applied wireless electronics grzegorz budzy „ lecture 5: rfid

80
Applied Applied Wireless Wireless Electronics Electronics Grzegorz Budzy Grzegorz Budzy ń ń L L ecture ecture 5 5 : : RFID RFID Wireless Wireless data transfer data transfer WiMAX WiMAX

Upload: others

Post on 12-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

AppliedApplied WirelessWireless ElectronicsElectronics

Grzegorz BudzyGrzegorz Budzyńń

LLectureecture 55::RFIDRFIDWirelessWireless data transfer data transfer –– WiMAXWiMAX

Page 2: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Plan• RFID

– Introduction

– Tags

– Reader

– Communication

– Middleware

• WiMAX

– WiMAX standards

– WiMAX vs OSI model

– WiMAX architecture

Page 3: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID - Introduction

Page 4: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

What is RFID?

• RFID means Radio Frequency IDentification

• RFID is An ADC (Automated Data Collection) technology that:– uses radio-frequency waves to transfer data

between a reader and a movable item to identify, categorize, track..

– Is fast and does not require physical sight or contact between reader/scanner and the tagged item.

Page 5: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

What is RFID?

• RFID is An ADC (Automated Data Collection) technology that:– Performs the operation using low cost

components.

– Attempts to provide unique identification and backend integration that allows for wide range of applications.

• Other ADC technologies: Bar codes, OCR.

Page 6: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

What is RFID?

Eth

ern

et

RFID

Reader

RFID Tag RF Antenna Network Workstation

Page 7: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Why RFID?• Tag detection not requiring human intervention

reduces employment costs and eliminates human errors from data collection,

• As no line-of-sight is required, tag placement is less constrained,

• RFID tags have a longer read range than, e. g., barcodes,

Page 8: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Why RFID?• Tags can have read/write memory capability, while

barcodes do not,

• An RFID tag can store large amounts of data additionally to a unique identifier,

• Unique item identification is easier to implement with RFID than with barcodes,

Page 9: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Why RFID?• Tags are less sensitive to adverse conditions (dust,

chemicals, physical damage etc.),

• Many tags can be read simultaneously,

• RFID tags can be combined with sensors,

• Automatic reading at several places reduces time lags and inaccuracies in an inventory

Page 10: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Why RFID?• Tags can locally store additional information; such

distributed data storage may increase fault tolerance of the entire system,

• Reduces inventory control and provisioning costs,

• Reduces warranty claim processing costs.

Page 11: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID – applications• Manufacturing and Processing

– Inventory and production process monitoring

– Warehouse order fulfillment

• Supply Chain Management

– Inventory tracking systems

– Logistics management

• Security

– Access control

– Counterfeiting and Theft control/prevention

• Location Tracking

– Traffic movement control and parking management

– Wildlife/Livestock monitoring and tracking

Page 12: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Tags

Page 13: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Tags

Page 14: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Basic Tag Operation

NN

SS

TAG

Reader

Reader

TAG

BackscatterBackscatterInductive CouplingInductive Coupling

Page 15: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Basic Tag Operation• Near field (LF, HF): inductive coupling of tag to magnetic field

circulating around antenna (like a transformer)

• Varying magnetic flux induces current in tag. Modulate tag load to

communicate with reader

• field energy decreases proportionally to 1/R3

• Far field (UHF, microwave): backscatter.

• Modulate back scatter by changing antenna impedance

• Field energy decreases proportionally to 1/R

• Boundry between near and far field: R = wavelength/2π

• Absorption by non-conductive materials significant problem for

microwave frequencies

Page 16: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Tags Types

• Passive Tags

– Do not require power – Draws from Interrogator Field

– Lower storage capacities (few bits to 1 KB)

– Shorter read ranges (10 cm to 3 m)

– Usually Write-Once-Read-Many/Read-Only tags

– Cost around 25 cents to few dollars

Page 17: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Tags Types

• Active Tags

– Battery powered

– Higher storage capacities (512 KB)

– Longer read range (600m)

– Typically can be re-written by RF Interrogators

– Cost around 50 to 250 dollars

Page 18: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Electronic Product Code

Page 19: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Tag Architecture

ProtocolEngine

ProtocolEngine

ReceiverReceiver

MemoryMemory

Ante

nna

Ante

nna

Write Path

D

S

G

Page 20: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Tag memory• Read-only tags

