Setha Pan-ngum. Introduction Embedded & Real-time systems could be standalone or connected A real-time system is often composed from a number of periodic.

Slides:



Advertisements
Similar presentations
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Advertisements

Topic 7 Local Area Networks (LAN)
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL). Functions, performed on the layer. МАС address in Ethernet networks. Layer 1 of the TCP/IP.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Communication Links Communication Link = Physical connection or Physical Medium Types: Wire Pair or Twisted Pair Coaxial Cable Fiber Optics Bandwidth,
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 8 Introduction to Networks and the Internet.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
Review on Networking Technologies Linda Wu (CMPT )
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
COMPUTER NETWORKS.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Network Topologies An introduction to Network Topologies and the Link Layer.
SERIAL BUS COMMUNICATION PROTOCOLS
1 LAN/WAN Interconnectivity Chapter 2. 2 Learning Objectives Explain the OSI reference model, which sets standards for LAN and WAN communications Discuss.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Jiří Novák, CTU FEE in Prague, Dept. of Measurement Industrial Distributed Systems Technology overview Technology overview Important features Important.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
1 Next Few Classes Networking basics Protection & Security.
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
CSCI 465 D ata Communications and Networks Lecture 19 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
William Stallings Data and Computer Communications
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
Slide 4-1 Chapter 4 Terms Data Communications and Networking Considerations Introduction to Information Systems Judith C. Simon.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
Programmable Logic Controllers LO1: Understand the design and operational characteristics of a PLC system.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
CT301 LECTURE 8.
Chapter 5 Link Layer and LANs
Channel Allocation (MAC)
Embedded System Communication
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Embedded System Communication
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
The Medium Access Control Sublayer
CCNA 1 Chapter 5 Ethernet Fundamentals
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Lecture 5- Data Link Layer
7- chapter Seven Local Area Networks (LAN)
Multiple Access Methods
Multiple Access Control (MAC) Protocols
Presentation transcript:

Setha Pan-ngum

Introduction Embedded & Real-time systems could be standalone or connected A real-time system is often composed from a number of periodic (time triggered) and sporadic (event triggered) tasks which communicate their result by passing messages. In a distributed real-time systems these messages are sometimes sent between processors across a communication device. (from Urban Bilstrup)

Introduction (cont.) To guarantee that the timing requirements of all tasks are met, the communications delay between a sending task and a receiving task being able to access that message must be bounded. For examples Control systems: between sensors and actuators via central computer Multiprocessors: between processors, tasks communicating

Open System Interconnection Intended for computers Designed to solve compatibility problem Layers provide standard interface and services Embedded systems use some standardisation ideas Higher layers require lower layers to work

OSI Layers Application – user interface e.g. Internet explorer Presentation – data formatting e.g. compression and encoding Session – handle overall connection e.g. OS, scheduling programs Transport – ensures data transfer, error checking e.g. TCP Network – logical addressing, routing e.g. IP (from TCP/IP)

OSI cont. Data link – prepares data for transfer, physical addressing such as Media Access Control (MAC) Physical – wires and cables, hubs, repeaters.

Embedded Communication Point-to-point networks Each node connected to every node Simple and reliable Dedicated links make it easy to meet real-time deadlines Costly due to many wires required Shared media networks Nodes are connected via bus or other topologies Less wiring and hence cheaper Easily extendable by adding new nodes to network Complex network protocol Being the system of focus from now on

Basic network architectures P1P1 P2P2 P3P3 P4P4 P1P1 P2P2 P3P3 P4P4 P1P1 P2P2 P3P3 P4P4 memory Internet P1P1 P2P2 P3P3 P4P4 From Urban Bilstrup

Complex distributed architecture HMI TunersPlayback External Wireless Communication System Audio modules Audio module Gateway MOST GREEN CAN Internal Wireless Communication System RED CAN LIN From Urban Bilstrup

Concepts Event based communication E.g. alarm, user inputs, requests for data from other systems State based communication E.g. regular sensor readings Predictability

Network resources & qualitative parameters Network resources Bandwidth Buffer space Protocol efficiency (data bits/bandwidth). Depends on Message overhead Media access overhead Determinacy (ability to calculate worst-case response time) Robustness cost

Event based system Efficient use of network resource Needs high reliability (event based data comes once in a while) May need acknowledgement Hard to predict delay in case of overloading (e.g. alarm)

State based system Messages sent at predefined, regular intervals. Less efficient due to regular occupation of communication channel by nodes. More tolerance. Missed message may be ok, since the next one will be coming. Transient data problem. Sending node has to keep data long enough for other to see. E.g. button pressed may need to be repeated.

Protocol No best protocol, depends on applications. Embedded systems tends to focus on level 1 and 2 of OSI model, for simplicity and overhead reduction. Physical link (Layer 1) – transmission medium Data link (Layer 2) provides Media Access Control (MAC)

15 Advanced communication principles [6] Layering Break complexity of communication protocol into pieces easier to design and understand Lower levels provide services to higher level Lower level might work with bits while higher level might work with packets of data Physical layer Lowest level in hierarchy Medium to carry data from one actor (device or node) to another Parallel communication Physical layer capable of transporting multiple bits of data Serial communication Physical layer transports one bit of data at a time Wireless communication No physical connection needed for transport at physical layer

16 Parallel communication [6] Multiple data, control, and possibly power wires One bit per wire High data throughput with short distances Typically used when connecting devices on same IC or same circuit board Bus must be kept short long parallel wires result in high capacitance values which requires more time to charge/discharge Data misalignment between wires increases as length increases Higher cost, bulky

