all
available tags. The tag information is kept in the microcontroller's tag list. No tag information is deleted.
callInventoryRSSIInternal
This function performs a gen2 protocol inventory round according to parameters given by configGen2().
Table 37 - callInventoryRSSIInternal - outgoing
start: 1 -> start a new round
start: 2 -> deliver next tag
The device reports back all tags in a burst mode.
Table 38 - callInventoryRSSIInternal – incoming
RSSI_value: upper 4 bits I channel, lower 4 bits Q channel base_freq: base frequency at which the tag was found.
With byte 2 the controller reports how many tags are found by the inventory command. After issuing the first
inventory report and with start-byte = 2 the controller reports back the count of tags not inventoried yet. This
information is used to inform the host how often he has to call the inventory command in order to inventory all
Byte 0 1 2 3
4 .. 11
12
Content
0x3F(ID)
12(length)
start
mask
word_data
start_address
Byte 0 1 2 3
4
5 .. 12
13 .. 15
Content
0x40(ID)
13(length)
tags_left
rssi(planned)
8(epclen)
uid
used freq
Command Inventory
Pick one Tag out of
the population found
Individual commands
to Tag like read or
write
Command Select or
Isolate Tag
available tags. The tag information is kept in the microcontroller's tag list. No tag information is deleted.
callInventory6B
This function performs one inventory round using ISO18000-6b protocol. Reading or writing to the tag will not
succeed without sending this report first.
Table 39 - callInventory6B – outgoing
start: 1 -> start a new round start: 2 -> deliver next tag mask: Mask value for GROUP_SELECT_EQ command, 0 will select all tags start_address: address where data comparision will be started word_data: data which will be compared
Table 40 - callInventory6B – incoming
With byte 2 the controller reports how many tags are found by the inventory command. After issuing the first
inventory report and with start-byte = 2 the controller reports back the count of tags not inventoried yet. This
information is used to inform the host how often he has to call the inventory command in order to inventory all
available tags. The tag information is kept in the microcontroller's tag list. No tag information is deleted.
callSelectTag
Prior to communicate with one tag the host must isolate one of the found tags. The host needs to send always
all EPC bytes to the controller regardless how long the EPC mask is specified. The complete report length is 64
bytes and needs to be taken into account by the host
The correct sequence to operate that command is shown below:
Before calling any of the functions the AUDR UHF reader chip needs to be
initialized using AUDR UHF readerInitialize().
Next the function gen2Open() needs to be called for opening a session. gen2SearchForTags() should be called to identify the tags in reach. Typically tag
singulation is done next.
In order to do so gen2SearchForTags() is called again provided a proper mask to
singulate (select) a tag.
In this case only one tag is returned by gen2SearchForTags(). This tag is then in the Open/Secured state and may be accessed using the other
Before calling any of the functions herein the AUDR UHF READER needs to be initialized
using AS339xreaderInitialize(). Thereafter the function iso6bOpen() needs to be called for
opening a session.
The following graph shows several states of an ISO 6B tag as well as their transitions based
on iso6b* commands:
The device is designed for worldwide use. Per default it loads the European frequency setup upon start up.
Different setup can be applying the commands described in tables 18 – 25. Nevertheless the default function
implemented in firmware after loading the region specific frequencies is as follows.
ARYGON Reader Suite GUI is designed to allow most freedom in select different adoptions in the worldwide
setup.
In the frequency section e.g. USA settings:
Each setting can also be manually changed upon user requirements.
The selection of a profile will load region specific settings for:
Start frequency: The lowest channel frequency End frequency: the highest channel frequency Increment: The channel spacing between two channels RSSSI Threshold: give the opportunity to set a Listen before Talk (LBT) value. In case a LBT is not
needed or not wanted, this level should be as high as possible ( e.g. -40 dB) The thresholds that can
be managed by the system starts at -47 dBm and can reach up to -86 dBm. (Please note that the
levels are chip values and can be changed by the external components. That means that Arygon will
have a 10 dB higher value than the described value in the GUI)
Listen time: This time specify how long the reader is listening to the channel. The largest recorded
signal during the listen time will determine the channel power.
Idle time: This time specify the time between two channel hop. Maximum allocation time: This time define the maximum time on one frequency.
The profile will be transferred with the “Set” Button to the reader.
After press the button, the GUI will start to transfer a randomized frequency table List and store it in its
memory. Now the reader will change the frequency on every Inventory or Tag command according to the list.
Since the Gen2 anti collision round is limited by the slot counter Q, it is possible to calculate the maximum
allocated channel time to less than 400ms. Nevertheless it is also possible to limit the channel allocation time
with the maximum allocation time. Since Arygon is used as a desktop reader, the user is advised to use a max
Q value of less than 4.
The Gen2 settings are for individual Link frequencies.
For USA, it is recommended
Link frequency: 256 kHz
Session:S0
Q_Begin: 4
Assuming that the boot loader is already loaded into the flash memory the firmware of the AUxx reader system
can be updated in an easy way. Care needs to be taken that the ARYGON Reader Suite is not running at the
same time during the programming process. To program the AUxx UHF reader system simply double click the
batch file “FWupdate_ARYGON_UHF_reader.bat”. The batch file will run the “up.exe” executable which loads
the “Arygon.bin” into the micro AUDR‘s flash memory. Therefore those two files need to be present in the
same directory as the batch file itself.
When the programming is completed the message “Successfully written xxxx bytes” appears. Hit any key to
close the window and return to WINDOWS.
Picture 7: Firmware updating response
The Arygon readers are now able to communicate with the ARYGON Reader Suite via USB.
In case of problems, please contact: info@arygon.com . http://www.arygon.com
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.