• Tag ID is assigned at the factory during manufacturing

– Can never be changed

– No additional data can be assigned to the tag

• Write once, read many (WORM) tags– Data written once, e.g., during packing or

manufacturing

– Tag is locked once data is written

– Similar to a compact disc or DVD

• Read/Write – Tag data can be changed over time

– Part or all of the data section can be locked

Page 21: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

802.11n

18000-4EPC C0, C1, C1G2,

18000-6

18000-3.1,

15693,14443 A, B,

and C

11784/85, 14223Existing

standards

3%6%17%74%Market share

Transportation

vehicle ID (road

toll),

Access/Security,

large item

management,

supply chain

Transportation

vehicle ID,

Access/Security,

large item

management,

supply chain

Small item

management,

supply chain,

Anti-theft, library,

transportation

Smart Card,

Ticketing, animal

tagging,

Access, Laundry

Application

Electro magneticElectro magneticMagneticMagneticCoupling

10M2-7 M1M10 cmRead Range

2.45 - 5.8 GHz866 - 915MHz13.56 MHz125 - 134KHzFreq. Range

MicrowaveUHFHFLF

Page 22: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Readers

Page 23: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Readers• Reader functions:

– Remotely power tags

– Establish a bidirectional data link

– Inventory tags, filter results

– Communicate with networked server(s)

– Can read 100-300 tags per second

• Readers (interrogators) can be at a fixed point such as– Entrance/exit

– Point of sale

• Readers can also be mobile/hand-held

Page 24: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Reader

915MHz

Radio

Network

Processor

Digital Signal

Processor

(DSP)

13.56MHz

Radio

Power

Supply

Page 25: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Reader – block diagram

Transmit path Receive Path Frequency Synthesizer Digital

RFID READER

RF ModuleDAC

Host Device

ADC

Crystal

Micro-

Controller

AGC FiltersI/Q

Demod

PLL

VCO

DAC Power Control

PA

Filter Coupler

Coupler

Power

Detect

Coupler

FPGA

Regulatio

n

Baseband

&

Protocol

Page 26: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Reader – software stack

RFID Reader API Library

Custom

Application/

Protocol

Reader

Protocol

ApplicationNetw

ork

management

File

Systems

Network

Protocols

High-Level Interfaces

Low-Level Interfaces

O/S

Hardware

Platform API Libraries

Custom

Application/

Protocol

Custom

Application/

Protocol

Network Interface

Page 27: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Communication

Page 28: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Communication

Tags

Reader

Power from RF field

Reader

Antenna

Reader->Tag Commands

Tag->Reader Responses

RFID Communication

Channel

Page 29: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Communication

Page 30: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Communication• Host manages Reader(s) and issues Commands

• Reader and tag communicate via RF signal

• Carrier signal generated by the reader

• Carrier signal sent out through the antennas

• Carrier signal hits tag(s)

• Tag receives and modifies carrier signal– “sends back” modulated signal (Passive Backscatter)

• Antennas receive the modulated signal and send them to the Reader

• Reader decodes the data

• Results returned to the host application

Page 31: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Passive RFID – limiting factors

Sourc

e: [1

]

• Reader transmitter power (Gov’t. limited)

• Reader receiver sensitivity

• Reader antenna gain (Gov’t. limited)

• Tag antenna gain (Size limited)

• Power required at tag (Silicon process limited)

• Tag modulator efficiency

Page 32: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Passive RFID – limiting factors

Sourc

e: [1

]

• Since P ~ 1/r2 , doubling read range requires 4X

the transmitter power.

• Larger antennas can help, but at the expense

of larger physical size

• More advanced CMOS process technology

helps by reducing P

• At large distances, reader sensitivity limitations

dominate.

Page 33: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID – Collisions

Sourc

e: [1

]

• Reader-Reader Interference

• Reader-Tag Interference

Page 34: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Middleware

Page 35: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Middleware• In some applications RFID usage generates huge

amount of data that has to be porcesses

• Consider a supermarket chain implementing

RFID:

– 12 bytes EPC + Reader ID + Time = 18 bytes per tag

– Average number of tags in a neighborhood store =

700,000

– Data generated per second = 12.6 GB

– Data generated per day = 544 TB

– Assuming 50 stores in the chain, data generated per

day = 2720 TB

Page 36: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Middleware

Page 37: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

RFID Example

Page 38: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

MFRC522- RFID Contactless Reader IC

Page 39: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

MFRC522- RFID Contactless Reader IC• Features:

– reader/writer IC for contactless communication at 13.56

MHz

– Typical operating distance in Read/Write mode up to 50

mm depending on the antenna size and tuning

– Supports ISO/IEC 14443 A higher transfer speed

communication up to 848 kBd

– Supported host interfaces

• SPI up to 10 Mbit/s

• I2C-bus interface up to 400 kBd in Fast mode, up to 3400 kBd in

High-speed mode

• RS232 Serial UART up to 1228.8 kBd, with voltage levels dependant

on pin voltage supply

Page 40: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

MFRC522- RFID Contactless Reader IC

Page 41: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX

Page 42: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

What is WiMAX?