17 Serial communication [6] Single data wire, possibly also control and power wires Words transmitted one bit at a time Higher data throughput with long distances Less average capacitance, so more bits per unit of time Cheaper, less bulky More complex interfacing logic and communication protocol Sender needs to decompose word into bits Receiver needs to recompose bits into word Control signals often sent on same wire as data increasing protocol complexity

18 Wireless communication [6] Infrared (IR) Electronic wave frequencies just below visible light spectrum Diode emits infrared light to generate signal Infrared transistor detects signal, conducts when exposed to infrared light Cheap to build Need line of sight, limited range Radio frequency (RF) Electromagnetic wave frequencies in radio spectrum Analog circuitry and antenna needed on both sides of transmission Line of sight not needed, transmitter power determines range

Media Access Control (MAC) Many protocols are taken from computer networks Connection oriented protocols CSMA/CD CSMA/CA Polling Token passing TDMA Binary countdown (Bit dominance)

Protocol overview [1]

Connection oriented protocols [5] 2 nodes per each connection only If nodes are not directly connected, data is relayed Deterministic delay between directly connected nodes, high delay for indirectly connected nodes

Connection oriented protocols cont. Suitable to systems with low communication requirements. Node with pass-through traffic can be fully occupied. E.g. telephone network service

Polling [5] Simple and deterministic Needs a master node Master periodically polls slave nodes Consumes bandwidth E.g. military aircraft communication Simple slave nodes, complex master

Time Division Multiple Access (TDMA) [5] Masters broadcasts sync signal to synchronise all clocks Then each node sends data on its time slot. Similar but more efficient than polling (synchronise once vs polling all nodes individually. more complex nodes due to timing requirements.

TDMA cont. Fixed length messages (inflexible) E.g. satellite communications

Token ring [5] Ring shape network Token (signal) is passed from node to node Node can hold token, send message all the way round the ring, and pass token on Deterministic under heavy load.

Token ring cont. Some token overhead Can add priority by having extra field in token More complexity in detecting token lost Cable break disrupts network (needs dual ring) E.g. many Wide Area Networks (WANs)

Token bus[5] Similar to token ring Token is passed via bus simultaneously Cable break can be dealt with by reconfiguration (like when a node is added to or taken off the network. Applied in manufacturing

Binary countdown (Bit Dominance) All nodes wait for channel to be free before sending. Simultaneous channel access (contention) resolved by detecting broadcasting signal for unique identification Bus must provide dominance bit e.g. ‘1’ can override ‘0’ A node stop transmitting when seeing dominance bit opposite to its own broadcasting. Hence messages require priority as IDs rather than node IDs. Good throughput & high efficiency (no contention loss)

Binary countdown cont. [5]

Binary countdown cont. Heavy load can cause long delay for low priority messages (no bound) Applied in industrial and automotive Controller Area Network (CAN) and SAE standard J 1850

Carrier Sense Multiple Access with Collision Dectection (CSMA/CD) [5] Nodes wait for idle channel before transmitting. When simultaneously transmission is detected, each node stops and waits for random time before resending.

CSMA/CD cont. Easy to add or take off new nodes without initialisation and configuration Low overhead at light traffic Unbound overhead at heavy traffic (messages keeps colliding) hence low determinacy and efficiency. Requires detection circuit

Carrier Sense Multiple Access with Collision Avoidance (SCMA/CA) [5]

CSMA/CA cont. Hybrid between light traffic efficiency of CSMA/CA and heavy traffic efficiency of token-based protocols. Nodes waits for free network before sending. When collision happens, jam signal is sent to notify all nodes, synchronises clocks and start contention time slot. Unique time slot is assigned to each node Rotate time slot for fairness Network return to normal state when all slots are unused.

CSMA/CA cont. Variations Reservation CSMA – no. of slots equal to no. of nodes Not practical if networks has many nodes. No. of slots less than no. of nodes – randomly allocate slots to nodes.

Media access comparison [5]

Automotive standards [7]  Controller Area Network (CAN)  Event triggered, Arbitration  Time Triggered Protocol (TTP)  Time triggered, TDMA  Local Interconnect Network (LIN)  Time triggered, master-slave  Media Oriented System Transport (MOST)

Manufacturing Automation Standards [7]  Controller Area Network (CAN)  Arbitration  Process Network (P-NET)  Token passing and master-slave  PROcess Field Bus (PROFIBUS)  Token passing and master-slave  Factory Instrumentation Protocol (World FIP)  Centralised arbitration

Military Standards [7]  MIL-STD 1553  The current 1553 data bus is widely used in military applications, with a nominal throughput of 1 Mb/s.  MIL-STD 1773  Mil-Std-1773 defines a fiber optic bus. This system is widely used for on- board command and telemetry transfer between military spacecraft components, subsystems and instruments, and within complex components themselves AS, has a dual rate of 1 Mb/s or 20 Mb/s.  ARINC 429  A commercial aircraft data bus. It is widely implemented in the commercial aircraft avionics industry. Performance is 100Kb/s or 12.5Kb/s.

References 1. Upender B, Koopman P, Embedded communication protocol options, Proc. to the 5 th annual embbeded system conference, Rollins L, Embedded communication 3. Kopetz H, Real-time system design principles for distributed embedded applications, Kluver, Liu J, Real-time systems, Prentice-Hall, Upender B, Koopman P, Communication protocols for embedded systems, Embedded systems programming, Nov Vahid F, Givargis T, Embedded system design a unified hardware/software introduction, Wiley, Bilstrup U, Real-time communication