• WiMAX is a short for Worldwide Interoperability for Microwave Access

• WiMAX telecommunication protocols areimplmentation of IEEE 802.16 recommendations

• The name "WiMAX" was created by the WiMAX Forum, formed in June 2001 to promote conformity and interoperability of the standard

Page 43: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

What is WiMAX?

• WiMAX is a wide area alternative to IEEE 802.11/WiFi

• WiMAX a method for breaking wire basedcommunication monopolies

• WiMAX a method for providing backhaul to IEEE 802.11/WiFi access points

• WiMAX is, in some sort, a universal solution for broadband wireless access

Page 44: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

What is WiMAX?

Sourc

e: [1

]

Page 45: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

What is WiMAX?

Sourc

e: [1

]

Page 46: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX History

• In the mid-1990’s, various groups began to promote “last-mile” fixed wireless access solutions.

• Multiple goals:– Provide the capacity and reliability of wire based

communication but with the flexibility and ease of deployment of wireless

– Provide a versatile system for corporate orinstitutional backhaul/distribution networks

– Break the monopolies of incumbent carriers

Page 47: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX History

• Interest soon focused in two approaches.– LMDS – Local Multipoint Distrubiution Service

• operates in 26-29 GHz spectrum under LoSconditions

• uses conventional QAM modulation with ATMderived upper layers to provide high speed service

• Distance is typically limited to about 2.4 km

• Links up to 8km in point-to-point configurations

Page 48: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX History

• Interest soon focused in two approaches.– MMDS – Multichannel Multipoint Distribiution

Service• Known also under the name of Broadband Radio

Service (BRS)

• an alternative method of cable television programming reception

• uses microwave frequencies at 2.1 GHz and from 2.5 GHz to 2.7 GHz, usually under LoS conditions

• may use any of various PHY, MAC, and NET layers

• provided significantly greater range than LMDS

Page 49: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX History

• High costs, lack of standards and fear of vendor lock-in drove off potential LMDS customers.

• In 1999, IEEE 802.16 was formed to address these issues by developing open standards for LMDS.

• In 2001, the IEEE 802.16 standard for BWA (Brodband Wireless Access) systemsoperating in the 10-66 GHz range was released

Page 50: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX History

• 802.16-2001 Fixed Broadband Wireless Access (10–66 GHz)

• 802.16a-2003 Physical layer and MAC definitions for 2–11 GHz

• P802.16.2a Coexistence with 2–11 GHz and 23.5–43.5 GHz

• 802.16e-2005 Mobile Broadband Wireless Access System

• 802.16-2009 Air Interface for Fixed and Mobile Broadband Wireless Access System

• 802.16m-2011 Advanced Air Interface with data rates of 100 Mbit/s mobile and 1 Gbit/s fixed.

Page 51: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Wi-Fi – Standards

Sourc

e: [3

]

Page 52: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – applications

Sourc

e: [2

]

Page 53: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX Services

• Digital audio/video multicast

• Digital telephony

• ATM

• Internet protocol

• Bridged LAN

• Back-haul

• Frame relay

Page 54: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – Key features

• Major goal of IEEE 802.16 (2-11 GHz): provide a “universal” solution for broadband wireless access– point-to-multipoint, LoS or NLoS

– ranges of “several” km; urban, suburban, rural

• Operating Frequency: 2 – 11 GHz

• Allocations: Licenced and Unlicenced

• Channel Bandwidth: 1.25 – 20 MHz

Page 55: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – Key features

• Modulation: Single carrier, 256 OFDM, 2048 OFDMA, BPSK, QPSK, 16-QAM, 64-QAM, 256-QAM

• Antenna system support: Diversity, MIMO, SDMA

• Duplexing: FDD, H-FDD, TDD

• Data Rates: From T1 (1.5 MB/s) to over 70 Mb/s

Page 56: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – Key features

• The IEEE 802.16 MAC layer supports– OFDM and OFDMA

– ARQ (Automatic Repeat Request)

– Dynamic Frequency Selection

– Mesh Networking

– Advanced Antenna Systems

– Differentiated Quality of Service

– Enhanced Security

Page 57: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX vs OSI model

Page 58: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – MAC layer• Connection oriented

– Connection ID (CID), Service Flows

• Channel access: decided by BS– UL-MAP

• Defines uplink channel access

• Defines uplink data burst profiles

– DL-MAP• Defines downlink data burst profiles

– UL-MAP and DL-MAP are both transmitted in the beginning of each downlink subframe

Page 59: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – physical layer• Allows use of directional antennas

• Allows use of two different duplexingschemes:– Frequency Division Duplexing (FDD)

– Time Division Duplexing (TDD)

• Support for both full and half duplex stations

• Adaptive Data Burst profiles– Transmission parameters (e.g. Modulation, FEC)

can be modified on a frame-by-frame basis for each SS

– Profiles are identified by ”Interval Usage Code”

Page 60: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – physical layer implmentation

Sourc

e: [3

]

Page 61: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – physical layer implmentation

Sourc

e: [3

]

Page 62: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX Frame Format

• Header - protocol control information

– Downlink header – used by the base station

– Uplink header – used by the subscriber to convey

bandwidth management needs to base station

– Bandwidth request header – used by subscriber to

request additional bandwidth

• Payload – either higher-level data or a MAC

control message

• CRC – error-detecting code

Page 63: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – physical layer - Downlink• Continuous downstream mode

– For continuous transmission (audio/video)

– Simple TDM scheme is used for channel access

– Frequency division duplex (FDD)

• Burst downstream mode– For bursty transmission (IP-based traffic)

– DAMA-TDMA scheme for channel access

– FDD with adaptive modulation, frequency shift division duplexing (FSDD), time division duplexing (TDD)

Page 64: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – TDD Downlink subframe

Sourc

e: [2

]

Page 65: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – physical layer - Uplink• Stations transmit in in their assigned

allocation specified in an initial map

• Uplink sub-frame may also contain contention-based allocations for initial system access

• Uses a DAMA-TDMA technique

• Error correction uses Reed-Solomon codes

• Modulation scheme based on QPSK, 16-QAM or 64-QAM

Page 66: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX – Uplink subframe

Sourc

e: [4

]

Page 67: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX frequency channels

Sourc

e: [4

]

Page 68: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX Peak Raw Data Rates• Assumptions:

– 10MHz bandwidth

Sourc

e: [1

]

Page 69: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX architecture

Page 70: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX topology - PMP• PMP – point-to-multipoint: the central point

of the network is the Base Station (BS)

Sourc

e: [1

]

Page 71: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX topology - mesh• In mesh topology there is no central point of

the network. The traffic may go through BS or

directly between single stations (SS).

Sourc

e: [1

]

Page 72: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX topologies

• A major advantage of the Mesh mode is that the

reach of a BS can be much greater, depending on

the number of hops, until the most distant SS.

• On the other hand, using the Mesh mode brings

up the now thoroughly studied research topic of

ad hoc (no fixed infrastructure) networks routing

(more difficult).

Page 73: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX topologies

• When authorised to a Mesh network, a

candidate SS node receives a 16-bit Node ID

(IDentifier) upon a request to an SS identified as

the Mesh BS.

• The Node ID is the basis of node identification.

• The Node ID is transferred in the Mesh

subheader of a generic MAC frame in both

unicast and broadcast messages.

Page 74: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX application example

Page 75: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX transceiver AT86RF535B

• Single-chip 3.5GHz WiMAX Transceiver

• Low-IF/Zero-IF Transceiver Architecture; Requires No

External Filters

• Support Channel Bandwidths of 3.5, 5.0, 7.0,

8.75MHz, and 10MHz

• Modulation up to 64QAM

• Ultra-fast Fractional-N Synthesizer

• Sensitivity < -74 dBm at 64-QAM, 7MHz BW

• Low Supply Voltage: 3.0 V

Page 76: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX transceiver AT86RF535B

Sourc

e: [5

]

Page 77: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX transceiver AT86RF535B

• Functional description:

– based on the IEEE 802.16-2004 standard

– provides transmit, receive, and frequency synthesis

functions using the OFDM modulation schemes

– consists of a frequency-agile RF transceiver intended for use

in 3.5-GHz licensed bands at data rates up to 26Mbps

– addresses the requirements of base station (BS) as well as

subscriber stations (SS) equipment

– Configuration and control registers and a bi-directional data

communication over SPI interface

Page 78: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

WiMAX transceiver AT86RF535B

Sourc

e: [5

]

Page 79: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

Thank you for your attention

Page 80: Applied Wireless Electronics Grzegorz Budzy „ Lecture 5: RFID

References[1] http://www.naclin.org/RFID-SECURITY-Bibhuti.ppt#259,4,Brief History

[2] “Introduction to RFID” CAENRFID an IIT Corporation

[3] www.rfidprivacy.org

[4] Lundmark T., „ WiMAX - a sneak preview”, TietoEnator

[5] „WiMAX, making ubiquitous high-speed data services a reality”, WhitePaper, Alcatel

[6] www.altera.com

[7] Sridhar Iyer, „ WiMAX: IEEE 802.16 - Wireless MANs”, http://www.it.iitb.ac.in/~sri

[8] AT86RF535B documentation, www.atmel.com